Les cookies nous permettent de vous proposer nos services plus facilement. En utilisant nos services, vous nous donnez expressément votre accord pour exploiter ces cookies.En savoir plus OK

Cisco-Prime-Network-3.10-User-Guide-November-2012

Cisco-Prime-Network-3.10-User-Guide-November-2012

Revenir à l'accueil

Cliquez sur le pdf pour le télécharger

 

Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 Cisco Prime Network 3.10 User Guide November 2012 Text Part Number: OL-28065-01 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R) Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental. Cisco Prime Network 3.10 User Guide © 1999-2012 Cisco Systems, Inc. All rights reserved. iii Cisco Prime Network 3.10 User Guide OL-28065-01 CONTENTS Preface xxi Audience xxi Document Organization xxii Conventions xxiv Related Documentation xxv Obtaining Documentation and Submitting a Service Request xxv CHAPTER 1 The Prime Network GUI Clients 1-1 Overview of the GUI Clients 1-1 Using Prime Network with Prime Central 1-2 CHAPTER 2 Working with the Cisco Prime Network Vision Client 2-1 User Roles Required to Work with Basic Operations in Prime Network Vision 2-1 Launching Prime Network Vision 2-2 Changing Your GUI Client Password 2-3 The Prime Network Vision Window 2-3 Prime Network Vision Inventory Tabs 2-4 Prime Network Vision Maps 2-5 Opening Maps 2-6 Navigation Pane 2-6 Content Pane: Map, List, and Links Views 2-7 Ticket Pane 2-16 Prime Network Vision Status Indicators 2-16 Severity 2-17 VNE Management State 2-18 Tickets 2-22 Prime Network Vision Toolbar 2-22 Prime Network Vision Menu Bar 2-24 File Menu 2-25 Edit Menu 2-26 View Menu 2-26 Node Menu 2-27 Tools Menu 2-27 Contents iv Cisco Prime Network 3.10 User Guide OL-28065-01 Activation Menu 2-28 Network Inventory Menu 2-28 Reports Menu 2-29 Window Menu 2-29 Help Menu 2-29 Prime Network Vision Right-Click Menus 2-29 Map Right-Click Menu 2-30 Element Right-Click Menu 2-31 Aggregation Right-Click Menu 2-34 Link Right-Click Menu 2-35 List View Right-Click Menu 2-35 Links View Right-Click Menu 2-37 Ticket Right-Click Menu 2-38 Adjusting the Prime Network Vision GUI Client Settings 2-39 Filtering and Sorting Tabular Content 2-40 CHAPTER 3 Viewing and Managing NE Properties 3-1 User Roles Required to Work with Prime Network Vision 3-1 Information Available in Element Icons 3-3 Viewing the Properties of a Network Element 3-6 Network Element Badges 3-8 The Inventory Window 3-9 Navigation Pane 3-12 Content Pane 3-13 Device View Pane 3-13 Device View Pane Toolbar 3-14 Ticket and Events Pane 3-15 Checking VNE Connectivity and Communication Status 3-16 Viewing the Physical Properties of a Device 3-19 Redundancy Support 3-21 Viewing Satellite Properties 3-22 Working with Ports 3-23 Viewing Port Status and Properties 3-23 Viewing a Port Configuration 3-25 Disabling and Enabling Alarms 3-26 Generating the Port Utilization Graph 3-27 Viewing the Logical Properties of a Network Element 3-27 Logical Inventory Window 3-28 Contents v Cisco Prime Network 3.10 User Guide OL-28065-01 Logical Inventory Navigation Pane Branches 3-29 Logical Inventory Navigation Pane Icons 3-30 Logical Inventory Content Pane Tabs 3-30 Viewing Device Operating System Information 3-31 Running an Activation from the Activation Menu 3-33 Network Activation Window 3-34 Running Activations 3-34 Searching for Activations (Activation History) 3-35 Rolling Back an Activation 3-35 Cloning an Existing Activation 3-36 Deleting Activations 3-36 Configuring and Viewing NEs using Basic Management Commands 3-37 Port Commands 3-38 Interface Commands 3-39 IP Routing Commands 3-41 VRF Commands 3-41 ACL Commands 3-42 Server Setting Commands 3-42 Syslog Host Logging Command 3-43 SNMP Configuration SNMP Trap Commands 3-44 Device Configuration Files and Memory Commands 3-46 Show Users (Telnet Sessions) Command 3-47 Ping Destination from Device Command 3-47 CHAPTER 4 Device Configurations and Software Images 4-1 What is Change and Configuration Management? 4-1 Set Up Change and Configuration Management 4-2 Prime Network Setup Tasks 4-3 Device Setup Tasks 4-4 Configuration Management Setup Tasks 4-5 NEIM Setup Tasks 4-6 Device Groups Setup Tasks 4-8 Use the CCM Dashboard 4-10 Device Configurations 4-11 What is In the Archive? 4-11 Protect Configurations in the Archive 4-12 Find Out What is Different Between Configurations 4-13 Copy a Configuration File to a Central Server 4-15 Are Running and Startup Configs Mismatched? (Cisco IOS and Cisco Nexus) 4-16 Contents vi Cisco Prime Network 3.10 User Guide OL-28065-01 Copy the Device Files to the Archive (Backups) 4-17 Fix a Live Device Configuration (Restore) 4-20 Clean Up the Archive 4-22 Find Out What Changed on Live Devices 4-23 Software Images 4-24 Add New Images to the Repository 4-24 New Devices: Create an Image Baseline 4-25 Distribute Images and Make Sure They Will Work 4-27 What is Upgrade Analysis? 4-28 Distribute Images to Devices 4-28 Activate Cisco IOS Software Images 4-32 Perform Cisco IOS XR Software Package Operations 4-34 Clean Up the Repository 4-41 Configuration Audit 4-42 Manage Configuration Policies 4-43 Schedule Configuration Audit 4-44 View Configuration Audit Jobs and Audit Results 4-45 Global Settings and Administration 4-47 Change Configuration Archive Global Settings 4-48 Change Image Management Global Settings 4-53 Check the Processes 4-54 Manage Jobs 4-55 User Authentication and Authorization 4-55 CHAPTER 5 Working with Prime Network Vision Maps 5-1 User Roles Required for Working with Prime Network Vision Maps 5-2 Opening and Closing Maps 5-5 Creating and Deleting Maps 5-6 Creating New Maps 5-6 Deleting Maps from the Database 5-8 Adding and Removing NEs from Maps 5-9 Managing Maps 5-11 Selecting Map Viewing Options 5-12 Applying a Background Image 5-12 Using the Overview Window 5-14 Saving Maps 5-15 Finding NEs, Services, and Links, and Elements Affected by Tickets 5-15 Working with Aggregations 5-16 Contents vii Cisco Prime Network 3.10 User Guide OL-28065-01 Grouping Network Elements into Aggregations 5-16 Viewing an Aggregation Thumbnail 5-16 Adding Elements to an Existing Aggregation 5-18 Ungrouping Aggregations 5-19 Viewing Multi Chassis Devices 5-19 Viewing Inter Rack Links 5-20 Viewing Inter Chassis Links 5-20 Working with Overlays 5-21 Applying an Overlay 5-22 Hiding and Viewing Overlays, and Removing Overlays from a Map 5-25 Filtering Links in a Map 5-25 Filtering Links During Map Creation 5-26 Filtering Links in an Existing Map 5-27 Opening the CPU Usage Graph 5-27 Communicating with Devices Using Ping and Telnet 5-28 CHAPTER 6 Working with Links 6-1 User Roles Required to Work with Links 6-1 What Are Dynamic and Static Links? 6-3 Link Discovery and Flickering Ethernet Topology Links 6-3 Viewing Link Properties 6-4 Viewing Link Properties in Prime Network Vision Maps 6-4 Viewing Link Properties in the Links View 6-8 Viewing Link Properties in the Link Properties Window 6-10 Link List Pane 6-11 Properties Pane 6-11 Ticket and Events Pane 6-12 Viewing Link Impact Analysis 6-12 Adding Static Links 6-15 Filtering Links Using the Collection Method 6-17 Selecting a Link 6-18 CHAPTER 7 Labeling NEs Using Business Tags 7-1 User Roles Required to Work with Business Tags and Business Elements 7-1 Using Chinese Characters 7-2 Attaching and Detaching Business Tags 7-3 Searching for Business Tags and Viewing Their Properties 7-4 Contents viii Cisco Prime Network 3.10 User Guide OL-28065-01 Renaming a Business Element 7-7 Deleting a Business Element 7-7 CHAPTER 8 Working with the Prime Network Events Client 8-1 User Roles Required to Work with Prime Network Events 8-1 Launching Prime Network Events 8-2 Prime Network Events Window 8-2 Prime Network Events Toolbar 8-5 Prime Network Events Menu Bar 8-6 Prime Network Events Right-Click Options 8-7 Adjusting the Prime Network Events GUI Client Settings 8-8 CHAPTER 9 Tracking Faults Using Prime Network Events 9-1 User Roles Required to Work with Prime Network Events 9-1 Viewing Events and Tickets in Cisco Prime Network Events 9-2 All Tab 9-3 System Event Tabs 9-3 Audit Tab 9-3 Provisioning Tab 9-5 Security Tab 9-6 System Tab 9-6 Network Event Tabs 9-7 Service Tab 9-7 Syslog Tab 9-8 Ticket Tab 9-8 V1 Trap Tab 9-10 V2 Trap Tab 9-10 V3 Trap Tab 9-11 Viewing 3.6.x Tabs 9-12 Working with Cisco Prime Network Events 9-14 Viewing Event Properties 9-14 Viewing Ticket Properties 9-18 Refreshing Cisco Prime Network Events Information 9-21 Filtering Events 9-22 Defining Filters 9-23 Removing Filters 9-24 Exporting Displayed Data 9-25 Contents ix Cisco Prime Network 3.10 User Guide OL-28065-01 CHAPTER 10 Working with Tickets in Cisco Prime Network Vision 10-1 What are Tickets? 10-1 User Roles Required to Work with Tickets in Prime Network Vision 10-1 Viewing Tickets and Network Events for Elements in a Map 10-3 Managing Tickets in the Tickets Tab 10-4 Understanding Ticket Status 10-6 Filtering Tickets by Network Element 10-8 Filtering Tickets by Criteria 10-8 Viewing Ticket Properties 10-10 Ticket Properties Toolbar 10-12 Details Tab 10-12 History Tab 10-13 Affected Parties Tab 10-14 Correlation Tab 10-17 Advanced Tab 10-18 Notes Tab 10-18 User Audit Tab 10-19 Managing Tickets 10-19 Finding Affected Elements 10-19 Acknowledging a Ticket 10-19 Clearing a Ticket 10-20 Removing a Ticket 10-20 Clearing and Removing Tickets 10-21 Impact Analysis in Prime Network 10-22 Status Values for Affected Parties 10-22 Accumulating Affected Parties 10-22 Accumulating the Affected Parties in an Alarm 10-23 Accumulating the Affected Parties in the Correlation Tree 10-23 Updating Affected Severity over Time 10-24 CHAPTER 11 Working with Reports 11-1 User Roles Required to Manage Reports 11-1 Using the Report Manager 11-4 Menu Options 11-6 Report Manager Toolbar 11-6 Navigation Tree 11-7 Content Pane 11-7 Right-Click Options 11-9 Contents x Cisco Prime Network 3.10 User Guide OL-28065-01 Report Categories 11-11 Events Reports 11-11 Inventory Reports 11-19 Network Service Reports 11-21 Generating Reports 11-23 Database Load and Report Generation 11-24 Report Generation Failure 11-24 Report Generation Canceled 11-24 Generating Reports from Report Manager 11-24 Generating Events Reports 11-24 Generating Inventory Reports 11-32 Generating Network Service Reports 11-35 Generating Reports from the Reports Menu 11-38 Generating Reports from Prime Network Vision 11-39 Scheduling Reports 11-39 Managing Reports 11-40 Managing the Maximum Number of Concurrent Reports 11-40 Viewing and Saving Reports 11-41 Renaming Reports 11-42 Sharing Reports 11-43 Moving Reports Between Folders 11-44 Deleting Reports 11-44 Viewing Report Properties 11-45 Defining Report Types 11-46 Managing Report Folders 11-46 Creating Folders 11-46 Moving Folders 11-47 Renaming Folders 11-47 Deleting Folders 11-48 Viewing Folder and Report Type Properties 11-48 CHAPTER 12 Using Cisco PathTracer to Diagnose Problems 12-1 User Roles Required to Work with Cisco PathTracer 12-1 Cisco PathTracer Overview 12-2 Launching Path Tracer 12-3 Cisco PathTracer Right-Click Menu Options 12-4 Starting a Path Trace 12-5 From the Map View 12-5 From Logical or Physical Inventory 12-7 Contents xi Cisco Prime Network 3.10 User Guide OL-28065-01 Examples of Launching Cisco PathTracer 12-7 Viewing Path Traces in Cisco PathTracer 12-14 Menus 12-16 Toolbar 12-17 Trace Tabs 12-18 Paths Pane 12-18 Path Trace Pane 12-18 Right-Click Menu Options 12-19 Viewing Path Trace Details 12-20 Menus 12-22 Cisco PathTracer Details Window Toolbar 12-22 Path Trace Pane 12-23 Details Pane 12-25 Saving and Opening Cisco PathTracer Map Files 12-26 Saving Cisco PathTracer Counter Values 12-26 Rerunning a Path and Comparing Results 12-27 Viewing Q-in-Q Path Information 12-27 Viewing L2TP Path Information 12-28 Using Cisco PathTracer in MPLS Networks 12-29 Cisco PathTracer MPLS Start and Endpoints 12-30 Using Cisco PathTracer for CSC Configurations 12-31 Using Cisco PathTracer for Layer 3 VPNs 12-32 Using Cisco PathTracer for Layer 2 VPNs 12-32 Using Cisco PathTracer for MPLS TE Tunnels 12-33 CHAPTER 13 Monitoring Carrier Ethernet Services 13-1 User Roles Required to Work with Carrier Ethernet Services 13-2 Viewing CDP Properties 13-6 Viewing Link Layer Discovery Protocol Properties 13-8 Viewing Spanning Tree Protocol Properties 13-10 Viewing Resilient Ethernet Protocol Properties 13-14 Viewing HSRP Properties 13-17 Viewing Access Gateway Properties 13-19 Working with Ethernet Link Aggregation Groups 13-22 Viewing Ethernet LAG Properties 13-23 Viewing mLACP Properties 13-28 Viewing Provider Backbone Bridge Properties 13-31 Contents xii Cisco Prime Network 3.10 User Guide OL-28065-01 Viewing EFP Properties 13-32 Connecting a Network Element to an EFP 13-37 Understanding EFP Severity and Ticket Badges 13-37 Viewing EVC Service Properties 13-39 Viewing and Renaming Ethernet Flow Domains 13-41 Working with VLANs and VLAN Overlays 13-44 Understanding VLAN and EFD Discovery 13-44 Understanding VLAN Elements 13-45 Switching Entities Containing Termination Points 13-49 Adding VLANs to a Map 13-49 Removing VLANs from a Map 13-52 Viewing VLAN Mappings 13-52 Working with Associated VLANs 13-54 Adding an Associated VLAN 13-54 Viewing Associated Network VLAN Service Links and VLAN Mapping Properties 13-56 Viewing VLAN Links Between VLAN Elements and Devices 13-57 Applying VLAN Overlays 13-60 Displaying or Hiding VLAN Overlays 13-61 Removing a VLAN Overlay 13-61 Viewing VLAN Service Link Properties 13-62 Viewing REP Information in VLAN Domain Views and VLAN Overlays 13-62 Viewing REP Properties for VLAN Service Links 13-63 Viewing STP Information in VLAN Domain Views and VLAN Overlays 13-65 Viewing STP Properties for VLAN Service Links 13-66 Viewing VLAN Trunk Group Properties 13-67 Viewing VLAN Bridge Properties 13-69 Using Commands to Work With VLANs 13-71 Understanding Unassociated Bridges 13-72 Adding Unassociated Bridges 13-72 Working with Ethernet Flow Point Cross-Connects 13-74 Adding EFP Cross-Connects 13-75 Viewing EFP Cross-Connect Properties 13-75 Working with VPLS and H-VPLS Instances 13-77 Working with VPLS and H-VPLS in Prime Network Vision 13-77 Adding VPLS Instances to a Map 13-78 Applying VPLS Instance Overlays 13-79 Viewing Pseudowire Tunnel Links in VPLS Overlays 13-81 Viewing VPLS-Related Properties 13-82 Viewing VPLS Instance Properties 13-83 Contents xiii Cisco Prime Network 3.10 User Guide OL-28065-01 Viewing Virtual Switching Instance Properties 13-84 Viewing VPLS Core or Access Pseudowire Endpoint Properties 13-86 Viewing VPLS Access Ethernet Flow Point Properties 13-88 Working with Pseudowires 13-89 Adding Pseudowires to a Map 13-89 Viewing Pseudowire Properties 13-92 Pinging a Pseudowire 13-95 Displaying Pseudowire Information 13-97 Viewing Pseudowire Redundancy Service Properties 13-99 Applying Pseudowire Overlays 13-101 Working with Ethernet Services 13-102 Adding Ethernet Services to a Map 13-103 Applying Ethernet Service Overlays 13-104 Viewing Ethernet Service Properties 13-106 Viewing IP SLA Responder Service Properties 13-109 Viewing IS-IS Properties 13-111 Viewing OSPF Properties 13-114 Using REP and mLACP Show Commands 13-116 Using Pseudowire Ping and Show Commands 13-116 CHAPTER 14 Monitoring Carrier Grade NAT Properties 14-1 User Roles Required to View Carrier Grade NAT Properties 14-2 Viewing Carrier Grade NAT Properties in Logical Inventory 14-2 Viewing Carrier Grade NAT Properties in Physical Inventory 14-5 Using CG NAT Configure, Delete, and Show Commands 14-6 CHAPTER 15 Monitoring DWDM Properties 15-1 User Roles Required to View DWDM Properties 15-1 Viewing DWDM in Physical Inventory 15-3 Viewing G.709 Properties 15-5 Viewing Performance Monitoring Configuration 15-11 Using IPoDWDM Configuration and Show Commands 15-15 CHAPTER 16 Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties 16-1 User Roles Required to View Ethernet OAM Tool Properties 16-1 Ethernet OAM Overview 16-2 Viewing Connectivity Fault Management Properties 16-3 Contents xiv Cisco Prime Network 3.10 User Guide OL-28065-01 Using CFM Configure and Enable Commands 16-10 Viewing Ethernet LMI Properties 16-16 Using E-LMI Configure and Enable Commands 16-20 Viewing Link OAM Properties 16-20 Using L-OAM Configuration, Assign, Enable, and Show Commands 16-25 CHAPTER 17 Monitoring Y.1731 IPSLA Configuration 17-1 Y.1731 Technology - An Overview 17-1 Y.1731 Performance Management Mechanisms 17-1 User Roles Required to Work with Y.1731 Probes 17-2 Working with Y.1731 IPSLA Configurations 17-2 Viewing the Y.1731 Probe Properties 17-2 Configuring Y.1731 Probes 17-4 Configure Probe Endpoint Association 17-5 Configure Profile 17-5 Create On Demand Probe Configuration 17-7 Deassociate Profile 17-10 Delete Profile 17-10 Configure IP SLA Parameters 17-11 Delete IP SLA 17-12 Diagnosing Y.1731 Probes 17-13 Show SLA Operations Detail 17-13 Show SLA Profiles 17-13 Show IP SLA 17-14 CHAPTER 18 IPv6 and IPv6 VPN over MPLS 18-1 User Roles Required to Work with IPv6 and 6VPE 18-2 Viewing IPv6 Information 18-2 CHAPTER 19 Monitoring MPLS Services 19-1 User Roles Required to Work with MPLS Networks 19-1 Working with MPLS-TP Tunnels 19-4 Adding an MPLS-TP Tunnel 19-5 Viewing MPLS-TP Tunnel Properties 19-7 Viewing LSPs Configured on an Ethernet Link 19-11 Viewing LSP Endpoint Redundancy Service Properties 19-13 Applying an MPLS-TP Tunnel Overlay 19-16 Viewing VPNs 19-18 Contents xv Cisco Prime Network 3.10 User Guide OL-28065-01 Viewing Additional VPN Properties 19-20 Managing VPNs 19-21 Creating a VPN 19-21 Adding a VPN to a Map 19-22 Removing a VPN from a Map 19-23 Moving a Virtual Router Between VPNs 19-23 Working with VPN Overlays 19-24 Applying VPN Overlays 19-24 Managing a VPN Overlay Display in the Map View 19-25 Displaying VPN Callouts in a VPN Overlay 19-25 Monitoring MPLS Services 19-26 Viewing VPN Properties 19-26 Viewing Site Properties 19-27 Viewing VRF Properties 19-27 Viewing VRF Multicast Configuration details 19-30 Using Commands to Work With VRF 19-31 Viewing VRF Egress and Ingress Adjacents 19-31 Viewing Routing Entities 19-32 Using Commands to Configure IP Interfaces 19-34 Viewing the ARP Table 19-35 Viewing the NDP Table 19-36 Viewing Rate Limit Information 19-38 Viewing VRRP Information 19-39 Viewing Label Switched Entity Properties 19-41 Multicast Label Switching 19-44 Viewing MP-BGP Information 19-47 Using Commands to Work With MP-BGP 19-48 Viewing 6rd Tunnel Properties 19-48 Viewing BFD Session Properties 19-50 Viewing Cross-VRF Routing Entries 19-52 Viewing Pseudowire End-to-End Emulation Tunnels 19-53 Viewing MPLS TE Tunnel Information 19-55 MPLS-TP Commands 19-56 Locking/Unlocking MPLS-TP Tunnels in Bulk 19-57 CHAPTER 20 Viewing IP and MPLS Multicast Configurations 20-1 IP and MPLS Multicast Configuration - An Overview 20-1 User Roles Required to View IP and Multicast Configurations 20-2 Viewing the Multicast Configurations 20-2 Contents xvi Cisco Prime Network 3.10 User Guide OL-28065-01 Viewing Multicast Node 20-2 Viewing Multicast Protocols 20-4 Viewing the Address Family (IPv4) Profile 20-4 Viewing the Address Family (IPv6) Profile 20-5 Viewing the IGMP profile 20-5 Viewing the PIM Profile 20-7 Multicast Label Switching 20-9 Multicast Routing Entities 20-10 CHAPTER 21 Monitoring MToP Services 21-1 User Roles Required to Work with MToP 21-1 Viewing SAToP Pseudowire Type in Logical Inventory 21-2 Viewing CESoPSN Pseudowire Type in Logical Inventory 21-3 Viewing Virtual Connection Properties 21-5 Viewing ATM Virtual Connection Cross-Connects 21-6 Viewing ATM VPI and VCI Properties 21-10 Viewing Encapsulation Information 21-11 Viewing IMA Group Properties 21-13 Viewing TDM Properties 21-17 Viewing Channelization Properties 21-18 Viewing SONET/SDH Channelization Properties 21-19 Viewing T3 DS1 and DS3 Channelization Properties 21-22 Viewing MLPPP Properties 21-27 Viewing MLPPP Link Properties 21-30 Viewing MPLS Pseudowire over GRE Properties 21-32 Network Clock Service Overview 21-35 Monitoring Clock Service 21-35 Monitoring PTP Service 21-37 Viewing Pseudowire Clock Recovery Properties 21-42 Viewing SyncE Properties 21-46 Applying a Network Clock Service Overlay 21-49 Viewing CEM and Virtual CEM Properties 21-50 Viewing CEM Interfaces 21-51 Viewing Virtual CEMs 21-51 Viewing CEM Groups 21-51 Viewing CEM Groups on Physical Interfaces 21-52 Viewing CEM Groups on Virtual CEM Interfaces 21-53 Using SONET Configure, Clear, and Show Commands 21-54 Contents xvii Cisco Prime Network 3.10 User Guide OL-28065-01 CHAPTER 22 Viewing and Managing SBCs 22-1 User Roles Required to View SBC Properties 22-2 Viewing SBC Properties in Logical Inventory 22-3 Viewing SBC DBE Properties 22-5 Viewing Media Address Properties 22-5 Viewing VDBE H.248 Properties 22-5 Viewing SBC SBE Properties 22-6 Viewing AAA Properties 22-7 Viewing H.248 Properties 22-7 Viewing Policy Properties 22-8 Viewing SIP Properties 22-12 SBC Configuration and Monitoring Commands 22-14 Add, Update, and Delete SBC Components 22-15 SIP Adjacencies 22-15 SIP Header Profiles 22-20 SIP Option Profiles 22-24 Blacklists 22-26 CAC Policies 22-28 Call Policies 22-32 Codec Lists 22-36 Media Addresses 22-37 Qos Profiles 22-38 SBC Show Commands 22-39 CHAPTER 23 Monitoring AAA Configurations 23-1 Supported Network Protocols 23-1 Viewing AAA Configurations in Prime Network Vision 23-2 Viewing AAA Group Profile 23-2 Viewing Dynamic Authorization Profile 23-3 Viewing Radius Global Configuration Details 23-4 Viewing AAA Configuration Details for an AAA group 23-5 Viewing Diameter Configuration Details for an AAA group 23-6 Viewing Radius Configuration Details for an AAA Group 23-7 Viewing Radius Accounting Configuration Details for an AAA group 23-7 Viewing the Radius Keepalive and Detect Dead Server Configuration Details for an AAA group 23-8 Viewing the Radius Authentication Configuration Details for an AAA group 23-9 Viewing the Charging Configuration Details for an AAA group 23-10 Viewing the Charging Trigger Configuration Details for an AAA group 23-11 Contents xviii Cisco Prime Network 3.10 User Guide OL-28065-01 Working with AAA Commands 23-12 CHAPTER 24 Monitoring IP Pools 24-1 Viewing the IP Pool Properties 24-1 Working With the IP Pool Commands 24-3 CHAPTER 25 Monitoring BNG Configurations 25-1 Broadband Network Gateway (BNG) - An Overview 25-1 User Roles Required to Work With BNG 25-2 Working with BNG Configurations 25-3 View Broadband Access (BBA) Groups 25-3 View Subscriber Access Points 25-5 Diagnose Subscriber Access Points 25-6 View Dynamic Host Configuration Protocol (DHCP) Service Profile 25-7 View Dynamic Config Templates 25-9 Viewing the Settings for a PPP Template 25-11 Viewing Policy Container 25-12 Viewing QoS Profile 25-15 CHAPTER 26 Monitoring Mobile Technologies 26-1 User Roles Required to Work with Mobile Technologies 26-1 GPRS/UMTS Networks - An Overview 26-4 Working With GPRS/UMTS Network Technologies 26-5 Working with GGSN 26-5 Viewing GGSN Properties 26-6 Viewing Additional Characteristics of a GGSN 26-7 GGSN Commands 26-9 Working with GTPU 26-10 Viewing GTPU Properties 26-10 GTPU Commands 26-11 Working with APN 26-12 Viewing APN Properties 26-13 Viewing Additional Characteristics of an APN 26-18 APN Commands 26-23 Working with GTPP 26-24 Viewing GTPP Properties 26-25 Viewing Additional Characteristics of a GTPP 26-26 GTPP Commands 26-30 Contents xix Cisco Prime Network 3.10 User Guide OL-28065-01 Working with EGTP 26-31 Viewing EGTP Properties 26-31 EGTP Commands 26-32 LTE Networks - An Overview 26-33 Working with LTE Network Technologies 26-34 Monitoring SAE-GW 26-34 Viewing SAE-GW Properties 26-35 Working with PDN-Gateway 26-36 Viewing P-GW Properties 26-36 P-GW Commands 26-37 Working with Serving Gateway 26-38 Viewing S-GW Properties 26-38 S-GW Commands 26-40 Viewing QCI-QoS Mapping 26-40 Viewing Operator Policies, APN Remaps, and APN Profiles 26-41 Viewing Operator Policies 26-42 Viewing APN Remaps 26-44 Viewing APN Profiles 26-46 Viewing Additional Characteristics of an APN Profile 26-50 Working with Active Charging Service 26-52 Viewing Active Charging Services 26-54 Viewing Content Filtering Categories 26-56 Viewing Credit Control Properties 26-56 Viewing Charging Action Properties 26-59 Viewing Rule Definitions 26-62 Viewing Rule Definition Groups 26-63 Viewing Rule Base for the Charging Action 26-64 Viewing Bandwidth Policies 26-66 Viewing Fair Usage Properties 26-67 ACS Commands 26-67 Using Commands to Configure and View Mobile Technologies under a Context 26-68 CHAPTER 27 Monitoring Data Center Configurations 27-1 Virtual Port Channel (vPC) 27-1 Viewing Virtual Port Channel Configuration 27-3 Working with the vPC Commands 27-4 Cisco FabricPath 27-5 Viewing Cisco FabricPath Configuration 27-6 Working with the Cisco FabricPath Commands 27-8 Contents xx Cisco Prime Network 3.10 User Guide OL-28065-01 Virtualization 27-8 Viewing Virtual Data Centers 27-9 Viewing the Data Stores of a Data Center 27-10 Viewing the Host Servers of a Data Center 27-10 Viewing the Virtual Machines of a Data Center 27-13 APPENDIX A Icon and Button Reference A-1 Icons A-1 Network Element Icons A-2 Business Element Icons A-4 Logical Inventory Icons A-6 Physical Inventory Icons A-9 Links A-9 Link Icons A-9 Link Colors A-10 Link Characteristics A-11 Severity Icons A-12 Buttons A-12 Prime Network Vision Buttons A-13 Table Buttons A-15 Link Filtering Buttons A-16 Prime Network Events Buttons A-16 Ticket Properties Buttons A-17 Report Manager Buttons A-17 Badges A-18 VNE Communication State Badges A-18 VNE Investigation State Badges A-19 Network Element Technology-Related Badges A-20 Alarm and Ticket Badges A-21 GLOSSARY I NDEX xxi Cisco Prime Network 3.10 User Guide OL-28065-01 Preface This document describes Cisco Prime Network (Prime Network) 3.10. Prime Network serves as an extensible integration platform for network and service management. At its core is a virtual network mediation model that is rich, open, and vendor-neutral, and supports the management of diverse multiservice and multivendor networks. Additionally, Prime Network provides the following mature NMS functionality: • Network topology discovery and visualization. • Element management, providing near real-time inventory. • Fault management, event correlation, root cause analysis and troubleshooting. • Network service support. This preface contains the following sections: • Audience, page xxi • Document Organization, page xxii • Conventions, page xxiv • Related Documentation, page xxv • Obtaining Documentation and Submitting a Service Request, page xxv Audience The intended audience for this documentation includes: • Network viewers who monitor the network and perform basic (nonprivileged) system functions. • Network operators who perform day-to-day operations such as creating business tags and maps, and managing alarms. • Network configurators who activate services and configure network elements. • System administrators who manage and configure users, network elements, the Prime Network system, and overall security. • System managers or administrators who periodically review and manage the events list using Cisco Prime Network Events (Prime Network Events). • Networking engineers who are interested in understanding how the Prime Network Events fault and root cause analysis mechanism works. These engineers should have networking knowledge at Cisco Certified Network Associate (CCNA) level, and should have received Cisco Prime Network Vision (Prime Network Vision) basic and administrative training. xxii Cisco Prime Network 3.10 User Guide OL-28065-01 Preface Document Organization This guide contains the following sections: Chapter and Title Description Chapter 1, “The Prime Network GUI Clients” Describes the suite of GUI tools that offer an intuitive interface for managing the network and services, and for performing required system administration activities. Chapter 2, “Working with the Cisco Prime Network Vision Client” Describes the user access roles required to use Prime Network Vision, the Prime Network Vision working environment, and how to access Prime Network Vision tools and commands. Chapter 3, “Viewing and Managing NE Properties” Describes the user access roles required to use Prime Network Vision and how to view network element physical and logical properties in any mapped network. Chapter 4, “Device Configurations and Software Images” Describes the features that Change and Configuration Management provides, some initial setup tasks you must perform, and how to work with the GUI. Chapter 5, “Working with Prime Network Vision Maps” Describes how to work with the topological maps displayed in the content pane of the Prime Network Vision window. Chapter 6, “Working with Links” Describes how to view information about static and dynamic links using the Prime Network Vision user interface. Chapter 7, “Labeling NEs Using Business Tags” Describes how to manage and view Prime Network Vision business tags and business elements. Chapter 8, “Working with the Prime Network Events Client” Describes the Prime Network Events application and the options you can use to view system events and tickets that are generated within the Prime Network system. Chapter 9, “Tracking Faults Using Prime Network Events” Describes how to use Prime Network Events to track faults. Chapter 10, “Working with Tickets in Cisco Prime Network Vision” Describes viewing tickets in Prime Network Vision, how to manage tickets that represent fault scenarios of selected devices or network elements, and fault impact analysis. Chapter 11, “Working with Reports” Describes how to use Prime Network Report Manager to generate, customize, view, and export a variety of reports about events, traps, tickets, syslogs, software versions, elements, and network services. xxiii Cisco Prime Network 3.10 User Guide OL-28065-01 Preface Chapter 12, “Using Cisco PathTracer to Diagnose Problems” Describes how to perform end-to-end route tracing and the performance information displayed simultaneously for the multiple networking layers. Chapter 13, “Monitoring Carrier Ethernet Services” Describes how to view Carrier Ethernet services in Prime Network Vision and how to work with VLANs, pseudowires, overlays, VPLS instances, and Ethernet services. Chapter 14, “Monitoring Carrier Grade NAT Properties” Describes the Carrier Grade Name Address Translation (NAT) properties available in Prime Network Vision. Chapter 15, “Monitoring DWDM Properties” Describes how to view and monitor IP over dense wavelength division multiplexing (DWDM) properties in Prime Network Vision. Chapter 16, “Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties” Describes how to use Prime Network Vision to monitor Ethernet operations, administration, and maintenance (OAM) tools. Chapter 17, “Monitoring Y.1731 IPSLA Configuration” Describes how to view Y.1731 IP Service Level Agreement (SLA) configurations for the OAM functionality in Ethernet networks. Chapter 18, “IPv6 and IPv6 VPN over MPLS” Describes how to use Prime Network Vision to view IPv6 and 6PVE properties. Chapter 19, “Monitoring MPLS Services” Describes how to view and manage aspects of Multiprotocol Label Switching (MPLS) services using Prime Network Vision, including the MPLS service view, business configuration, and maps. This chapter also describes the inventory properties specific to MPLS VPNs, including routing entities, label switched entities (LSEs), BGP neighbors, Multiprotocol BGP (MP-BGP), VRF instances, pseudowires, and traffic engineering (TE) tunnels. Chapter 20, “Viewing IP and MPLS Multicast Configurations” Describes how to view multicast configurations and how Prime Network Vision supports multicast on MPLS and routing entities. Chapter 21, “Monitoring MToP Services” Describes Mobile Transport over Packet (MToP) services and how to view their properties in Prime Network Vision. Chapter 22, “Viewing and Managing SBCs” Describes the Session Border Controller (SBC) properties available in Prime Network Vision. Chapter 23, “Monitoring AAA Configurations” Describes how to view Authentication, Authorization, and Accounting (AAA) configuration, which is a security architecture for distributed systems that determines the access given to users for specific services and the amount of resources they have used. Chapter and Title Description xxiv Cisco Prime Network 3.10 User Guide OL-28065-01 Preface Conventions This document uses the following conventions: Chapter 24, “Monitoring IP Pools” Describes how to view IP pool properties in Prime Network Vision. An IP pool is a sequential range of IP addresses within a certain network. Prime Network provides the flexibility of assigning IP addresses dynamically for services running on a network element. Chapter 25, “Monitoring BNG Configurations” Describes how to view Broadband Network Gateway (BNG) configuration in Prime Network Vision. Chapter 26, “Monitoring Mobile Technologies” Describes how to configure and view the mobile technologies in Prime Network Vision. Chapter 27, “Monitoring Data Center Configurations” Describes the Data Center components and how to view their configurations in Prime Network Vision. Appendix A, “Icon and Button Reference” Identifies the icons and buttons used in Prime Network Events and Prime Network Vision. Chapter and Title Description Table 1 Conventions Convention Description string A string is a nonquoted set of characters. For example, when setting an SNMP community string to public, do not use quotation marks around the string, or the string will include the quotation marks. ^ or Ctrl ^ or Ctrl represents the Control key. For example, the key combination ^D or Ctrl-D means hold down the Control key while you press the D key. Alphabetic character keys are indicated in capital letters but are not case sensitive. < > Angle brackets show nonprinting characters, such as passwords. ! An exclamation point at the beginning of a line indicates a comment line. [ ] Square brackets show optional elements. {} Braces group alternative, mutually exclusive elements that are part of a required choice. | A vertical bar, also known as a pipe, separates alternative, mutually exclusive elements of a choice. boldface font Button names, commands, keywords, and menu items. boldface screen font Courier bold shows an example of text that you must enter. italic font Variables for which you supply values. italic screen font Variables you enter. xxv Cisco Prime Network 3.10 User Guide OL-28065-01 Preface Related Documentation Note We sometimes update the documentation after original publication. Therefore, you should also review the documentation on Cisco.com for any updates. For a complete list of Prime Network 3.10 documentation, see the Cisco Prime Network 3.10 Documentation Guide. Cisco Prime Network 3.10 Integration Developer Guide is available on the Cisco Prime Network Technology Center website. This guide describes how to use Prime Network integration interfaces. The Prime Network Technology Center is an online resource for additional downloadable Prime Network support content, including help for integration developers who use Prime Network application programming interfaces (APIs). It provides information, guidance, and examples to help you integrate your applications with Prime Network. It also provides a platform for you to interact with subject matter experts. To view the information on the Prime Network Technology Center website, you must have a Cisco.com account with partner level access, or you must be a Prime Network licensee. You can access the Prime Network Technology Center at http://developer.cisco.com/web/prime-network/home. Obtaining Documentation and Submitting a Service Request For information on obtaining documentation, submitting a service request, and gathering additional information, see the monthly What’s New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at: http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html Subscribe to the What’s New in Cisco Product Documentation as an RSS feed and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free service. Cisco currently supports RSS Version 2.0. screen font Courier plain shows an example of information displayed on the screen. Option > Network Preferences Choosing a menu item. Table 1 Conventions (continued) Convention Description xxvi Cisco Prime Network 3.10 User Guide OL-28065-01 Preface CHAPTER 1-1 Cisco Prime Network 3.10 User Guide OL-28065-01 1 The Prime Network GUI Clients These topics introduce you to the Cisco Prime Network GUI clients: • Overview of the GUI Clients, page 1-1 • Using Prime Network with Prime Central, page 1-2 Overview of the GUI Clients Cisco Prime Network (Prime Network) provides the following GUI clients that offer an intuitive interface for managing your network and services, and for performing required system administration activities: • Prime Network Vision, page 1-1 • Prime Network Events, page 1-2 • Prime Network Administration, page 1-2 Prime Network Vision Prime Network Vision is the main GUI client for Prime Network. Maps of devices create a visualization of the network, from the intricacies of a single device physical and logical inventory, to multi-layer topological information on connections, traffic, and routes. Faults and alarms are graphically displayed with built-in troubleshooting tools. Network elements and links using color cues and graphic symbols to indicate status and alarms. All user actions are controlled by user roles and device scopes. Each user is assigned a role which controls the GUI actions the user can perform. When a user does not have the required permission level to perform a function, the appropriate menu option or button is disabled. Similarly, device scopes, which are named collections of managed network elements, control which devices a user can access. User roles and device scopes are controlled from the Prime Network Administration GUI client. Prime Network Vision is also the launching point for these features. Feature Provides this function: Described in: Path Tracer Route tracing and performance Chapter 12, “Using Cisco PathTracer to Diagnose Problems.” Change and Configuration Management Manage software images and device configuration files Chapter 4, “Device Configurations and Software Images” 1-2 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 1 The Prime Network GUI Clients Using Prime Network with Prime Central For more information on the Prime Network Vision GUI client, see Working with the Cisco Prime Network Vision Client, page 2-1. Prime Network Events Prime Network Events is the interface used by system managers and administrators for viewing system events that occur in the network. You can use the GUI to retrieve detailed information about the different types of system events and tickets that are generated; it also helps predict and identify the sources of system problems. The GUI client also provides information about events within the Prime Network system. For more information, see Working with the Prime Network Events Client, page 8-1. Prime Network Administration Prime Network Administration is the GUI client used to manage the Prime Network system, which is comprised of gateway servers, units, AVMs, and VNEs. These components work together to create the information model, which is constantly updated. Administrators use this GUI client to create user accounts, device scopes, polling groups, redundancy settings, and so forth. For information on this GUI client, see the Cisco Prime Network 3.10 Administrator Guide. Using Prime Network with Prime Central Prime Network can be installed as a standalone product or with Cisco Prime Central. When installed with Cisco Prime Central, you can launch Prime Network GUI clients from the Cisco Prime Portal. Cross-launch to and from other suite applications is also supported. The applications share a common inventory. The Cisco Prime Portal uses a single sign-on (SSO) mechanism so that users need not reauthenticate with each GUI client. All session management features are controlled by the portal (such as client timeouts). If a user tries to log into a standalone GUI client, the user will be redirected to the portal login. The only exception is the emergency user, who will still be allowed to log into a standalone GUI client. If the Cisco Prime Performance Manager application is also installed, the Prime Network Event Collector will receive threshold crossing alarm (TCA) events from Prime Performance Manager components and generate a ticket that you can view in Prime Network Events. Report Manager Set up regular reports Chapter 11, “Working with Reports.” Soft Properties Manager Extend what is displayed in the GUI clients and monitored by Prime Network, and create new TCAs Cisco Prime Network 3.10 Customization Guide Command Builder Create new device commands and add them to the GUI client Cisco Prime Network 3.10 Customization Guide Workflow Create a series of sequential device tasks and add them to the GUI client Cisco Prime Network 3.10 Customization Guide Activation Create wizards and add them to the GUI client Cisco Prime Network 3.10 Customization Guide Feature Provides this function: Described in: 1-3 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 1 The Prime Network GUI Clients Using Prime Network with Prime Central Prime Network also receives EPM-MIB traps from the network. By default Prime Network receives EPM-MIB traps from any source in the network. If desired, you can configure Prime Network to only process EPM-MIB traps arriving from a specific Prime Performance Manager server. The instructions for doing this are provided on the Cisco Developer Network at http://developer.cisco.com/web/prime-network/home. 1-4 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 1 The Prime Network GUI Clients Using Prime Network with Prime Central CHAPTER 2-1 Cisco Prime Network 3.10 User Guide OL-28065-01 2 Working with the Cisco Prime Network Vision Client The following topics describe the user access roles required to use Cisco Prime Network Vision (Prime Network Vision), the Prime Network Vision working environment, and how to access the Prime Network Vision tools and commands: • User Roles Required to Work with Basic Operations in Prime Network Vision, page 2-1 • Launching Prime Network Vision, page 2-2 • Changing Your GUI Client Password, page 2-3 • The Prime Network Vision Window, page 2-3 • Prime Network Vision Status Indicators, page 2-16 • Prime Network Vision Toolbar, page 2-22 • Prime Network Vision Menu Bar, page 2-24 • Prime Network Vision Right-Click Menus, page 2-29 • Adjusting the Prime Network Vision GUI Client Settings, page 2-39 • Filtering and Sorting Tabular Content, page 2-40 User Roles Required to Work with Basic Operations in Prime Network Vision Table 2-1 identifies the GUI default permission or device scope security level that is required to work with Prime Network Vision. Prime Network Vision determines whether you are authorized to perform a task as follows: • For GUI-based tasks (tasks that do not affect devices), authorization is based on the default permission that is assigned to your user account. • For element-based tasks (tasks that do affect elements), authorization is based on the default permission that is assigned to your account. That is, whether the element is in one of your assigned scopes and whether you meet the minimum security level for that scope. For more information on user authorization, see the Cisco Prime Network 3.10 Administrator Guide. By default, users with the Administrator role have access to all managed elements. To change the Administrator user scope, see the topic on device scopes in the Cisco Prime Network 3.10 Administrator Guide. 2-2 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 2 Working with the Cisco Prime Network Vision Client Launching Prime Network Vision Launching Prime Network Vision Prime Network Vision is password protected to ensure security. Before you start working with Prime Network Vision, make sure you know your username and password. If you use the standalone application, you also need to know the Prime Network Vision gateway IP address or hostname. • Launch Prime Network Vision from Prime Central—Choose Assure > Prime Network > Vision in the menu bar. The Prime Network Vision application is opened in a separate window. For information on Prime Central, see the Cisco Prime Central User Guide. • Launch Prime Network Vision as a Standalone Application—Choose Start > Programs > Cisco Prime Network > gateway IP address > Cisco Prime Network Vision, and enter your username and password. If any client updates are available, Prime Network automatically installs them. If you see messages that say the server and client have different versions of the application, you need to update your client as described in the Cisco Prime Network 3.10 Installation Guide. Once the GUI client is displayed, open an existing map or create a new one; see Working with Prime Network Vision Maps, page 5-1. After logging into Prime Network Vision and launching the application, you can customize the Prime Network Vision settings. For example, you can: • Load the content pane with information when starting Prime Network Vision. • Display network elements in the Prime Network Vision content pane and navigation pane. • Configure audio responses when different alarms are triggered. • Specify the length of time that events should be displayed in the inventory window. For more information on customizing Prime Network Vision startup and display options, see Adjusting the Prime Network Vision GUI Client Settings, page 2-39. Table 2-1 Default Permission/Security Level Required for the Basic Prime Network Vision Functions Task Viewer Operator OperatorPlus Configurator Administrator Start Prime Network Vision XXX X X Change a user password in Prime Network Vision —1 —1 —1 —1 X1 1. Each user can change their own password, but only the Administrator role can change another user’s password. Set Prime Network Vision options XXX X X Work with Prime Network Vision tables XXX X X 2-3 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 2 Working with the Cisco Prime Network Vision Client Changing Your GUI Client Password Changing Your GUI Client Password The method used to change your password depends on whether authentication is provided by Prime Network or an LDAP server. If you can see the Tools > Change User Password choice in the Prime Network Vision menu, the system is using authentication provided by Prime Network. You can change your password by entering the old and new passwords. If the menu choice is disabled, the system is using an external authentication method. To change your password, contact your administrator. For more information about user authentication, see the Cisco Prime Network 3.10 Administrator Guide. The Prime Network Vision Window Figure 2-1 displays the Prime Network Vision window with an open map. Tip The ticket pane can be displayed or hidden by clicking the arrows below the navigation pane (see Callout 7 in Figure 2-1). 2-4 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 2 Working with the Cisco Prime Network Vision Client The Prime Network Vision Window Figure 2-1 Prime Network Vision Window Prime Network Vision Inventory Tabs Prime Network Vision includes the following inventory tabs: • Network Elements—Lists all network elements with the information described in Table 2-7, Network Element Information Displayed in List View. If there are tickets associated with the element, an icon is displayed. The color of the icon indicates the ticket severity. • Ethernet Flow Domains—Lists all Ethernet flow domains, including the domain name, the system-defined domain name, and a brief description for each domain. For more information about Ethernet flow domains, see Viewing and Renaming Ethernet Flow Domains, page 13-41. • VTP Domains—Lists all VTP domains. For more information about VTP domains, see Viewing VLAN Trunk Group Properties, page 13-67. 1 GUI client menu bar 5 GUI client status bar (amount of memory used by client and gateway connection status) 2 GUI client toolbar 6 List of tickets on selected item 3 Active map and inventory tabs 7 Toggle to hide/display ticket pane 4 Map view (content pane) 8 Inventory window (navigation pane) 2-5 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 2 Working with the Cisco Prime Network Vision Client The Prime Network Vision Window • Virtual Machines—Lists all the virtual machines. For more information about virtual machines, see Viewing the Virtual Machines of a Data Center, page 27-13. If there are tickets associated with the virtual machine, an icon is displayed. The color of the icon indicates the ticket severity. To open an inventory tab, choose Network Inventory in the menu bar, and choose the required option. The selected inventory table is displayed as shown in Figure 2-2. Figure 2-2 Prime Network Vision Inventory Tabs Prime Network Vision Maps You can create as many maps as required to represent the network views you need. For example, maps can include specific network segments, customer networks, or the particular network elements and services that you require. Each map has three major areas: • A tee-and-branch representation of the network elements and aggregations in the current map. For more information, see Navigation Pane, page 2-6. • A large area showing the map elements and links in a map (topological layout) or in list format. For more information, see Content Pane: Map, List, and Links Views, page 2-7. • A table of tickets associated with elements displayed in the map. For more information, see Ticket Pane, page 2-16. 2-6 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 2 Working with the Cisco Prime Network Vision Client The Prime Network Vision Window Opening Maps You can open up to five maps at one time. To open a map, choose File > Open Map. The Open Map dialog box is displayed (see Figure 2-3). Figure 2-3 Open Map Dialog Box A check mark in the Opened column indicates that the map is already open. Map tabs display the root node icon and name. In addition, the icon color reflects the highest severity ticket that is not cleared in the map, and an alarm icon indicates the severity of the highest severity ticket that is not acknowledged. For more information about maps, see Working with Prime Network Vision Maps, page 5-1. You can open up to eight tabs at one time. Navigation Pane The navigation pane displays a tree-and-branch representation of the network elements and aggregations defined for the loaded map. The highest level in the navigation tree displays root node icon with the map name. When the map name is changed, the Prime Network Vision window is updated, and the new map name is displayed at the top of the navigation tree and in the window title bar. The lowest level of the navigation tree displays a single network element or service, such as a port, Ethernet flow point, or bridge. 2-7 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 2 Working with the Cisco Prime Network Vision Client The Prime Network Vision Window The navigation pane can include up to two icons for each element. These icons can include alarm icons, communication or investigation state icons, and badges, as shown in Figure 2-4. Alarm icons are always displayed next to the element icon. Figure 2-4 Navigation Pane with Icons For information about the status of network objects, see Prime Network Vision Status Indicators, page 2-16. Content Pane: Map, List, and Links Views The content pane enables you to view and modify low-level information. It supports the following views: • Map view—Displays managed network elements on a geographical map. For more information, see Map View, page 2-7. • List view—Displays the details of the network elements contained in the currently selected hierarchy or subnetwork (map), such as the IP address and system name. For more information, see List View, page 2-11. • Links view—Displays a complete list of the links in the map view and their status. For more information, see Links View, page 2-14. Map View Click Show Map View on the toolbar to display the map view in the Prime Network Vision window. In the map view, Prime Network Vision displays: • Aggregations • Managed network elements – Each network element is displayed as an icon, the color of which reflects severity, as described in Alarm Indicators, page 2-11. – Depending on the size of the icon, additional information can be displayed. For more information, see Information Available in Element Icons, page 3-3. • Ethernet flow point cross-connects • Ethernet services • MPLS-TP tunnels • Pseudowires • VLANs • VPLS instances • VPNs 2-8 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 2 Working with the Cisco Prime Network Vision Client The Prime Network Vision Window • Links – Service and business links are represented as well as physical and topological links. – Unidirectional links include arrowheads that indicate the direction of the flow, while bidirectional links do not have arrowheads. • Relationships between network elements, aggregations, and networks You can move network elements manually on the map by dragging the required icon. You can also click Layout Map in the toolbar or use your mouse to change the way the elements are displayed on the map. For more information about working with maps, see Chapter 5, “Working with Prime Network Vision Maps.” Element Icons To view icons more easily, zoom in with your mouse. Four sizes are supported. Table 2-2 provides examples of each. For more details about data this is displayed, see Information Available in Element Icons, page 3-3. Prime Network Vision also provides additional features for working with aggregations. For more information, see Working with Aggregations, page 5-16. The following tables identify some of the icons used to represent network elements and business elements in the Prime Network Vision window’s navigation pane and content pane: • Table 2-3, Network Element Icons • Table 2-4, Business Element Icons Table 2-2 Prime Network Vision Element Icon Sizes Example Icon Name and Description Tiny—Elements are displayed as dots. Alarm severity is indicated by colors. Normal—Elements are displayed with icons and names. Alarms include badges. Alarm severity is represented by colors. Large—Same as Normal, with additional NE properties. You can also perform cut-and-paste operations by pressing and dragging the mouse scroll wheel over the text. Huge—Same as Normal, with additional action buttons. 2-9 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 2 Working with the Cisco Prime Network Vision Client The Prime Network Vision Window For a complete list of the icons and their descriptions, see Appendix A, “Icon and Button Reference.” Table 2-3 Network Element Icons Icon Network Element Icon Network Element Access pseudowire Router Cloud ATM switch Digital subscriber line access multiplexer (DSLAM) Basic rate access (BRA) Ethernet switch Cisco 7600 series router Generic SNMP device Cisco ASR 1000 series router Ghost, or unknown device Cisco ASR 5000 series router ICMP device Cisco ASR 9000 series router Lock, or security violation; viewable by a user with a higher permission level Cisco CRS series router Missing icon or ghost NE (the NE was deleted and is no longer managed, or there is no icon for this NE) Cisco MWR 3941 Sun Netra server Cisco Nexus 1000 series devices Service control switch Cisco IOS XR 12000 series router WiFi element Cisco Unified Computing System (UCS) 2-10 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 2 Working with the Cisco Prime Network Vision Client The Prime Network Vision Window Links Prime Network Vision maps contain graphical links that can represent multiple physical, topological, service, and business links. The maximum number of graphical links that can be displayed is specified in the registry. If the number of graphical links exceeds the specified limit, a warning message with a Refresh button is displayed, and the map is surrounded by a red border. The presence of a red border around a map indicates that some links exist that are not displayed in the map. Table 2-4 Business Element Icons Icon Business Element Icon Business Element Aggregation or root node Network Traffic Profile (TP) tunnel Backup pseudowire edge Network VLAN Connection termination point (TP) Ethernet flow point (EFP) MToP service Pseudowire edge EFP cross-connect Pseudowire switching entity Ethernet service Subnet Ethernet virtual connection (EVC) Switching entity Label-Switched Path (LSP) endpoint TP tunnel endpoint LSP midpoint VPLS forward Missing icon or ghost NE (the NE was deleted and is no longer managed, or there is no icon for this NE) VPLS instance Network LSP Protected LSP Working LSP VPN Network pseudowire 2-11 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 2 Working with the Cisco Prime Network Vision Client The Prime Network Vision Window To reduce the number of graphical links in a map, click Link Filter in the toolbar, and uncheck the check boxes for the links you do not need to view. Links in maps have tooltips that provide you with information regarding the link endpoints and the number of links represented by the selected link in the map. Click the link tooltip to view additional information about the link in a link quick view window. Click Properties in the link quick view window to open the link properties window. For more information about viewing link properties, see Viewing Link Properties in Prime Network Vision Maps, page 6-4. Note If you apply a link filter to the map, the link tooltip displays only the relevant links. Alarm Indicators Table 2-5 shows the colors that are used to display the severity (or propagated severity) of a network element. The same coloring conventions apply to the link severities. Note The color of a selected link can be customized. The default color is blue. Right-Click Functions Many functions can be performed by using the right-click menu in the map view, including launching external applications or tools. Some of these functions are also available in the navigation pane, links view, and ticket pane. The specific options that are available in the right-click menu depend on whether you select a network element, click in the map background, select an aggregation, or select a ticket in the ticket pane. For details on the specific right-click options that are available for each scenario, see Prime Network Vision Right-Click Menus, page 2-29. List View Click Show List View in the toolbar to display the Prime Network Vision list view. The list view displays the tabs described in Table 2-6, depending on the items included in the current map and the item selected in the navigation tree. Table 2-5 Severity Indicators Icon Color Severity Icon Color Severity Red Critical Light Blue Warning Orange Major Medium Blue Information Yellow Minor Dark blue Indeterminate Green Cleared, Normal, or OK 2-12 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 2 Working with the Cisco Prime Network Vision Client The Prime Network Vision Window Table 2-7 describes the network element properties displayed in the Network Elements tab. (Locked network elements display only managed element information and the locked element icon.) To ensure that you are viewing the latest information, either perform a new search or click the Refresh button. Table 2-6 Prime Network Vision List View Tabs Tab Description Aggregations Aggregations in the current map. Connection TP Connection termination points (TPs) in the current map. EFP Cross-Connect EFP cross-connects in the current map. Ethernet Flow Points EFPs in the current map. Ethernet Services Ethernet services in the current map. EVCs EVCs in the current map. Network Elements Network elements in the current map that are in the user’s scope. Network Pseudowire Network pseudowires in the current map. Network TP Tunnel Network Traffic Profile (TP) tunnels in the current map. Pseudowires Pseudowires in the current map. Pseudowire Edge Pseudowire endpoints in the current map. PW Switching Entity Pseudowire switching entities in the current map. Restricted Elements Network elements in the current map that are not in the user’s scope. Sites Sites for the selected VLAN. Site properties include site name, description, location, and IP interface. Switching Entities Switching entities in the current map. Virtual Routers Virtual routers on the selected VLAN. Virtual router properties include the virtual router name and description. VLANs VLANs in the current map. VLAN properties include VLAN name, identifier, description, and Ethernet flow points. VPLS Forward VPLS forwards in the current map. VPLS Instance VPLS instances in the current map. VPNs VPNs in the current map. VPN properties include VPN name and description Table 2-7 Network Element Information Displayed in List View Field Name Description Name Name of the network element managed by Cisco, as defined in Cisco Prime Network Administration. The Name property also displays a network element icon. The icon color reflects the highest network element alarm severity. In addition, the management state or an alarm icon is displayed. IP Address IP address used for managing the network element. System Name System name of the network element, as defined in the network element's MIB. If the network element is configured for Telnet access, the prompt is displayed. Severity Current operational health of the network element. 2-13 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 2 Working with the Cisco Prime Network Vision Client The Prime Network Vision Window Tip Click the red triangle in a cell to expand the cell and view all the information it contains. You can also use a tooltip to view all the information. See Filtering and Sorting Tabular Content, page 2-40 for more information about filtering, finding details about a network element in Prime Network Vision tables. Table 2-8 describes some of the functions that are available from the right-click menu in the list view. You must select an item for the right-click menu to appear. Not all options are available for all selections. Unacknowledged Severity of the most severe unacknowledged ticket. Communication State Ability of the VNE to reach the network element, according to the health of the element. For more information about communication states, see the Cisco Prime Network 3.10 Administrator Guide. Investigation State Level of network element discovery that has been performed or is being performed by the VNE. For more information about investigation states, see the Cisco Prime Network 3.10 Administrator Guide. Vendor Vendor name. Product Network element category, such as Router or Eth-Switch (Ethernet switch). Device Series Device series, such as Cisco 7600 Series Routers. Element Type Network element type including the manufacturer’s name, such as Cisco 7200. Software Version Cisco IOS software version running on the network element. Location Location of the network element. Up Since Date and time the network element was last reset. Table 2-7 Network Element Information Displayed in List View (continued) Field Name Description Table 2-8 List View Right-Click Options Right-Click Option Function Related Documentation Inventory View network element inventory The Inventory Window, page 3-9 Poll Now Poll the selected element Attach / Detach / Edit Business Tag Configure and view business tag information Chapter 7, “Labeling NEs Using Business Tags” Config Mgmnt View the Configuration Management page in Prime Network Change and Configuration Management Chapter 4, “Device Configurations and Software Images” Image Mgmnt View the Image Management page in Prime Network Change and Configuration Management Chapter 4, “Device Configurations and Software Images” Run Report Generate reports Chapter 11, “Working with Reports” Tools Ping or telnet a VNE, or check VNE CPU usage List View Right-Click Menu, page 2-35 Topology Configure the topology Adding Static Links, page 6-15 2-14 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 2 Working with the Cisco Prime Network Vision Client The Prime Network Vision Window Tip Click a column heading in a table to sort the information by that property. Links View Click Show Links View in the toolbar to display the links view in the Prime Network Vision window. Maps can contain many graphical links, each of which can represent multiple physical, topological, service, and business links. This can make it difficult for you to view the links you are interested in. In addition, if the number of graphical links exceeds the number that can be displayed in a map, not all links are displayed. By using the links view, you can view all links in the map, as well as search for a specific link and view the status of a link. Note You can view and filter the links according to type by using the Link Filter dialog box. For more information, see Filtering Links in a Map, page 5-25. Any links that are added or removed from the map are automatically added or removed from the links view, provided they have not been filtered out. The links view is selection sensitive; that is, the links displayed in the links view depend on the context selected in the navigation pane or map. For example, if an aggregation is selected, the links in the selected aggregation are displayed in the links view. Properties View network element properties Viewing the Properties of a Network Element, page 3-6 Commands Launch any of the commands that are included with Prime Network Vision Configuring and Viewing NEs using Basic Management Commands, page 3-37 Management Access Command Builder and Soft Properties Management Cisco Prime Network 3.10 Customization Guide VNE Tools Poll a VNE, or start or stop a VNE Performing a Manual Device Poll, page 3-18 Table 2-8 List View Right-Click Options (continued) Right-Click Option Function Related Documentation 2-15 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 2 Working with the Cisco Prime Network Vision Client The Prime Network Vision Window Figure 2-5 shows a links view. Figure 2-5 Links View Note An external link has a blue cell background in the table, and you can open the inventory window by clicking the hyperlink. For more information about external links, see Viewing Link Properties in the Links View, page 6-8. Table 2-9 describes the information that is displayed in the links view. Table 2-9 Information Displayed in the Links View Field Name Description Context Name of the map or aggregation containing the link. This field can be empty for either of the following reasons: • One side of the link is not included in the map. • The link is filtered out of all contexts. Severity Link alarm severity, represented by an icon. The icon and its color indicate the alarm severity and thereby the impact of the alarm on the network. For more information about severity, see Map View, page 2-7. A End-Point Element or site that is the source of the link as a hyperlink to the inventory of the element or site. Bi Directional Whether the link is bidirectional or unidirectional: true (bidirectional) or false (unidirectional). If the link is unidirectional (false), the traffic is from A to Z. 2-16 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 2 Working with the Cisco Prime Network Vision Client Prime Network Vision Status Indicators The links view toolbar includes the tools described in Table 2-10 and the link filtering buttons described in Table 2-10. For more information about filtering and sorting links in the links view, see Viewing Link Properties in the Links View, page 6-8. For information about the right-click options available in the links view, see Links View Right-Click Menu, page 2-37. Ticket Pane The ticket pane shows the tickets that relate to the elements in the displayed map. It also contains the Latest Events tab that shows the latest incoming events for the elements in the map from the time the map was opened. See Chapter 10, “Working with Tickets in Cisco Prime Network Vision” for more information. Prime Network Vision Status Indicators The following topics describe the ways in which the status of an element is displayed in Prime Network Vision: • Severity, page 2-17 • VNE Management State, page 2-18 • Tickets, page 2-22 Z End-Point Element or site that is the destination of the link as a hyperlink to the inventory of the element or site. Link Type Type of link, such as Physical Layer, LAG, MPLS TE Tunnel, pseudowire (PW) or VPN. Table 2-9 Information Displayed in the Links View (continued) Field Name Description Table 2-10 Link Filtering Buttons Button Name Description All Links Displays the complete list of links for the selected context (map or aggregation). In other words, the list is not filtered and all the links are displayed, including external links. External Links Displays links with only one side of the link in this context (map or aggregation) and the other side either not in the map or outside the selected context. Flat Links Displays the links currently visible on the map for the selected context (map or aggregation), excluding any thumbnails. Deep Links Displays the links for the current aggregation where both endpoints are within the currently selected context. 2-17 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 2 Working with the Cisco Prime Network Vision Client Prime Network Vision Status Indicators Severity Severity indicates the operational health of the element. An element has only one severity value at any given time, and this value is displayed using a severity color. For more information about the colors used to display the severity (or propagated severity) of network elements and links, see Alarm Indicators, page 2-11. Propagation Severity is propagated upward in the network hierarchy, displaying the top-most severity of the network element’s children and thereby ensuring that every single problem in the network is propagated and visible. The same severity propagation rules that are used for network elements apply to links. A link is a child object of an aggregation only if it is fully contained in the aggregation; that is, the network elements on both sides of the link are part of the aggregation, as shown in Figure 2-6 and Figure 2-7. Figure 2-6 Link Severity Example 1 Figure 2-6 shows critical link 1 between two network elements in an aggregation. This critical link affects the severity of aggregation 2. That is, the aggregation is critical because it contains a link with a critical severity. Link severity affects the context. Figure 2-7 Link Severity Example 2 Figure 2-7 shows critical link 1 that forms part of a link aggregation. This affects the severity of link 2 because it contains a link with a critical severity. New Ticket Propagation A new ticket indicates a new local fault or accumulates and propagates the number of new faults in its children. 1 2 180111 1 2 180112 2-18 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 2 Working with the Cisco Prime Network Vision Client Prime Network Vision Status Indicators When new tickets are accumulated, a label is displayed in the navigation pane and map, based on the following formula: n s [+] where: For example: • An object with three critical new alarms, two major alarms, and one warning alarm is labeled 3C+. • An object with five minor new alarms is labeled 5m. An icon represents unacknowledged tickets, and the icon color is that of the most severe, unacknowledged ticket. For more information about severity colors and icons, see Alarm Indicators, page 2-11. If all relevant tickets are acknowledged, no bell is displayed. VNE Management State The management state indicates the state or mode of the software component (a VNE) managing a network element and the communication with it. This enables you to determine the accuracy of the network information and the availability of VNEs to carry out network operations. Management states are always local indications and are not propagated. A partial exception to this rule is the propagation of unreachable VNEs. The management state indication applies only to VNE and its components. A VNE can have only one state at a time (for example, Unsupported or Connecting). A managed VNE icon consists of a managed element icon and one or two overlay icons, or badges: • The managed element icon displays a symbol of the element, and the color of the symbol indicates the highest severity ticket that is not cleared for the element. An element icon is colored green if either of the following is true: – No ticket of any severity exists for the element. – All tickets that exist for the element have the severity Cleared or Informational. Symbol Description n The number of alarms with the highest severity that have the source as the network element and are part of the network element ticket(s). s The highest severity level in the new tickets: • C = Critical • M = Major • m = Minor • W = Warning • N = Normal (cleared alarm) • i = Informational + Additional, less severe tickets (optional) exist. 2-19 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 2 Working with the Cisco Prime Network Vision Client Prime Network Vision Status Indicators For more information about network element icons, see Element Icons, page 2-8. For more information about severity colors, see Alarm Indicators, page 2-11. • An alarm badge is displayed on top of a managed element icon, and the color of the alarm badge indicates the severity of the highest severity ticket that is not acknowledged for the element. If all tickets are acknowledged, no alarm icon appears. Figure 2-8 shows an example of an element with the following ticket and alarm severities: – The highest severity ticket that is not cleared for the element is Major, as indicated by the orange color applied to the element icon. – The highest severity alarm that is not acknowledged for the element is Cleared or OK, as indicated by the green alarm badge. Figure 2-8 Element with Ticket and Alarm Severity Indicators • A VNE management state badge is displayed on top of the managed element icon to indicate the management state of the VNE in the navigation tree and map. For example, a router that is partially reachable by Prime Network Vision is displayed as illustrated in Figure 2-9. Figure 2-9 Element with Overlay Badges 1 Element icon with severity Major (orange) 2 Alarm badge with severity Cleared or OK (green) 1 Alarm badge with severity Warning. 2 Managed element icon with severity Warning. 3 VNE management state badge of Device Partially Reachable. 1 2 3 310517 2-20 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 2 Working with the Cisco Prime Network Vision Client Prime Network Vision Status Indicators Table 2-11 and Table 2-12 describe network element communication and investigation states and shows the related badge for each state. Table 2-11 VNE Communication States State Name Description Badge Agent Not Loaded The VNE is not responding to the gateway because it was stopped, or it was just created. This communication state is the equivalent of the Defined Not Started investigation state. None VNE/Agent Unreachable The VNE is not responding to the gateway. This can happen if the unit or AVM is overutilized, the connection between the gateway and unit or AVM was lost, or the VNE is not responding in a timely fashion. (A VNE in this state does not mean the device is down; it might still be processing network traffic.) Connecting The VNE is starting and the initial connection has not yet been made to the device. This is a momentary state. Because the investigation state decorator (the hourglass) will already be displayed, a special GUI decorator is not required. None Device Partially Reachable The VNE is not fully reachable because at least one protocol is not operational. Note This is the default behavior. You can change the settings that determine when Cisco Prime Network moves a VNE to Device Unreachable. For more information, see the Cisco Prime Network 3.10 Administrator Guide. Device Unreachable The connection between the VNE and the device is down because all of the protocols are down (though the device might be sending traps or syslogs). Note This is the default behavior. You can change the settings that determine when Cisco Prime Network moves a VNE to Device Unreachable. For more information, see the Cisco Prime Network 3.10 Administrator Guide. Tracking Disabled The reachability detection process is not enabled for any of the protocols used by the VNE. The VNE will not perform reachability tests nor will Cisco Prime Network generate reachability-related events. In some cases this is desirable; for example, tracking for Cloud VNEs should be disabled because Cloud VNEs represent unmanaged network segments. Because this is a user-defined mode (rather than an error or transitional mode), Cisco Prime Network does not display a decorator for this state. To troubleshoot a VNE that is in this state, see the Cisco Prime Network 3.10 Administrator Guide. None Table 2-12 VNE Investigation States State Name Description Badge Defined Not Started A new VNE was created (and is starting); or an existing VNE was stopped. In this state, the VNE is managed and is validating support for the device type. (This investigation state is the equivalent of the Agent Not Loaded communication state.) A VNE remains in this state until it is started (or restarted). None Unsupported The device type is either not supported by Prime Network or is misconfigured (it is using the wrong scheme, or is using reduced polling but the device does not support it). To extend Cisco Prime Network functionality so that it recognizes unsupported devices, use the VNE Customization Builder. See the Cisco Prime Network 3.10 Customization Guide. 2-21 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 2 Working with the Cisco Prime Network Vision Client Prime Network Vision Status Indicators More than one management state can occur at the same time. For example, a single overlay icon can be displayed, reflecting the device status based on the following priorities: Unsupported > Discovering > VNE/Agent Unreachable > Device Unreachable > Partially Discovered > Operational. For more information about each of these states and how to troubleshoot any issues, see the Cisco Prime Network 3.10 Administrator Guide. Discovering The VNE is building the model of the device (the device type was found and is supported by Cisco Prime Network). A VNE remains in this state until all device commands are successfully executed at least once, or until there is a discovery timeout. Operational The VNE has a stable model of the device. Modeling may not be fully complete, but there is enough information to monitor the device and make its data available to other applications, such as activation scripts. A VNE remains in this state unless it is stopped or moved to the maintenance state, or there are device errors. None Currently Unsynchronized The VNE model is inconsistent with the device. This can be due to a variety of reasons; for a list of these reasons along with troubleshooting tips, see the topic on troubleshooting VNE investigation state issues in the Cisco Prime Network 3.10 Administrator Guide. Maintenance VNE polling was suspended because it was manually moved to this state (by right-clicking the VNE and choosing Actions > Maintenance). The VNE remains in this state until it is manually restarted. A VNE in the maintenance state has the following characteristics: • Does not poll the device, but handles syslogs and traps. • Maintains the status of any existing links. • Does not fail on VNE reachability requests. • Handles events for correlation flow issues. It does not initiate new service alarms, but does receive events from adjacent VNEs, such as in the case of a Link Down alarm. The VNE is moved to the Stopped state if: it is VNE is moved, the parent AVM is moved or restarted, the parent unit switches to a standby unit, or the gateway is restarted. Partially Discovered The VNE model is inconsistent with the device because a required device command failed, even after repeated retries. A common cause of this state is that the device contains an unsupported module. To extend Cisco Prime Network functionality so that it recognizes unsupported modules, use the VNE Customization Builder. See the Cisco Prime Network 3.10 Customization Guide. Shutting Down The VNE has been stopped or deleted by the user, and the VNE is terminating its connection to the device. Stopped The VNE process has terminated; it will immediately move to Defined Not Started. None Table 2-12 VNE Investigation States (continued) State Name Description Badge 2-22 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 2 Working with the Cisco Prime Network Vision Client Prime Network Vision Toolbar Tickets Cisco Prime Network Vision displays an icon with a ticket to indicate the severity of the top-most alarm on the ticket. The icons are the same as those used with network elements (see Table 2-5) and are displayed in Cisco Prime Network Vision as follows: Prime Network Vision Toolbar The Prime Network Vision toolbar is context-sensitive and the options vary depending on your selection in the application. Note The functionality that a user can access in Prime Network Vision depends on the user role and the security level of the scopes assigned to the user. For more information, see User Roles Required for Working with Prime Network Vision Maps, page 5-2. Table 2-13 identifies the toolbar buttons and describes the functions that are available in the Prime Network Vision toolbar. Value Navigation Pane Map Ticket Pane Element with ticket of Major severity Table 2-13 Prime Network Vision Toolbar Button Name Function Open Network Inventory Opens the Network Elements tab. Map Options New Map Creates a new map in the database. Open Map Opens a map saved in the database using the Open dialog box. Add to Map Adds an element to the map or to the subnetwork selected in the navigation pane and displayed in the content pane. Save Map Appearance Saves the current map (the background and the location of devices) to the database. Viewing Options Show Map View Displays the map view in the Prime Network Vision content pane (the button toggles when selected or deselected). Show List View Displays the list view in the Prime Network Vision content pane (the button toggles when selected or deselected). 2-23 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 2 Working with the Cisco Prime Network Vision Client Prime Network Vision Toolbar Show Links View Displays the links view in the Prime Network Vision content pane (the button toggles when selected or deselected). Overlay Tools Choose Overlay Type Chooses and displays an overlay of a specific type on top of the elements displayed in the content pane in a map view. Available overlay options are: • Ethernet Service • MPLS-TP Tunnel • Network Clock • Pseudowire • VLAN • VPLS • VPN • None—Removes the existing overlays. Show Overlay / Hide Overlay Displays or hides a previously defined overlay on top of the elements displayed in the map view. Note Overlays do not reflect changes that occur in the selected service. As a result, the information in an overlay can become stale. Refresh Overlay Refreshes the overlay that was last selected. Viewing Tools Go to Parent Moves up one level in the navigation pane and content pane so you can view different information. Link Filter Opens the Link Filter dialog box, enabling you to display or hide different types of links in the map and links views. If a link filter is applied to the map, the Link Filter Applied button is displayed instead. Link Filter Applied Indicates a link filter is currently applied to the map and opens the Link Filter dialog box so you can remove or modify the existing link filter. If no link filter is applied to the map, the Link Filter button is displayed instead. Overview Opens a window displaying an overview of the network. Find Business Tag Opens the Find Business Tag dialog box, enabling you to find and delete a business tag according to name, key, or type. Table 2-13 Prime Network Vision Toolbar (continued) Button Name Function 2-24 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 2 Working with the Cisco Prime Network Vision Client Prime Network Vision Menu Bar Prime Network Vision Menu Bar The following topics describe the options that are available in each Prime Network Vision menu: • File Menu, page 2-25 • Edit Menu, page 2-26 • View Menu, page 2-26 • Node Menu, page 2-27 • Tools Menu, page 2-27 • Activation Menu, page 2-28 • Network Inventory Menu, page 2-28 Search Tools Find Previous Finds the previous instance of the search string entered in the Find in Map dialog box. Find Opens the Find in Map dialog box, enabling you to find an element in the map by its name or IP address. Find Next Finds the next instance of the search string entered in the Find in Map dialog box. Map Zoom and Layout Tools Layout Map Defines the way in which the elements are arranged in the Prime Network Vision window: Circular, hierarchical, orthogonal, or symmetric. Fit in Window Fits all elements in the map in the content pane. Normal Selection Mode Activates the normal selection mode. Zoom Selection Mode Activates the zoom selection mode, which enables you to zoom in on a section of the map by clicking and dragging the required area. Pan Mode Activates the pan mode, which enables you to view different areas of the map by clicking and dragging the map. Application-Specific Tools Open Activation Opens the Activation dialog box. For more information, see the Cisco Prime Network 3.10 Customization Guide. Activation History Opens the Activation History dialog box. For more information, see the Cisco Prime Network 3.10 Customization Guide. Table 2-13 Prime Network Vision Toolbar (continued) Button Name Function 2-25 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 2 Working with the Cisco Prime Network Vision Client Prime Network Vision Menu Bar • Reports Menu, page 2-29 • Window Menu, page 2-29 • Help Menu, page 2-29 Note The functionality that a user can access in Prime Network Vision depends on the user role and the security level of the scopes assigned to the user. For more information, see User Roles Required for Working with Prime Network Vision Maps, page 5-2. Also, the menus are context-sensitive and the options vary depending on your selection in the application. File Menu Table 2-14 describes the options that are available in the Prime Network Vision File menu. For more information, see Chapter 5, “Working with Prime Network Vision Maps.” Table 2-14 File Menu Options File Menu Option Description New Map Creates a new empty map in the database. Open Map Opens a map saved in the database using the Open dialog box. Add to Map1 Opens the Add dialog box and enables you to add any of the following to the map or to the subnetwork selected in the navigation pane and displayed in the content pane: • Cross Connect • Ethernet Service • MPLS-TP Tunnel • Network Element • Pseudowire • Unassociated Bridge • VLAN • VPLS • VPN Save Map1 Saves the appearance of the map (the background and the location of devices) to the database. Save As Image1 Saves the active map as an image and automatically displays the Save as Image dialog box. Use this dialog box to save an image using a different file format or name. Print Preview1 Displays how the map will look when it is printed. Print1 Prints the active map as displayed in the Print Preview dialog box. Load MultiPath Loads a Cisco PathTracer multiple-path trace from a file that was previously saved in Cisco PathTracer. 2-26 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 2 Working with the Cisco Prime Network Vision Client Prime Network Vision Menu Bar Edit Menu Table 2-15 identifies the options available in the Prime Network Vision Edit menu. For more information, see Chapter 5, “Working with Prime Network Vision Maps.” View Menu Table 2-16 identifies the options available in the Prime Network Vision View menu. For more information, see Using the Overview Window, page 5-14. Close Closes the selected map or tab. Exit Exits the Prime Network Vision application and saves the content pane. 1. This option is available only when a map is displayed in the content pane. Table 2-14 File Menu Options (continued) File Menu Option Description Table 2-15 Edit Menu Options Edit Menu Option Description Find in Map Searches for a device in the map that contains the specified text in the name or the IP address fields. Find Business Tag Searches for business tag information in the database. Resize This option is displayed only when element icons or aggregations are selected. Displays the Resize dialog box, enabling you to specify the size of selected icons or aggregations in the map, either by percentage or size. Select All Selects all elements in the map. Table 2-16 View Menu Options View Menu Option Description Layout Defines the way in which the map is displayed in the Prime Network Vision content pane: Circular, hierarchical, orthogonal, or symmetric. Overview Opens a window displaying an overview of the network map. Zoom In Zooms in on the network map. Zoom Out Zooms out of the network map. Fit In Window Displays the entire network map in the content pane. Normal Select Activates the normal selection mode. The selected option is dimmed. Pan Activates the pan mode, which enables you to move around in a map by clicking and dragging. The selected option is dimmed. Zoom Selection Activates the zoom selection mode, which enables you to select an area in a map to zoom in on by clicking and dragging. The selected option is dimmed. 2-27 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 2 Working with the Cisco Prime Network Vision Client Prime Network Vision Menu Bar Node Menu Table 2-17 describes the Node menu options. Note Most of the functionality available in this menu is available only when an element icon or an aggregation is selected in the navigation pane or a map. Tools Menu Table 2-18 describes the Tools menu options. Table 2-17 Node Menu Options Node Menu Option Description Inventory Displays a dialog box that enables you to view the physical and logical inventory. For physical inventory, you can view all the components of the device, such as modules and ports. In addition, you can view the status of each component. For logical inventory, you can view all the profiles and virtual channels or routing tables of the device. For more information, see Chapter 3, “Viewing and Managing NE Properties.” Mark as A Side Starts the process of creating a new static link. This option is enabled when a device, port, or unmanaged network is selected. Mark as Z Side Launches the Add Static Link dialog box, enabling you to create a static link between the two selected nodes. This option is enabled after a device, port, or unmanaged network is selected and after the Mark as A Side option is selected. Note If you select two ports, the Add Static Link dialog box is not displayed. Properties Displays a dialog box enabling you to view the properties of the selected device, such as the severity, IP address, and communication state. For more information, see Chapter 3, “Viewing and Managing NE Properties.” Table 2-18 Tools Menu Options Tools Menu Option Description Change User Password Enables you to change the password used when logging into the Prime Network client application suite. The change takes effect the next time you log into the application. Note The administrator can also change a user password in Cisco Prime Network Administration. Options Enables you to customize several of Prime Network’s options, such as whether or not to load the content upon startup. For more information, see Adjusting the Prime Network Vision GUI Client Settings, page 2-39. 2-28 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 2 Working with the Cisco Prime Network Vision Client Prime Network Vision Menu Bar Activation Menu See the Cisco Prime Network 3.10 Customization Guide for more information about any of the options in this menu. Table 2-19 describes the Activation menu options. Network Inventory Menu Table 2-20 describes the Network Inventory menu options. Change and Config Mgmnt Displays the Prime Network Change and Configuration Management dashboard. For more information, see the Chapter 4, “Device Configurations and Software Images.” Command Jobs Displays all Command Builder jobs that have been scheduled and their details. For more information, see the Cisco Prime Network 3.10 Customization Guide. Table 2-18 Tools Menu Options (continued) Tools Menu Option Description Table 2-19 Activation Menu Options Activation Menu Option Description Activation Opens the Activation dialog box. Activation History Opens the Activation History dialog box. Activation Modification Utility Opens the Activation Modification Utility dialog box. Table 2-20 Network Inventory Menu Options Network Inventory Menu Option Description Network Elements Displays a list of the available network elements in the Network Elements tab. For more information, see Prime Network Vision Inventory Tabs, page 2-4. Ethernet Flow Domains Displays a list of the current Ethernet flow domains in the Ethernet Flow Domains tab. For more information, see Viewing and Renaming Ethernet Flow Domains, page 13-41 VTP Domains Displays a list of the current of the VLAN Trunk Protocol (VTP) domains in the VTP Domains tab. For more information, see Viewing VLAN Trunk Group Properties, page 13-67. Virtual Machines Displays a list of the available virtual machines in the Virtual Machines tab. For more information about virtual machines, see Viewing the Virtual Machines of a Data Center, page 27-13. 2-29 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 2 Working with the Cisco Prime Network Vision Client Prime Network Vision Right-Click Menus Reports Menu Table 2-21 describes the Reports menu options. For more information about Report Manager and reports, see Chapter 11, “Working with Reports.” Window Menu The Prime Network Vision Window menu lists all maps open in the Prime Network Vision content pane, enabling you to move between the maps. The menu also lists any network element inventory tabs that are open. Help Menu Table 2-22 describes the Help menu options. Prime Network Vision Right-Click Menus If you right-click a specific area, link, network element, device, or alarm in a Prime Network Vision window, a context-sensitive right-click menu is displayed that contains options available for the selected item or items. Right-click menus are also available in many of the inventory and property windows. For example, if you right-click an entry in a logical inventory table, you can view properties specific to that entry. The options that are available depend on the window or table currently displayed and the item selected. Table 2-21 Reports Menu Options Reports Menu Option Description Report Manager Opens the Reports Manager window so you can create, run, and manage reports. Run Report Enables you to run standard or user-defined events, inventory, and network service reports on demand. Table 2-22 Help Menu Options Help Menu Option Description Cisco Prime Network Vision Help Opens the online help for Prime Network Vision and Prime Network Events. Icon Reference Opens a window that identifies and describes the icons and buttons used in Prime Network Vision and Prime Network Events. Cisco.com This option is unavailable. About Cisco Prime Network Vision Displays the Prime Network version and any additionally installed applications. 2-30 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 2 Working with the Cisco Prime Network Vision Client Prime Network Vision Right-Click Menus The menus are context-sensitive and the options vary according to your selection in the application. For example, the right-click menus for network elements and aggregations are different. Additional right-click options are displayed in the following situations: • If Prime Network is installed as part of the Cisco Prime suite of applications, right-click menus in Prime Network Vision include options for accessing the other Cisco Prime applications. • If Prime Performance Manager is installed in your environment, Prime Network Vision includes right-click options that allow you to generate device, interface, and VRF-related reports using Prime Performance Manager. • The Prime Network Vision installation includes a number of scripts. When these scripts are installed, they are displayed as options in the right-click menus of the devices that support them. For more information about these scripts, see Configuring and Viewing NEs using Basic Management Commands, page 3-37. The functionality that you can access in Prime Network Vision depends on your user role and the security level of the scopes that you can access. For more information, see User Roles Required for Working with Prime Network Vision Maps, page 5-2. See the following topics for the default options available in Prime Network Vision right-click menus: • Map Right-Click Menu, page 2-30 • Element Right-Click Menu, page 2-31 • Aggregation Right-Click Menu, page 2-34 • Link Right-Click Menu, page 2-35 • List View Right-Click Menu, page 2-35 • Links View Right-Click Menu, page 2-37 • Ticket Right-Click Menu, page 2-38 Map Right-Click Menu The map right-click menu is displayed when you right-click anywhere on a map in the content pane and no elements are selected. Table 2-23 describes the map right-click menu options. Table 2-23 Map Right-Click Menu Options Option Description Go to Parent Moves up one level in the navigation pane and content pane to enable you to view different information. Go to Root Moves to the root level in the navigation pane and content pane to enable you to view different information. Set Map Background Displays a background image for the map in the content pane. For more information, see Applying a Background Image, page 5-12. 2-31 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 2 Working with the Cisco Prime Network Vision Client Prime Network Vision Right-Click Menus Element Right-Click Menu The element right-click menu is displayed when you right-click an element in the navigation pane, the content pane, or in the Network Elements inventory tab. Note The element right-click menu is context-sensitive and the options vary depending on your selection in the application. Also, some options might not be available if multiple elements are selected. Table 2-24 describes the options available in the element right-click menu. Table 2-24 Element Right-Click Menu Options Option Description Add Associated VLAN Opens the Add Associated VLAN dialog box so that you can add an associated VLAN to the selected VLAN. For more information, see Adding an Associated VLAN, page 13-54. Aggregate Groups the selected devices into an aggregation in the Prime Network Vision content pane, and enables you to define a name for the new aggregation. For more information, see Chapter 5, “Working with Prime Network Vision Maps.” Note You cannot aggregate service entities that exist within services. For example, you cannot aggregate VRFs that exist in a VLAN. Attach / Detach / Edit Business Tag Allows you to perform the following actions: • Attach a business tag to the selected network element. • Detach a business tag from a network element. • Edit a business tag for a network element. Note The Detach and Edit options are displayed only when a business tag is attached to a network element. For more information, see Chapter 7, “Labeling NEs Using Business Tags.” Commands Enables you to launch any of the commands that are included with Prime Network Vision. For more information on the available commands and how to implement them, see Configuring and Viewing NEs using Basic Management Commands, page 3-37. Config Mgmnt This option is available only if Prime Network Change and Configuration Management is installed. Displays the Configuration Management page for the selected device in Prime Network Change and Configuration Management. For more information, see Chapter 4, “Device Configurations and Software Images.” Delete Deletes the selected item from the map. 2-32 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 2 Working with the Cisco Prime Network Vision Client Prime Network Vision Right-Click Menus Disaggregate Ungroups the devices in the selected aggregation in the navigation and map panes. For more information, see Chapter 5, “Working with Prime Network Vision Maps.” Note This option is available only when an aggregation is selected in the navigation pane or map. Edit Move the selected virtual router to the location you specify. Filter Tickets Displays only those tickets that have the selected VNE as the root cause. This option is available only for VNEs that have not been deleted by Prime Network Administration. Hide Connected Devices Hides the devices for sites with one or more connected devices. Image Mgmnt This option is available only if Prime Network Change and Configuration Management is installed. Displays the Image Management page for the selected device in Prime Network Change and Configuration Management. For more information, see Chapter 4, “Device Configurations and Software Images.” Inventory Displays a window enabling you to view the physical and logical inventory. For physical inventory, you can view all the components of the device, such as the modules, ports, and its IP address or configured VLANs. In addition, you can view the status of each component. For logical inventory, you can view all the profiles and VC tables of the device. For more information, see Chapter 3, “Viewing and Managing NE Properties.” Launch external applications Starts an external application or tool that has been configured for access via the right-click menu. For more information, see the Cisco Prime Network 3.10 Customization Guide. Management Contains the following submenu options: • Command Builder—Defines commands and scripts using the Prime Network Command Builder tool (Configurator security level required). • Soft Properties Management—Extends VNEs by adding SNMP MIB or Telnet/SHH/TL-1 properties to the device’s collected information model using the Prime Network Soft Properties Manager (Administrator security level required). For more information about Command Builder and Soft Properties Manager, see the Cisco Prime Network 3.10 Customization Guide. Modify Displays the Modify dialog box so that you can change the selected item’s name, description, or icon. Open Relevant Maps Displays the Open Map dialog box so that you can view and open maps that contain the selected element. PathTracer Launches a path trace from the selected item. Poll Now Polls the selected element. Table 2-24 Element Right-Click Menu Options (continued) Option Description 2-33 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 2 Working with the Cisco Prime Network Vision Client Prime Network Vision Right-Click Menus Properties Displays the properties of the selected item, such as the IP address and system name. In addition, you can open the VNE Properties dialog box and manage VNE properties. For more information, see Chapter 3, “Viewing and Managing NE Properties.” Remove from Map Removes the selected device and all its children from the map (navigation pane and content pane). The device that has been removed is still maintained in the network. Rename Renames the selected item. Resize Enables you to resize an object on the map by percentage or size. Run Report Enables you to run standard or user-defined events, inventory, and network service reports on demand. Save as New Map Creates a new map and places the selected aggregation as the root, while leaving the original map intact. Script names Launches available activation and configuration scripts. This can include the commands documented in Configuring and Viewing NEs using Basic Management Commands, page 3-37. Show as Aggregation / Thumbnail Displays the selected aggregation as a single entity or as a collection of items. The options toggle, depending on whether the aggregation is in a thumbnail or aggregated view. Show CE Device Displays devices for sites or LCPs with one or more hidden, connected devices. Tools The Tools option contains the following choices: • CPU Usage—Displays memory and CPU usage information for a device or network element. • Ping—Pings the device from the client station. • Telnet—Communicates with the device using the Telnet window from the client station. Note If you are using a Windows 7 system and want to use the Prime Network Telnet option, you need to set up Telnet on the Windows 7 system as follows: - For Windows 7 32-bit systems, enable the Windows Telnet Client to use the Prime Network Telnet option. - For Windows 7 64-bit systems, a solution is available on the Cisco Developer Network at http://developer.cisco.com/web/prime-network/forums/-/message_b oards/message/2780108. Table 2-24 Element Right-Click Menu Options (continued) Option Description 2-34 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 2 Working with the Cisco Prime Network Vision Client Prime Network Vision Right-Click Menus Aggregation Right-Click Menu The aggregation right-click menu is displayed when you right-click an aggregation in a map. Table 2-25 describes the aggregation right-click menu options. Topology The Topology option enables you to add: • A static link between two devices. • A static topology between a device and an unmanaged network. • A tunnel to a VPN. When working with static links, the following submenu options enable you to define the A Side and Z Side of the link: • Mark as A Side • Mark as Z Side When working with VPNs in VPN Service View, the Add Tunnel submenu option allows you define and configure tunnels. VNE Tools Contains the following submenu options: • Poll Now—Updates the VNE information. • Stop VNE—Stops the VNE. • Start VNE—Starts the VNE. For more information, see Chapter 3, “Viewing and Managing NE Properties.” Table 2-24 Element Right-Click Menu Options (continued) Option Description Table 2-25 Aggregation Right-Click Menu Options Option Description Aggregate Groups the selected aggregations into an aggregation in the Prime Network Vision content pane, and enables you to define a name for the new aggregation. For more information, see Chapter 5, “Working with Prime Network Vision Maps.” Disaggregate Ungroups the selected aggregation in the navigation pane and map in the Prime Network Vision window. All the aggregations in the selected node move up one level, and the original aggregation is removed. For more information, see Chapter 5, “Working with Prime Network Vision Maps.” Rename Renames the selected aggregation. Resize Defines the size of selected aggregations in a map according to one of four sizes or according to a percentage of the current size. Remove from Map Removes the selected aggregation and all its children from the navigation pane and the map. Save as New Map Creates a new map and places the selected aggregation as the root, while leaving the original map intact. 2-35 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 2 Working with the Cisco Prime Network Vision Client Prime Network Vision Right-Click Menus Link Right-Click Menu The Link right-click menu is displayed when you right-click a link in the map view. For more information, see Chapter 6, “Working with Links.” Table 2-26 describes the link right-click menu options. List View Right-Click Menu The list view right-click menu is displayed when you right-click an entry in the Network Elements tab in the list view table. For more information, see List View, page 2-11. Table 2-27 describes the list view right-click menu options. Run Report Enables you to run standard or user-defined events, inventory, and network service reports. Show as Aggregation / Thumbnail Displays the aggregation as a single entity or as a collection of items. The options toggle, depending on whether the aggregation is in a thumbnail or aggregated view. Delete Deletes the selected item. This option is available when the item is marked with the reconciliation icon. Table 2-25 Aggregation Right-Click Menu Options (continued) Option Description Table 2-26 Link Right-Click Menu Option Option Description Properties Displays the properties of the selected link. Table 2-27 List View Right-Click Menu Options - Network Elements Tab Option Description Inventory Displays a window enabling you to view the physical and logical inventory. For physical inventory, you can view all the components of the device, such as the modules, ports, and its IP address or configured VLANs. In addition, you can view the status of each component. For logical inventory, you can view all the profiles and VC tables of the device. For more information, see Chapter 3, “Viewing and Managing NE Properties.” Attach / Detach / Edit Business Tag Allows you to perform the following actions: • Attach a business tag to the selected element. • Remove a business tag from the selected element. • Edit an existing business tag for the selected element. Note The Detach and Edit options are available only when a business tag is attached to a link. For more information, see Chapter 7, “Labeling NEs Using Business Tags.” 2-36 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 2 Working with the Cisco Prime Network Vision Client Prime Network Vision Right-Click Menus Config Mgmnt Displays the Configuration Management page for the selected device in Prime Network Change and Configuration Management. For more information, see Chapter 4, “Device Configurations and Software Images.” Image Mgmnt Displays the Image Management page for the selected device in Prime Network Change and Configuration Management. For more information, see Chapter 4, “Device Configurations and Software Images.” Run Report Enables you to run standard or user-defined events, inventory, and network service reports. Show Only Selected Rows Displays only the rows that you select. Show All Rows Displays all table rows that meet the current filtering criteria. Tools Contains the following submenu options: • CPU Usage—Displays memory and CPU usage information for a device or network element. • Ping—Pings the device from the client station. • Telnet—Communicates with the device using the Telnet window from the client station. Note If you are using a Windows 7 system and want to use the Prime Network Telnet option, you need to set up Telnet on the Windows 7 system as follows: - For Windows 7 32-bit systems, enable the Windows Telnet Client to use the Prime Network Telnet option. - For Windows 7 64-bit systems, a solution is available on the Cisco Developer Network at http://developer.cisco.com/web/prime-network/forums/-/message_b oards/message/2780108. Topology Enables you to add: • A static link between two devices. • A static topology between a device and an unmanaged network. • A tunnel to a VPN. When working with static links, the following submenu options enable you to define the A Side and Z Side of the link: • Mark as A Side • Mark as Z Side When working with VPNs in VPN Service View, the Add Tunnel submenu option allows you define and configure tunnels. Table 2-27 List View Right-Click Menu Options - Network Elements Tab (continued) Option Description 2-37 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 2 Working with the Cisco Prime Network Vision Client Prime Network Vision Right-Click Menus Links View Right-Click Menu The links view right-click menu is displayed when you right-click a link in the links view table. For more information, see Chapter 6, “Working with Links.” Table 2-28 describes the links view right-click menu options. Launch external applications Launches external applications or tools, such as an SSH client. See the Cisco Prime Network 3.10 Customization Guide. Properties Displays the properties of the selected item, such as the IP address and system name. In addition, you can open the VNE Properties dialog box and manage VNE properties. For more information, see Chapter 3, “Viewing and Managing NE Properties.” Commands Enables you to launch any of the commands that are included with Prime Network Vision. For a complete list of the available commands, see Configuring and Viewing NEs using Basic Management Commands, page 3-37. Script names Launches available activation and configuration scripts. This can include the commands documented in Configuring and Viewing NEs using Basic Management Commands, page 3-37, and those you create using Command Builder (can be launched against multiple network elements). For more information, see the Cisco Prime Network 3.10 Customization Guide. Management Contains the following submenu options: • Command Builder—Defines commands and scripts using the Prime Network Command Builder tool (Configurator security level required). • Soft Properties Management—Extends VNEs by adding SNMP MIB or Telnet/SHH/TL-1 properties to the device’s collected information model using the Prime Network Soft Properties Manager (Administrator security level required). For more information about Command Builder and Soft Properties Manager, see the Cisco Prime Network 3.10 Customization Guide. VNE Tools Contains the following submenu options: • Poll Now—Updates the VNE information. • Stop VNE—Stops the VNE. • Start VNE—Starts the VNE. For more information, see Chapter 3, “Viewing and Managing NE Properties.” Table 2-27 List View Right-Click Menu Options - Network Elements Tab (continued) Option Description 2-38 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 2 Working with the Cisco Prime Network Vision Client Prime Network Vision Right-Click Menus Ticket Right-Click Menu The Ticket right-click menu is displayed when you right-click a ticket in the ticket pane. The Ticket right-click menu enables you to view ticket properties and highlights the links or elements that are affected by a ticket. The Ticket menu also enables you to acknowledge, clear, and remove a ticket. For more information, see Chapter 10, “Working with Tickets in Cisco Prime Network Vision.” Table 2-29 describes the ticket right-click menu options. Table 2-28 Links View Right-Click Menu Options Option Description Attach Business Tag Attaches a business tag to the selected link. For more information, see Chapter 7, “Labeling NEs Using Business Tags.” Detach/Edit Business Tag Detaches or edits a business tag from the selected link. For more information, see Chapter 7, “Labeling NEs Using Business Tags.” The Detach and Edit options are available only when a business tag is attached to a link. Select Link in Map Highlights the selected link in the content pane. Show Only Selected Rows Displays only the rows that you select. Show All Rows Displays all table rows that meet the current filtering criteria. Properties Displays the properties of the selected link. Table 2-29 Ticket Right-Click Menu Options Option Description Acknowledge Acknowledges that the ticket is being handled; the ticket is displayed as true in the ticket pane. Acknowledging an alarm removes the alarm icon from the device icon. Multiple tickets can be acknowledged at the same time. Clear Approves the reported faulty ticket and clears the faulty networking entity from Prime Network. The ticket is displayed as Clear in the ticket pane. Note When a Card Out or Link Down alarm occurs, the relevant information is displayed in the inventory and maintained in the VNE. Remove Removes the ticket and all its active subtickets from the ticket pane (this option is only available after the ticket has been cleared). The deleted tickets can be viewed using Cisco Prime Network Events. Multiple tickets can be removed at the same time. Note When a ticket is removed, the information is no longer displayed in the inventory and is removed from the VNE. Clear and Remove Approves the reported faulty ticket and clears the faulty networking entity from Prime Network. In addition, the ticket and all its active subtickets are removed from the ticket pane. 2-39 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 2 Working with the Cisco Prime Network Vision Client Adjusting the Prime Network Vision GUI Client Settings Adjusting the Prime Network Vision GUI Client Settings Table 2-30 lists the options for changing the GUI client display and audio settings, and for controlling the startup view and event history. You can adjust these settings by selecting Tools > Options from the main menu. Find Affected Elements Finds any elements affected by the selected ticket: • If only one element is affected, it is selected in the Prime Network navigation pane and content area. • If multiple elements are affected, they are displayed in the Affected Elements window. Show Only Selected Rows Displays only the rows that you select. Show All Rows Displays all table rows that meet the current filtering criteria. Properties Displays the Ticket Properties dialog box, enabling you to view ticket information, including impact analysis details of the affected parties and correlated alarms. See Viewing Ticket Properties, page 10-10. Table 2-29 Ticket Right-Click Menu Options (continued) Option Description Table 2-30 Options for Changing Prime Network Vision GUI Client Field Description Startup Load Workspace on Startup Open to content pane on login. Check the box if you do not want to view the content pane when you log in. Display Tab Preferences Map Labels Font Size Font size for map labels (26, 28, 30, 32, and 34; 30 is the default). Severity Show Severity Text (e.g. [3M+] List severity levels in the navigation pane and maps, using the formula described in New Ticket Propagation, page 2-17. Check the box if you do want to see severity text. Show Acknowledged View both acknowledged and unacknowledged alarms in the network element display name. Check the box if you do want to see both unacknowledged and acknowledged alarms. Show Propagated View propagated alarms on the specific entity. Propagated alarms are those that occur on other NEs. Check the box if you do want to see propagated alarms. Display Name How NE name is displayed: • Do not use Business Tag—Display NE name only • Add Business Tag to name—Display NE name and business tag. • Replace name with Business Tag—Display business tag only (when a subscriber is attached to a port, the subscriber name is also added) 2-40 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 2 Working with the Cisco Prime Network Vision Client Filtering and Sorting Tabular Content Filtering and Sorting Tabular Content For tables with extensive data, you can view all of the information in a table cell by hovering your mouse cursor over the cell. These topics explain how to sort and filter tabular information. Sorting Tables Sorting a table lets you arrange existing data in various ways, while filtering a table only displays the information that matches the filter. To sort a table using the Sort Table Values option: Step 1 In the table toolbar, click Sort Table Values. The Sort dialog box is displayed. Figure 2-10 Sort Dialog Box Audio Tab Enable Audio Response for Alarm Audio notification settings. Check the box if you do want a sound to be issued when an alarm is triggered. Critical The .wav file to use for critical alarms. Major The .wav file to use for major alarms. Minor The .wav file to use for minor alarms. Loop Sound on Critical Alarm If critical alarm sound should sound continuously when a critical alarm is triggered. Check the box if you do want a sound to play continuously. Events Tab Events History Size in Hours Maximum age of events to display in the Network Events and Provisioning Events tab in the inventory window (see Ticket and Events Pane, page 3-15). If you only want to see active events, enter 0 (zero). The default (6 hours) is controlled from the Prime Network Administration GUI client. Table 2-30 Options for Changing Prime Network Vision GUI Client (continued) Field Description 2-41 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 2 Working with the Cisco Prime Network Vision Client Filtering and Sorting Tabular Content Step 2 In the Sort Operation field, specify the frequency of the sort operation: • Only Once—Sorts the information in the table only once according to the specified criteria. When this option is selected, newly added rows will always be listed at the bottom of the table, regardless of their sort criteria value. Also, if an existing row's value changes, the row will remain where it is. • Continuously/Repeatedly—Sorts the information in the table continuously according to the specified criteria. If you select this option, the icon is displayed next to the selected column heading. Step 3 In the Sort By field, specify the first sort criterion: a. In the first drop-down list, choose the column to use for the first sort criterion. b. In the second drop-down list, choose Ascending or Descending to indicate the sort order. Step 4 If needed, click to add another sort criterion. Step 5 Adjust the sort criteria as needed: • To add additional criteria, click . • To remove a criterion, click . Step 6 Click OK to sort the table using the specified criteria. Filtering Tables Filtering can be extremely helpful when working with tables that contain many entries. Note If you load a table with many entries, (for example, thousands of entries), it can take a while for the complete table to load. The filtering options in the table toolbar are unavailable until the table has completely loaded. You can tell a table is being filtered if any filter details are displayed in the status line below the table or when you hover the mouse cursor over the filter button. Table 2-31 Table Toolbar Options Option Name Description Filter Filters the information displayed in the table by the criteria you specify. For more information, see Filtering Tables, page 2-41. Clear Filter Clears the existing filter. 2-42 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 2 Working with the Cisco Prime Network Vision Client Filtering and Sorting Tabular Content To define a filter: Step 1 In the toolbar above the table, click Filter. The Filter dialog box is displayed as shown in Figure 2-11. Figure 2-11 Table Filter Dialog Box Step 2 In the Match drop-down list, choose the rule for including items that meet the specified criteria: • All—All of the following criteria are to be met. • Any—Any of the following criteria are to be met. Step 3 For each criterion, specify the following information: a. In the first drop-down list, choose the primary match category. The drop-down list contains all columns in the current table. b. In the second drop-down list, choose the rule to use for this criterion. c. The third field either lists the available values or allows you to enter text using a drop-down list or free text. Tip You can use the “Greater than” or “Less than” rule with a string for filtering. For example, if you want to include all interfaces above Ethernet0/0/3, you can select Greater than and enter the string Ethernet0/0/3 to view interfaces Ethernet0/0/4, Ethernet0/0/5, and so on. Step 4 Click to add another criterion for this filter. Step 5 Add additional criteria as required. To remove a criterion, click . Step 6 When you have specified all criteria for the filter, click OK. The table data is displayed using the defined filter. Step 7 To clear a filter, click Clear Filter in the table toolbar. The table is refreshed and all entries are displayed. CHAPTER 3-1 Cisco Prime Network 3.10 User Guide OL-28065-01 3 Viewing and Managing NE Properties The following topics describe the user access roles required to use Cisco Prime Network Vision (Prime Network Vision) and how to view network element physical and logical properties in any mapped network: • User Roles Required to Work with Prime Network Vision, page 3-1 • Information Available in Element Icons, page 3-3 • Viewing the Properties of a Network Element, page 3-6 • The Inventory Window, page 3-9 • Checking VNE Connectivity and Communication Status, page 3-16 • Viewing the Physical Properties of a Device, page 3-19 • Working with Ports, page 3-23 • Viewing the Logical Properties of a Network Element, page 3-27 • Viewing Device Operating System Information, page 3-31 • Running an Activation from the Activation Menu, page 3-33 • Configuring and Viewing NEs using Basic Management Commands, page 3-37 Note Prime Network Vision maintains continuous, real-time discovery of all the physical and logical entities of the network inventory and the relationships among them. The Prime Network Vision distributed system inventory automatically reflects every addition, deletion, and modification that occurs in the network. User Roles Required to Work with Prime Network Vision This topic identifies the roles that are required to work with Prime Network Vision. Prime Network determines whether you are authorized to perform a task as follows: • For GUI-based tasks (tasks that do not affect elements), authorization is based on the default permission that is assigned to your user account. • For element-based tasks (tasks that do affect elements), authorization is based on the default permission that is assigned to your account. That is, whether the element is in one of your assigned scopes and whether you meet the minimum security level for that scope. For more information on user authorization, see the Cisco Prime Network 3.10 Administrator Guide. 3-2 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 3 Viewing and Managing NE Properties User Roles Required to Work with Prime Network Vision The following tables identify the tasks that you can perform: • Table 3-1 identifies the tasks that you can perform if a selected element is not in one of your assigned scopes. • Table 3-2 identifies the tasks that you can perform if a selected element is in one of your assigned scopes. By default, users with the Administrator role have access to all managed elements. To change the Administrator user scope, see the topic on device scopes in the Cisco Prime Network 3.10 Administrator Guide. Table 3-1 Default Permission/Security Level Required for Prime Network Vision Functions - Element Not in User’s Scope Task Viewer Operator OperatorPlus Configurator Administrator View maps XXX X X View network element properties — — — — X View network element properties in logical and physical inventory ——— — X View port status and properties — — — — X View VNE properties — — — — X Open the Port Utilization Graph — — — — X Enable and disable port alarms — — — — X1 View tickets in inventory window — — — — X View network events in inventory window — — — — X View provisioning events in inventory window ——— — X Create activation wizards — — — — — Preview and perform activations and deactivations ——— — — View activation details and output — — — — X Search for activations — — — — X 3-3 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 3 Viewing and Managing NE Properties Information Available in Element Icons Information Available in Element Icons Element icons in Prime Network Vision maps display different amounts of information according to their size as shown in Table 2-2. Table 3-3 identifies the information that is available for different types of elements for the four icons sizes. Table 3-2 Default Permission/Security Level Required for Prime Network Vision Functions - Element in User’s Scope Task Viewer Operator OperatorPlus Configurator Administrator View maps XXX X X View network element properties X X X X X View network element properties in logical and physical inventory XXX X X View port status and properties — X X X X View VNE properties X X X X X Open the Port Utilization Graph X X X X X Enable and disable port alarms — — — X1 1. To enable and disable port alarms on a device, the Administrator scope level must also be configured for that device. X1 View tickets in inventory window X X X X X View network events in inventory window X X X X X View provisioning events in inventory window XXX X X Create activation wizards — X X X X Preview and perform activations and deactivations ——— X X View activation details and output X X X X X Search for activations — X X X X Table 3-3 Information Displayed in Element Icons by Size Element Type Icon Size Tiny (Dot) Normal Large Huge Aggregation Color representing the associated alarm severity Name Name in card title Name in card title Bridge Color representing the associated alarm severity Name • Name in card title and body • Number of Ethernet flow points • Name in card title and body • Number of Ethernet flow points EFP cross-connect Color representing the associated alarm severity Name Name in card title Name in card title 3-4 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 3 Viewing and Managing NE Properties Information Available in Element Icons Ethernet flow point Color representing the associated alarm severity Name • Name in card title • Type, such as Trunk, Access, Dot1Q Tunnel, and so on • Match criteria • Name in card title • Type, such as Trunk, Access, Dot1Q Tunnel, and so on • Match criteria Ethernet service Color representing the associated alarm severity Name • Name in card title • Number of edge EFPs • Name in card title • Number of edge EFPs EVC Color representing the associated alarm severity Name • Name in card title • Number of instances of domains (VPLS, EoMPLS, bridge, or cross-connect) with a maximum of three lines • Name in card title • Number of instances of domains (VPLS, EoMPLS, bridge, or cross-connect) with a maximum of four lines LSP Endpoint (Working or Protected) Color representing the associated alarm severity Name • Name in card title • Bandwidth • Name in card title • Bandwidth • Attach Business Tag button • Properties button LSP Midpoint Color Name • Name in card title • Forward bandwidth • Reverse bandwidth • Reverse in and out labels • Name in card title • Forward bandwidth • Reverse bandwidth • Reverse in and out labels • Attach Business Tag button • Inventory button • Properties button MPLS-TP Tunnel Color representing the associated alarm severity Name Name in card title and body • Name in card title and body • Attach Business Tag button • Properties button MPLS-TP Tunnel Endpoint Color representing the associated alarm severity Name • Name in card title and body • Tunnel identifier • Name in card title and body • Tunnel identifier • Attach Business Tag button • Inventory button • Properties button Table 3-3 Information Displayed in Element Icons by Size (continued) Element Type Icon Size Tiny (Dot) Normal Large Huge 3-5 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 3 Viewing and Managing NE Properties Information Available in Element Icons Network element Color representing the associated alarm severity Name • Name in card title • Element model • IP address • Software version • Name in card title • Element model • IP address • Software version • Inventory button • Filter Tickets button • Attach Business Tag button Pseudowire Color representing the associated alarm severity Name Name in card title and body • Name in card title and body • Attach Business Tag button • Properties button Pseudowire edge Color representing the associated alarm severity Name • Name in card title • Local IP address • Peer IP address • Name in card title • Local IP address • Peer IP address • Attach Business Tag button • Inventory button • Properties button VLAN Color representing the associated alarm severity Name Name in card title and body • Name in card title • Name in card body • Number of switching entities • Number of edge EFPs VPLS Color representing the associated alarm severity Name • Name in card title • Number of access EFPs • Number of access pseudowires • Number of VPLS forwards • Name in card title • Number of access EFPs • Number of access pseudowires • Number of VPLS forwards VPLS Forward Color representing the associated alarm severity Name • Name in card title • VPN identifier • Number of core pseudowires • Name in card title • VPN identifier • Number of core pseudowires VPN Color representing the associated alarm severity Name Name in card title and body • Name in card title and body • Attach Business Tag button • Properties button Table 3-3 Information Displayed in Element Icons by Size (continued) Element Type Icon Size Tiny (Dot) Normal Large Huge 3-6 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 3 Viewing and Managing NE Properties Viewing the Properties of a Network Element Viewing the Properties of a Network Element You can view the general information about a selected network element in the Prime Network Vision map view and view more detailed information by viewing the Properties window for the selected element. Step 1 To view general information about a network element, hover your mouse cursor over the NE icon, and use the mouse scroll to zoom in and out. Step 2 For more detail, open the Properties (inventory) window, double-click the icon. Depending on your selection, either the Properties window or inventory window is displayed with the inventory window providing slightly more information than the Properties window. Figure 3-1 shows the Properties window. Figure 3-1 Properties Window Table 3-4 describes the information displayed in both the Properties and inventory windows. 3-7 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 3 Viewing and Managing NE Properties Viewing the Properties of a Network Element Table 3-4 Properties and Inventory Windows Field Description General Tab Element icon Icon representing the element in Prime Network Vision and displaying the current color associated with the element operational health. For more information on severity colors, see Prime Network Vision Status Indicators, page 2-16. The icon might include a badge that indicates an alarm or another item of interest associated with the element. For more information about badges, see Network Element Badges, page 3-8. Element Name Name assigned to the element for ease of identification. Communication State Ability of the VNE to reach the network element, according to the health of the element. For more information about communication states, see the Cisco Prime Network 3.10 Administrator Guide. Investigation State Level of network element discovery that has been performed or is being performed by the VNE. For more information about investigation states, see the Cisco Prime Network 3.10 Administrator Guide. Vendor Vendor name, as defined in the device MIB. Product Product name of the element, as defined in the device MIB; for example, Router. Device Series Product series that the device belongs to, such as Cisco 7600 Series Routers. Element Type Element model, such as Cisco 7606. Serial Number1 Serial number of the element. CPU Usage1 Percentage of CPU currently in use by the element. Memory Usage1 Amount of memory currently in use by the element. IP Address IP address used for managing the element. System Name Name of the device, as defined in the device MIB. Up Since Date and time the element was last reset. Contact Email address of the person responsible for the element. Location Physical location of the element, as defined in the device MIB. DRAM Usage1 Percentage of available DRAM currently in use by the element. Flash Device Size1 Amount of flash memory available on the element. NVRAM Size1 Amount of NVRAM available on the element. Software Version Software version running on the element. Software Description Description of the system taken from the element. Processor DRAM1 Amount of DRAM currently in use by the element’s processor. Sending Alarms1 Whether or not the element is configured for sending alarms: True or False. 3-8 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 3 Viewing and Managing NE Properties Viewing the Properties of a Network Element Network Element Badges Network elements and links can also display badges that are technology-specific, such as a Protected LSP or an STP root. Table 3-5 describes some of the badges that are available in Prime Network Vision. For more information, see the related topics. Buttons VNE Details Displays the VNE’s general properties, from where you can edit the VNE’s properties, perform maintenance, configure polling rates, and identify IP addresses for which SNMP syslog and trap events are to be generated. For more information, see: • VNE Properties Window (VNE Status Button in the content pane of the Inventory Window), page 3-16 • Cisco Prime Network 3.10 Administrator Guide VNE Status Displays details about the VNE’s communication and connectivity, such as the status of device protocols and whether the device is sending traps and syslogs. For more information, see VNE Communication Status (VNE Details Button in the content pane of the Inventory Window), page 3-17. 1. Displayed only in the inventory window. Table 3-4 Properties and Inventory Windows (continued) Field Description Table 3-5 Network Element Badges Icon Name Description Related Topic Access gateway An MST or REP access gateway is associated with the element. Viewing Access Gateway Properties, page 13-19 Blocking The element associated with this badge has a REP alternate port. Viewing REP Information in VLAN Domain Views and VLAN Overlays, page 13-62 Clock service A clocking service is running on the associated element. Applying a Network Clock Service Overlay, page 21-49 Lock The associated network LSP is in lockout state. Viewing MPLS-TP Tunnel Properties, page 19-7 Multiple links One or more links is represented by the visual link and at least one of the links contains a badge. Viewing REP Information in VLAN Domain Views and VLAN Overlays, page 13-62 3-9 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 3 Viewing and Managing NE Properties The Inventory Window The Inventory Window Table 3-6 describes the tasks that you can perform from the inventory window and related topics. Reconciliation The element with this badge is associated with a network element that does not exist. For example, the device configuration has changed and a network problem exists. Some elements can be deleted only if their components, such as EFPs, VPLS forwards, or VRFs, display the reconciliation icon. Deleting a Business Element, page 7-7 REP primary blocking The element associated with this badge has a REP primary port that is also blocking. Viewing REP Information in VLAN Domain Views and VLAN Overlays, page 13-62 REP primary The element associated with this badge has a REP primary port. Viewing REP Information in VLAN Domain Views and VLAN Overlays, page 13-62 Redundancy service The element associated with this badge is a backup pseudowire or a protected LSP. • Adding an MPLS-TP Tunnel, page 19-5 • Viewing Pseudowire Redundancy Service Properties, page 13-99 STP root The element associated with this badge is a STP root bridge or the root of an STP tree. Viewing STP Information in VLAN Domain Views and VLAN Overlays, page 13-65 Table 3-5 Network Element Badges (continued) Icon Name Description Related Topic Table 3-6 Tasks Available from Inventory and Related Topics Task Related Topic Add or remove links. Adding Static Links, page 6-15 Generate the Port Utilization graph for physical ports. Generating the Port Utilization Graph, page 3-27 Manage the alarms being sent on a port. Working with Ports, page 3-23 Open Cisco PathTracer and launch a path trace. Using Cisco PathTracer to Diagnose Problems, page 12-1 Open the Prime Network Command Builder to create customized commands. Cisco Prime Network 3.10 Customization Guide 3-10 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 3 Viewing and Managing NE Properties The Inventory Window The inventory window also allows you to view technology-specific information. For more information on viewing technology-specific information in logical inventory or physical inventory, see: • Chapter 13, “Monitoring Carrier Ethernet Services” • Chapter 14, “Monitoring Carrier Grade NAT Properties” • Chapter 15, “Monitoring DWDM Properties” • Chapter 16, “Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties” • Chapter 17, “Monitoring Y.1731 IPSLA Configuration” • Chapter 18, “IPv6 and IPv6 VPN over MPLS” • Chapter 19, “Monitoring MPLS Services” • Chapter 20, “Viewing IP and MPLS Multicast Configurations” • Chapter 21, “Monitoring MToP Services” • Chapter 22, “Viewing and Managing SBCs” • Chapter 23, “Monitoring AAA Configurations” • Chapter 24, “Monitoring IP Pools” • Chapter 25, “Monitoring BNG Configurations” • Chapter 26, “Monitoring Mobile Technologies” • Chapter 27, “Monitoring Data Center Configurations” To open the inventory window, do one of the following: • If the element icon is at the largest size, click the Inventory icon. • Double-click an item in the navigation pane or map. • Right-click an element in the navigation pane or map and choose Inventory. Figure 3-2 shows an example of an inventory window. Open the Prime Network Soft Properties Manager to extend the amount of information displayed. Cisco Prime Network 3.10 Customization Guide Check VNE properties and communication status when inventory is incomplete or missing Checking VNE Connectivity and Communication Status, page 3-16 View physical and logical inventory information. • Viewing the Physical Properties of a Device, page 3-19 • Viewing the Logical Properties of a Network Element, page 3-27 View tickets or events for a device, service, or component. Ticket and Events Pane, page 3-15 Table 3-6 Tasks Available from Inventory and Related Topics (continued) Task Related Topic 3-11 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 3 Viewing and Managing NE Properties The Inventory Window Figure 3-2 Inventory Window The inventory window displays the physical and logical inventory for the selected item. For more information about the options in the inventory window, see: • Navigation Pane, page 3-12 • Device View Pane, page 3-13 • Device View Pane Toolbar, page 3-14 • Ticket and Events Pane, page 3-15 • Content Pane, page 3-13 • Checking VNE Connectivity and Communication Status, page 3-16 1 Navigation pane 6 Content pane 2 Poll Now button (see Performing a Manual Device Poll, page 3-18) 7 Status bar 3 VNE Details button (see VNE Properties Window (VNE Status Button in the content pane of the Inventory Window), page 3-16) 8 Ticket and events pane 4 VNE Status button (see VNE Communication Status (VNE Details Button in the content pane of the Inventory Window), page 3-17) 9 Device view pane 5 Content pane tabs 10 Device view pane toolbar 320084 8 1 2 3 4 6 7 9 10 5 3-12 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 3 Viewing and Managing NE Properties The Inventory Window • Working with Ports, page 3-23 All areas displayed in the inventory window are correlated; this means that selecting an option in one area affects the information displayed in the other areas. The information displayed in the inventory window varies according to the item selected in the navigation pane. To view logical inventory information, expand the Logical Inventory branch. For more information about logical inventory information, see Viewing the Logical Properties of a Network Element, page 3-27. To view physical inventory information, expand the Physical Inventory branch. For more information about physical inventory information, see Viewing the Physical Properties of a Device, page 3-19. Click Poll Now to update the display with the current VNE information. Click the top right corner to close the inventory window. Navigation Pane The navigation pane in the inventory window displays a tree-and-branch representation of the selected device and its modules. The navigation pane contains two main branches: • Logical Inventory—Includes logical items related to the selected element, such as access lists, ATM traffic profiles, and routing entities. • Physical Inventory—Includes the various device components, such as chassis, satellite, cards, subslots, and so on. When you select an item in the navigation pane, the information displayed in the content pane is updated. You can expand and collapse the branches in the navigation pane to display and hide information as needed. The window heading and the highest level in the navigation pane display the name of the VNE given to the element as defined in Cisco Prime Network Administration. The element icon and status are displayed at the top of the navigation and content panes. The color of the element icon reflects the element operational status. For more information about indicators of operational health and status, see: • Prime Network Vision Status Indicators, page 2-16 • VNE Management State, page 2-18 Status Indicators A status indicator icon appears next to the element icon for any unacknowledged tickets associated with the element. In addition, status indicator icons are displayed next to the specific logical or physical inventory branches that are associated with the ticket. If you click a branch in the navigation pane that contains a status icon, the associated tickets and events are displayed in the tickets and events pane at the bottom of the inventory window. 3-13 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 3 Viewing and Managing NE Properties The Inventory Window Communication and Investigation State Icons The navigation pane can also display a communication or investigation state icon next to the element icon in the navigation and content panes. For more information about communication and investigation state icons, see VNE Management State, page 2-18. Content Pane The content pane contains two tabs: • General—Contains physical or logical information specific to the item you select in the navigation pane or device view panel; for example, information about pseudowires or the chassis. The General tab can also display context-sensitive tabs and buttons; the buttons displayed depend on your selection in the navigation pane or device view panel. For example, if an ATM port is selected, the Show VC Table, Show Cross-Connect, or Show Encapsulation button might be displayed. • Ports—Lists all ports on the device with their current alarm status, location, and other properties, and enables you to change their status by using a right-click menu. For more information, see Working with Ports, page 3-23. The content pane can also display context-sensitive tabs and buttons; the buttons displayed depend on your selection in the navigation pane or device view panel. For example, if an ATM port is selected, the Show VC Table, Show Cross-Connect, or Show Encapsulation button might be displayed. In addition, you can view the properties of a row in a table by double-clicking the row or by right-clicking the row and choosing Properties. For information about tables that appear in the content pane, see Filtering and Sorting Tabular Content, page 2-40. Device View Pane The device view pane enables you to visually locate elements in the chassis and identify their status. All occupied slots in the chassis are rendered in the device view pane. If a port is down, it is shown in red in both the navigation pane and the device view pane, allowing you to quickly pinpoint the problem. Figure 3-3 provides an example of the device view pane for a Cisco device. The circled slot in the device view pane corresponds to the circled slot in the physical inventory navigation pane. If you click a port in the device view pane (see the circled port), Prime Network Vision displays both the properties of the element and its location in the navigation pane and content pane. 3-14 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 3 Viewing and Managing NE Properties The Inventory Window Figure 3-3 Device View Pane Device View Pane Toolbar The following tools for working with the device view pane: Icon Description Displays an enhanced view of the components within the device in a browse box as you move over the device view panel with the selection tool. Fits the entire view of the element in the device view panel. 3-15 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 3 Viewing and Managing NE Properties The Inventory Window Ticket and Events Pane The ticket and events pane is displayed at the bottom of the inventory window and contains the following tabs: • Tickets—Displays the tickets that are collected on the selected element, service, or component in the navigation pane. Table 10-3 on page 10-5 describes the information that is available in the Tickets tab. • Network Events—Displays all active network events associated with tickets and alarms, and all archived events with a timestamp that falls within the specified events history size (see Adjusting the Prime Network Vision GUI Client Settings, page 2-39). Table 3-7 describes the information that is available in the Network Events tab. • Provisioning Events—Available to users with the Configurator role or higher for the selected element. This tab displays provisioning events with their source in the selected element and with a timestamp that falls within the specified events history size (see Adjusting the Prime Network Vision GUI Client Settings, page 2-39). All activations that occur are also included in this tab. Table 9-4 on page 9-5 describes the information that is available in the Provisioning Events tab. Note Provisioning events that are caused by workflows (AVM 66) are not displayed in this table even if the element is affected by the workflow. Table 3-7 Network Events Tab in Logical Inventory Field Description Severity Icon indicating the severity of the alarm on the event Event ID Event identifier, assigned sequentially. Time Date and time when the event occurred and was logged and recorded. Description Description of the event. Location Entity that triggered the event. Detection Type Method by which the event was detected, such as Service or Syslog. Alarm ID Identifier of the alarm associated with the event. Ticket ID Identifier of the ticket associated with the event. Causing Event ID Identifier of the causing event. Duplication Count For network events, the duplication count is calculated by the VNE and pertains only to flapping events. The duplication count represents the number of noncleared events aggregated by the flapping event. Reduction Count For network events, the reduction count is calculated by the VNE and pertains only to flapping events. The reduction count represents the number of events that are aggregated by the flapping event. Archived Whether the event is archived: True or False. 3-16 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 3 Viewing and Managing NE Properties Checking VNE Connectivity and Communication Status When displaying network and provisioning events, Prime Network Vision monitors the history size value defined in the Events tab of the Options dialog box (Tools > Options > Events). The default value is six hours and can be changed in Prime Network Administration. In addition, Prime Network Vision limits the maximum number of network and provisioning events that are sent from the server to client to 15,000 each. If the number of network or provisioning events exceeds the limit specified in the Options Events tab or the 15,000 maximum limit, Prime Network Vision purges the oldest events from table. The purging mechanism runs once per minute. Tip You can display or hide the ticket and events pane by clicking the arrows displayed below the device view panel. Checking VNE Connectivity and Communication Status Virtual Network Elements (VNEs) are the Prime Network entities that simulate managed devices. Each VNE is assigned to manage a single network element instance and is designated by the NE name and IP address. VNEs are created using the Prime Network Administration GUI client. After a VNE is created and started, Prime Network investigates the network element and automatically builds a live model of it including its physical and logical inventory, configuration, and status. As different VNEs build their model, a complete model of the network is created. For the most part, VNE operations are hidden from Prime Network Vision GUI client users because those users are interested in devices, not these back-end processes. But VNEs must have connectivity to a device in order to maintain the NE model. To provide connectivity and polling information, you can view VNE properties from the device inventory: • VNE Status to view the VNE Properties window. This window provides details such as the VNE’s protocol and polling settings and other configuration information. See VNE Properties Window (VNE Status Button in the content pane of the Inventory Window), page 3-16. • VNE Details to view more details about device and VNE connectivity. See VNE Communication Status (VNE Details Button in the content pane of the Inventory Window), page 3-17. VNE Properties Window (VNE Status Button in the content pane of the Inventory Window) Figure 3-4 provides an example of a VNE properties window. This VNE is modeling a Cisco 3620 router. 3-17 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 3 Viewing and Managing NE Properties Checking VNE Connectivity and Communication Status Figure 3-4 VNE Properties Window Note VNE status is not the same as device status. A device may be fully reachable and operating even though the VNE status is Down, Unreachable, or Disconnected. The Cisco Prime Network 3.10 Administrator Guide describes these properties in detail, but for a Prime Network Vision GUI Client user, probably the most important information is the VNE status. VNE Communication Status (VNE Details Button in the content pane of the Inventory Window) Figure 3-5 provides an example of a VNE Status Details window for a different VNE. This window provides information about the VNE and device connectivity. 3-18 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 3 Viewing and Managing NE Properties Checking VNE Connectivity and Communication Status Figure 3-5 VNE Status Details Window The VNE Status Details window provides this information about the VNE: • Its management connectivity state, which has to do with how the VNE was configured • The protocols the VNE is using to communicate with the device and the status of each • Whether the device is generating syslogs or traps In the Management State area, if the Reduced Polling field is true and the Investigation State is Currently Unsychronized, refer to the information in the topic Performing a Manual Device Poll, page 3-18. This information can be useful to users who are troubleshooting device problems. For more information about the VNE Status Details window, see the Cisco Prime Network 3.10 Administrator Guide. Performing a Manual Device Poll The VNE settings determine how often a VNE polls a device to update its model. Some VNEs use the reduced polling (also called event-based polling) mechanism. A reduced polling VNE polls the device when a configuration change syslog is received and immediately updates the VNE information accordingly. In other words, updates are driven by incoming events. The risk with reduced polling is dropped events. But if an event is dropped, the network element shows a Currently Unsynchronized investigation state. If you notice this VNE state, initiate polling by right-clicking the element and choosing VNE Tools > Poll Now. For more information about reduced polling, see the Cisco Prime Network 3.10 Administrator Guide. 3-19 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 3 Viewing and Managing NE Properties Viewing the Physical Properties of a Device Viewing the Physical Properties of a Device Each device that is managed by Prime Network is modeled in the same manner. The physical inventory reflects the physical components of the managed network element, as shown in Table 3-8. Physical inventory is continuously updated for both status and configuration. The addition of a new card, the removal of a card, or any change to the device is reflected by the VNE and updated instantly. If you physically remove an item that Prime Network Vision is managing, the following changes occur in physical inventory, depending on the item removed: • Removing an item other than a pluggable transceiver results in the following changes: – The color of the icon in physical inventory changes to black. – The item’s status changes to Out. The other properties of the removed item reflect the most recent value that was updated from the device with the following exceptions: – Cards—If the card was participating in a card redundancy configuration, the redundancy state changes to None. – Port—The operational status of the port changes to Down. • Removing a pluggable transceiver results in the following changes: – The color of the pluggable transceiver icon changes to gray. – The pluggable transceiver status changes to Disabled. – In the Pluggable Transceiver panel: — The properties are no longer displayed. — The connector type changes to Unknown. — The pluggable port state changes to Out. Table 3-8 Physical Inventory Icons Icon Device Chassis Satellite Shelf Card/Subcard Port/Logical Port Pluggable Transceiver Unmanaged Port 3-20 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 3 Viewing and Managing NE Properties Viewing the Physical Properties of a Device Fans and power supplies are displayed in physical inventory if they are field replacable units (FRUs). The manner in which the fans are displayed depends on whether the fans can be separated or not: • If the fans under the fan trays are inseparable, only the fan trays are represented. • If the fans under the fan trays can be separated, they are shown as separate items in physical inventory. The window displayed for all the devices is similar in appearance. However, the individual sections that are displayed depends on the selected item. For example, when a port that supports pluggable transceivers is selected, the Pluggable Transceiver section is displayed. This section provides information such as the port connector’s type and serial number, as well as an indication whether a transceiver is currently plugged in. Figure 3-6 shows an example of a selection in physical inventory and the available buttons. Figure 3-6 Physical Inventory Example 3-21 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 3 Viewing and Managing NE Properties Viewing the Physical Properties of a Device The buttons that are displayed in the physical inventory content pane depend on the selected port. For information about configuring topology from a port, see Adding Static Links, page 6-15. For a detailed description of device properties, see Viewing the Properties of a Network Element, page 3-6. Redundancy Support In Prime Network, redundancy is modeled as part of the physical inventory. You can view the redundancy parameters including the following: • Redundancy Configured—Indicates whether redundancy is configured for the Route Switch Processor (RSP) or Route Processor (RP) card. This parameter displays “Working” if redundancy is configured and “None” if it is not configured. • Redundancy Status—Indicates the redundancy status of the RSP or RP card, which can be Active or Standby Mode. • Redundancy Type—The type of redundancy, which can be Stateful or Stateless. This parameter is available only for Cisco ASR9000 and Cisco ASR903 series routers. 1 Poll Now button Poll the VNE and update the information as needed. For more information, see Performing a Manual Device Poll, page 3-18. 2 Show VC Table button Displays virtual circuit (VC) information for the selected port. For more information, see Viewing ATM VPI and VCI Properties, page 21-10. 3 Show Cross Connect button Displays cross-connect information for incoming and outgoing ports. For more information, see Viewing ATM Virtual Connection Cross-Connects, page 21-6. 4 Show Encapsulation button Displays encapsulation information for incoming and outgoing traffic for the selected item. For more information, see Viewing Encapsulation Information, page 21-11. 5 Disable Sending Alarms button Enables you to manage the alarms on a port. For more information, see Working with Ports, page 3-23. 6 Port Utilization Graph button Displays the selected port traffic statistics: Rx/Tx Rate and Rx/Tx Rate History. For more information, see Generating the Port Utilization Graph, page 3-27. — Show DLCI Table button (not displayed) Displays data-link connection identifier (DCLI) information for the selected port. 3-22 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 3 Viewing and Managing NE Properties Viewing the Physical Properties of a Device • Redundancy Info—Provides information about the redundancy technology that is configured. For example, Nonstop Routing (NSR), Stateful Switchover (SSO), or Route Processor Redundancy (RPR). This parameter is available only for Cisco ASR9000 and Cisco ASR903 series routers. Note If SSO is configured, then the Redundancy type will be Stateful. If RPR is configured, then the Redundancy Type will be Stateless. Viewing Satellite Properties Prime Network provides satellite support for Cisco Aggregation Service Router (ASR) 9000 series network elements. Satellites are used to enhance performance bandwidth of Cisco ASR 9000 network elements. Each satellite is modeled as a chassis in the physical inventory. To view the satellite properties: Step 1 In Cisco Prime Network Vision, double-click the required device. Step 2 In the Inventory window, choose Physical Inventory > Satellite. Satellite is modeled as a type of chassis in the physical inventory. Figure 3-7 shows an example of the information (including the slots) displayed when a satellite is selected in the physical inventory branch of the inventory window. Figure 3-7 Satellite Properties 3-23 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 3 Viewing and Managing NE Properties Working with Ports One or more satellites are connected to the host Cisco ASR 9000 series network element by using the physical ethernet links, which also act as inter-chassis links (ICLs) for connecting the satellites with the other chassis or satellites within the host. To view the satellite ICLs, choose the Satellite ICL container in the logical inventory of the device. The content pane displays a list of satellite ICLs with the following details. Working with Ports The following topics describe some of the options available for working with ports: • Viewing Port Status and Properties, page 3-23 • Viewing a Port Configuration, page 3-25 • Disabling and Enabling Alarms, page 3-26 • Generating the Port Utilization Graph, page 3-27 Viewing Port Status and Properties Prime Network Vision displays all ports on a device in the Ports tab in the inventory window. This information is available to users with an Operator or higher role on the selected device. Users with a Configurator or higher role can modify the status of a single port or a selected group of ports as described in the following sections: • Disabling and Enabling Alarms, page 3-26 • Generating the Port Utilization Graph, page 3-27 You can export the port list from Prime Network Vision by using the Export to CSV option in the toolbar. Figure 3-8 shows an example of the Ports tab in the inventory window. Table 3-9 Satellite ICL Properties Field Description Host Interface Interface by which satellite is configured on the host network element. Click the hyperlink to view the interface properties in the physical inventory. Satellite IC Interface Inter-chassis interface used by the satellite. Click the hyperlink to view the satellite interface properties in the physical inventory. Satellite ID Satellite ID. Click the hyperlink to view the satellite properties in the physical inventory. Satellite Port Range Port associated with the satellite. Satellite Status Connection status of the satellite: Connected or Disconnected. Fabric Link Status Status of the fabric link connected to the satellite. 3-24 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 3 Viewing and Managing NE Properties Working with Ports Figure 3-8 Ports Tab in the Inventory Window Table 3-10 describes the information that is displayed in the Ports tab. Table 3-10 Ports Tab in the Inventory Window Field Description Location Location of the port in the device, using the format slot.module/port, such as 1.GigabitEthernet1/14. Type Port type, such as RJ45 or Pluggable. Sending Alarms Whether or not the port is configured for sending alarms: True or False. Pluggable Transceiver For the Pluggable port type, indicates that the port can hold a pluggable transceiver. Port Alias Name used in the device CLI or EMS for the port. Managed Whether or not the port is managed: True or False. Status Port status, such as OK, Major, or Disabled. 3-25 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 3 Viewing and Managing NE Properties Working with Ports Viewing a Port Configuration In addition to viewing logical inventory information from the logical inventory branch, you can view services provisioned on physical ports by clicking a physical port in the physical inventory branch. Information that is displayed includes: • Physical layer information. • Layer 2 information, such as ATM and Ethernet. • Subinterfaces used by a VRF. To view a port’s configuration: Step 1 In Cisco Prime Network Vision, double-click the required device. Step 2 In the inventory window, choose Physical Inventory > Chassis > Slot > Subslot > Port. Figure 3-9 shows an example of the information (including the subinterfaces) displayed when a port is selected in the physical inventory branch of the inventory window. Figure 3-9 Port Information in the Inventory Window 3-26 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 3 Viewing and Managing NE Properties Working with Ports The subinterface is a logical interface defined in the device; all of its parameters can be part of its configuration. Table 3-11 describes the information that can be displayed in the Subinterfaces table. Not all fields appear in all Subinterfaces tables. Disabling and Enabling Alarms By default, alarms are enabled on all ports. When the alarms are disabled on a port, no alarms are generated for the port and they are not displayed in the ticket and events pane. To disable alarms on ports: Step 1 Open the inventory window for the required device. Step 2 To disable alarms on individual ports, right-click the port and choose Disable Sending Alarms. The Sending Alarms field displays the value false, indicating that the alarm for the required port has been disabled, and the content pane displays the Enable Sending Alarms button. Table 3-11 Subinterfaces Table Field Description Address IP address defined in the subinterface. Mask Subnet mask. VLAN Type Type of VLAN, such as Bridge or IEEE 802.1Q. Double-click the entry to view the Port IP VLAN Properties window containing: • VLAN type • VLAN identifier • Operational status • A brief description of the VLAN Operational State Operational state of the subinterface. VLAN ID VLAN identifier. Inner VLAN CE-VLAN identifier. IP Interface IP interface, hyperlinked to the VRF properties in the inventory window. VRF Name Name of the VRF. Is MPLS Whether this is an MPLS interface: True or False. VC Virtual connection (VC) configured on the interface, hyperlinked to the VC Table window. For more information about VC properties, see Viewing ATM Virtual Connection Cross-Connects, page 21-6. Tunnel Edge Hyperlinked entry to the specific tunnel edge in logical inventory. Binding Hyperlinked entry to the specific bridge or pseudowire in logical inventory. 3-27 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 3 Viewing and Managing NE Properties Viewing the Logical Properties of a Network Element Step 3 To disable alarms on one or more ports at the same time: a. In the inventory window, click the Ports tab. b. In the Ports table, select the required ports. You can select multiple ports by using the Ctrl and Shift keys. c. Right-click one of the selected ports, and choose Disable Sending Alarms. In response, the Sending Alarms field displays the value false for the selected ports. To enable alarms, use the previous procedure but choose Enable Sending Alarms. Generating the Port Utilization Graph Prime Network Vision enables you to view the Rx/Tx Rate and Rx/Tx Rate History of a port. Note Port utilization graphs are for physical ports only. Port utilization graphs are not available for ATM, E1/T1, or ATM IMA interfaces that are included in an IMA group. To view port utilization statistics: Step 1 Open the inventory window and select the required port in physical inventory. Step 2 In the Ethernet CSMA/CD section, click Port Utilization Graph. The following information is displayed in the Port Statistics dialog box: • Rx Rate—The reception rate as a percentage. • Rx Rate History—The reception rate history is displayed as a graph. • Tx Rate—The transmission rate as a percentage. • Tx Rate History—The transmission rate history is displayed as a graph. Step 3 Click to close the Port Statistics dialog box. Viewing the Logical Properties of a Network Element Prime Network Vision enables you to view logical inventory information. Prime Network Vision maintains logical inventory for each network element. The logical inventory reflects dynamic data such as configuration data, forwarding, and service-related components that affect traffic handling in the element. The information displayed in the inventory window changes according to the type of element and branch selected in the navigation pane. 3-28 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 3 Viewing and Managing NE Properties Viewing the Logical Properties of a Network Element Logical Inventory Window Logical inventory information is displayed in the inventory window as shown in Figure 3-10. Figure 3-10 Logical Inventory Information Displayed in the Inventory Window Note For more information about opening the inventory window, see The Inventory Window, page 3-9. 3-29 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 3 Viewing and Managing NE Properties Viewing the Logical Properties of a Network Element Logical Inventory Navigation Pane Branches Table 3-12 describes the branches that appear in the logical inventory navigation pane. Table 3-12 Logical Inventory Navigation Pane Branches This branch... Provides information about... 6rd IPv6 rapid development (6rd) tunnels Access Gateway Multiple Spanning Tree (MST) and Resilient Ethernet Protocol (REP) access gateways (AGs) Access Lists Access lists ATM Traffic Profiles Traffic profiles for ATM Bidirectional Forwarding Detection Bidirectional Forwarding Detection BridgeILans Provider Backbone Bridge (PPB) Bridges Configured VLANs Carrier Grade NAT Carrier Grade Name Address Translation (NAT) CFM Connectivity Fault Management (CFM) Cisco Discovery Protocol Cisco Discovery Protocol (CDP) Clock Network clock service, clock recovery, and Precision Time Protocol (PTP) configuration Context Name Context that is configured on devices that support multiple virtual contexts Ethernet Link Aggregation Ethernet aggregation groups Ethernet LMI Ethernet Local Management Interface (LMI) Frame Relay Traffic Profiles Traffic profiles for Frame Relay GRE Tunnels Generic routing encapsulation (GRE) tunneling protocol for IP tunnels ICCP Redundancy Inter-Chassis Communication Protocol (ICCP) redundancy groups IMA Groups Inverse Multiplexing over ATM (IMA) groups IP SLA Responder Cisco IOS Service Level Agreements (SLAs) IS-IS Intermediate System-to-Intermediate System (IS-IS) protocol Link Layer Discovery Protocol Link Layer Discovery Protocol (LLDP) Local Switching Local switching LSEs Local switching for MPLS interfaces MLPPP Multilink Point-to-Point (MLPPP) configurations Modular OS Modular operating systems for Cisco IOX XR devices MPBGPs Properties associated with provider edge (PE) network elements. The Multiprotocol Border Gateway Protocols (MP-BGPs) inventory folder contains information such as BGP identifier, local and remote Autonomous System (AS), VRF name, cross-VRF routing, and so on. 3-30 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 3 Viewing and Managing NE Properties Viewing the Logical Properties of a Network Element Logical Inventory Navigation Pane Icons Each branch in the logical inventory navigation pane is represented by an icon and, if appropriate, includes an icon indicating the status. Table A-3, “Logical Inventory Icons” describes the icons used in the logical inventory navigation pane. Logical Inventory Content Pane Tabs Table 3-13 describes the tabs that are displayed in the logical inventory content pane when you select Logical Inventory, depending on the device configuration. Note Prime Network Vision does not display the tabs in Table 3-13 for devices that support multiple contexts. Instead, when you select Logical Inventory for a device that contains multiple contexts, Prime Network Vision displays a Contexts table that lists the contexts configured on the device. MPLS-TP MPLS Transport Profile (MPLS-TP). OAM Link operations, administration, and maintenance (OAM). Operating System Operating systems for Cisco IOS devices. OSPF Processes OSPF processes, such as the Shortest Path First (SPF) timer settings, OSPF neighbors, and OSPF interfaces. Pseudowires Pseudowire end-to-end emulation (PW3E) tunnels. Resilient Ethernet Protocol Resilient Ethernet Protocol (REP). Routing Entities Routing table entries and IP interfaces. Session Border Controller Session Border Controller (SBC) configuration. Spanning Tree Protocol Spanning Tree Protocol (STP) and Multiple Spanning Tree Protocol (MSTP) configurations. Traffic Engineering Tunnels Traffic engineering (TE) tunnels. Tunnel Traffic Descriptors Tunnel traffic descriptors associated with the element. VC Switching Entities Cross-connects and VC traffic. VRFs Virtual Routing and Forwarding (VRF). VSIs Virtual Switch Interface (VSI) instance names, associated pseudowire information, virtual circuit IDs, and so on. VTP VLAN Trunk Protocol (VTP) domain names, modes, version numbers, and so on. Table 3-12 Logical Inventory Navigation Pane Branches (continued) This branch... Provides information about... 3-31 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 3 Viewing and Managing NE Properties Viewing Device Operating System Information Viewing Device Operating System Information Prime Network Vision discovers and automatically displays operating system information for Cisco IOS, Cisco IOS XR, and Cisco IOS XE devices in logical inventory. For other devices, choose the element name at the top of the inventory window navigation pane. To view operating system information for Cisco IOS, Cisco IOS XR, or Cisco IOS XE devices: Step 1 In Prime Network Vision, double-click the required device. Step 2 For a Cisco IOS device, view information about the operating system by clicking Logical Inventory and choose the Operating System tab. Table 3-14 describes the information that is displayed in the Operating System tab. Table 3-13 Logical Inventory Content Pane Tabs Tab Description Data Link Aggregation Containers Lists the data link aggregations configured on the selected entity, such as Ethernet link aggregations. Encapsulation Aggregation Containers Lists the encapsulation aggregations configured on the selected entity. Forwarding Component Containers Lists the context profiles for which logical inventory information can be displayed, such as routing entities and bridges. Operating System Provides information about the operating system on the selected entity. Physical Layer Aggregation Containers Lists aggregations configured at the physical layer for the selected entity, such as IMA groups. Processes Lists the processes running on the selected entity, such as Clock or CDP. Traffic Descriptors Lists the profiles for which logical inventory information can be displayed, such as Frame Relay traffic profiles and Address Resolution Protocol (ARP) entities. Tunnel Containers Lists the types of tunnels that are configured on the selected entity, such as pseudowires or GRE tunnels. Table 3-14 Operating System Information in Logical Inventory Field Description Is K9Sec Whether or not the K9 security feature is enabled on the operating system: True or False Family Cisco family, based on the device platform, such as CRS_IOS or C12K_IOS_XR. SDR Mac Addr Secure Domain Router (SDR) MAC address. This field applies to Cisco IOS XR devices only. Software Version Cisco IOS software version, such as 12.2(33)SRC3, Release Software (fc2). 3-32 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 3 Viewing and Managing NE Properties Viewing Device Operating System Information Step 3 For a Cisco IOS XR device, view information about the operating system by opening the inventory window and choosing Logical Inventory > Modular OS. Figure 3-11 shows an example of the information that is displayed for Cisco IOS XR devices. Figure 3-11 Modular OS Information in Logical Inventory Table 3-15 describes the information that is displayed for Cisco IOS XR system. Boot Software Cisco IOS system image information. ROM Version Cisco IOS bootstrap software version, such as 12.2(17r)SX3. Table 3-14 Operating System Information in Logical Inventory (continued) Field Description Table 3-15 Modular OS Information in Logical Inventory Field Description Is K9Sec Whether or not the K9 security feature is enabled on the operating system: True or False Cw Family Cisco family, based on the device platform, such as CRS_IOS_XR or C12K_IOS_XR. SDR Mac Addr Secure Domain Router (SDR) MAC address. OS Version Cisco IOS XR software version, such as 3.8.0[00]. 3-33 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 3 Viewing and Managing NE Properties Running an Activation from the Activation Menu Table 3-16 describes the information that is displayed for modular operating systems in the Operating System tab. Running an Activation from the Activation Menu You can run activation wizards from the GUI client using the Activations main menu. These are wizards that have been created using the Activation Wizard Builder (AWB), which is described in the Cisco Prime Network 3.10 Customization Guide. You can only run activations on devices that are within your device scope. Boot Software Cisco IOS XR system image information. SDR Name SDR name. SDR Id SDR identifier. ROM Version Cisco IOS XR bootstrap software version, such as 1.51. RAM Size Size, in kilobytes, of the device processor RAM. OS Packages Table Package Info Information on the individual package and its version, such as disk0:hfr-admin-3.9.3.14 Package Description Description of the package, such as FPD (Field Programmable Device) Package. Composite Name Composite package name of the package with the date and time, such as: Tues Feb 8 20:37:07.966 UTC disk0:comp-hfr-mini-3.9.3.14 Table 3-15 Modular OS Information in Logical Inventory (continued) Field Description Table 3-16 Modular OS Information in Operating System Tab Field Description Is K9Sec Whether or not the K9 security feature is enabled on the operating system: True or False Family Cisco family, based on the device platform, such as CRS_IOS_XR or C12K_IOS_XR. Software Version Cisco IOS XR software version, such as 4.0.0[Default]. SDR Mac Addr Secure Domain Router (SDR) MAC address. Boot Software Cisco IOS XR system image information. SDR ID SDR identifier. SDR Name SDR name. ROM Version Cisco IOS XR bootstrap software version, such as 1.54. 3-34 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 3 Viewing and Managing NE Properties Running an Activation from the Activation Menu These topics describe how to run activations: • Network Activation Window, page 3-34 • Running Activations, page 3-34 • Searching for Activations (Activation History), page 3-35 • Rolling Back an Activation, page 3-35 • Cloning an Existing Activation, page 3-36 • Deleting Activations, page 3-36 Network Activation Window Operators can access Activation wizards by launching them from the Activation menu in Prime Network Vision. The window is divided into the following parts. Running Activations Activations can be launched from the Prime Network Vision GUI client. Note The Cisco Developer Network (CDN) has some scripts that you can use as examples for using the framework. Other activation scripts are only available through Cisco Advanced Services. Step 1 From the Vision main menu, choose Activation > Activation. This opens a menu that lists the activations that the user can launch, depending on their user access role. Step 2 Expand the tree and highlight the activation wizard you want to launch, and click Next. Step 3 Enter all of the required data. You can only run activations on devices that are within your device scope. Step 4 Check your entries and preview your changes: a. Click the User Input tab and check all of the values you entered. b. Click the Preview Configuration tab, which displays and validates the CLI commands that will be run on the device. It also highlights any errors so that you can make corrections to your input. Activation Menu Choices Description Activation Displays available activation wizards. From here operators can launch the wizards, enter the necessary information, and run the activation. Activation History Displays all the activations that have been executed. Activation Modification Utility Used by activation planners to download and upload wizard files. Tip A best practice is to use the AWB to upload and download wizard files. 3-35 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 3 Viewing and Managing NE Properties Running an Activation from the Activation Menu Step 5 Run the activation. Note You might be prompted to enter your device access credentials. Once you have entered them, these credentials will be used for every subsequent activation in the same GUI client session. If you want to change the credentials, click Edit Credentials. Step 6 View the output: a. Select the activation in the Activation History window, right-click and choose Show Output. The information presented in similar to the data displayed in Step 4 except it reflects the real runtime results. – Workflow Output—The sequence of commands that were run on the devices. – CLI Output—The actual CLI commands that were executed for the selected activation (for activations with an Add operation and a Done state). b. If you want to view the output at a later time, export the activation to a local drive by clicking Export to File. We recommend that you do not change the file type in case you seek help from a support team. Searching for Activations (Activation History) The Activation History window displays information about executed activations, even if the activations failed. The window displays a user-friendly search tools that allow you to locate specific activations and filter the results. A counter displays the total number of activations in the system. Keep the following in mind when using the Activation History window: • Searches are case-insensitive and wild card characters are not supported. • Results are returned only if the utility can match attributes with data in the database. If the search results display any empty fields, this is most likely because the search criteria was not entered correctly. If you confirm that the attributes were entered correctly and the fields are still empty, the attributes were probably not used by the activation so they were not saved in the database. Rolling Back an Activation Completed activations can be deactivated—that is, rolled back—to return a device to its original configuration. The rollback is a best effort; in some cases complete rollbacks may not be possible. Before you roll back and activation, you can preview the CLI configuration sequence that will be executed before the rollback is performed. Step 1 From the Activation menu, choose Activation History. The Activation History window displays a list of recent activation attempts. Step 2 If necessary, search for the desired activation (see Searching for Activations (Activation History), page 3-35). 3-36 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 3 Viewing and Managing NE Properties Running an Activation from the Activation Menu Step 3 Select the activation and view its details. Activations can be rolled back if the Operation column displays Add and the State column displays Done. Note You can attempt a deactivation on an aborted activation to clean up partial rollbacks, but the cleanup is a best effort. Step 4 Right-click the selected activation and choose Deactivate Preview. You should verify the information in the User Input tab and the Preview configuration tab (errors will be highlighted). If you want to test the deactivation on a single device before performing it on all selected devices, export the preview deactivation sequence to you local drive using Export to File. Then you can copy and paste the commands to a specific device. Step 5 Right-click the selected activation and choose Deactivate. Step 6 On the confirmation dialog box, click Yes and Close. Cloning an Existing Activation Cloning is useful when you know you will have to repeat an activation in the future. The cloning process saves all of the values that you entered in the original activation. This is useful when you have to perform a deactivation, but you know it will be followed be a re-activation with the same settings. Step 1 From the Activation menu, choose Activation. Step 2 Select the activation that you want to clone and click Clone Activation. The Activation History window is displayed. Step 3 Search for the specific activation deployment that contains the settings you want to clone. Note The search results return the search based on the activation you have selected. Step 4 Click OK. The activation clone is created. Deleting Activations Users with Administrator privileges can delete activations and activation templates from the Prime Network Administrator GUI client. Executed activations are automatically purged from the Prime Network database according to the purging settings set by the administrator. For more information on the Administrator GUI client, see the Cisco Prime Network 3.10 Administrator Guide. 3-37 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 3 Viewing and Managing NE Properties Configuring and Viewing NEs using Basic Management Commands Configuring and Viewing NEs using Basic Management Commands The following commands are provided by Prime Network ‘out-of-the-box’ and can be used for basic management of a device. These commands can be launched from the inventory by right-clicking an NE and selecting Commands. Before executing any commands, you can preview them and view the results. If desired, you can also schedule the commands, if you have user permissions to do so. Figure 3-12 illustrates how to launch these commands. Figure 3-12 Basic Operation Commands Note To view the basic operation commands in the Cisco Carrier Packet Transport (CPT) System, you must right-click the Cisco Carrier Packet Transport (CPT) System in the Prime Network Vision List or Map View and click Logical Inventory > CPT Context Container. 1 Menu Bar 5 Ticket Pane 2 Tool bar 6 Hide/display Ticket Pane 3 Device Right-click Menu 7 Navigation Pane 4 Status Bar 3-38 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 3 Viewing and Managing NE Properties Configuring and Viewing NEs using Basic Management Commands The basic operation commands in this chapter can be executed by all network elements that run on Cisco IOS software, Cisco IOS XR software, and Cisco NX OS software. You will not be able to execute these commands on network elements that have Cisco Catalyst OS software. To find out if a device supports these commands, see the Cisco Prime Network 3.10 Supported Cisco VNEs. Note You might be prompted to enter your device access credentials. Once you have entered them, these credentials will be used for every subsequent execution of a command in the same GUI client session. If you want to change the credentials, click Edit Credentials. Edit Credentials button will not be available for SNMP commands or if the command is scheduled for a later time. These topics describe the commands you can run on different NEs. • Port Commands, page 3-38 • Interface Commands, page 3-39 • IP Routing Commands, page 3-41 • VRF Commands, page 3-41 • ACL Commands, page 3-42 • Server Setting Commands, page 3-42 • Syslog Host Logging Command, page 3-43 • SNMP Configuration SNMP Trap Commands, page 3-44 • Device Configuration Files and Memory Commands, page 3-46 • Show Users (Telnet Sessions) Command, page 3-47 • Ping Destination from Device Command, page 3-47 Port Commands To use the basic port commands, right-click a port and choose Commands. You can change a port description, change a port status, or assign/deassign a port to VLANs. Before running the command, click Preview to check the results before executing the command. To use these commands, open the physical inventory, right-click the port you are interested in and choose Commands and a command from the following table. Command Input Parameter and Notes Configuration > Add port description New description for port Configuration > Remove port description N/A; performed from command launch point Configuration > Update port description Updated description for port Configuration > Change Port Status Shutdown or No Shutdown Configuration > Assign Port To Vlan VLAN ID: An identifier, between 1-4094. 3-39 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 3 Viewing and Managing NE Properties Configuring and Viewing NEs using Basic Management Commands Interface Commands Prime Network supports these interface commands: • Add, Update, Remove Interface Configuration, page 3-39 • Enable, Disable Interface, page 3-40 • Add Loopback Interface, page 3-40 • Remove Rate Limit, page 3-41 Add, Update, Remove Interface Configuration To assign properties to a physical interface: Step 1 In the Network Vision List or Map View, open the physical inventory and navigate to the physical interface. Step 2 Right-click the interface and choose Commands > Configuration > Add Interface Configuration. Step 3 Enter the value for the following parameters. Step 4 Preview, schedule, or execute the command. To update or remove the configured properties from an interface, use this procedure. For the update operation, you can only change the interface description. Step 1 In the Network Vision List or Map View, open the logical inventory. Step 2 Click Routing Entities > Routing Entity. Configuration > DeAssign Port To Vlan N/A; performed from command launch point Physical Inventory > Ethernet Slot > Commands > Configuration > Modify Port This command is applicable only for Cisco ASR 5000 series network elements. Input Parameters: Delete Bind Interface, Context Name, Bind Interface Name, Delete Description, Description, Shutdown, Delete Link-aggregation, Link-aggregation Group ID, Link-aggregation mode, Link-aggregation Rate, Link-aggregation Timeout Command Input Parameter and Notes Input Parameter Description and Notes IP Address Type IP address family (IPv4 or IPv6) IP Address IP address (IPv4 or IPv6) Mask Subnet mask Description Interface description 3-40 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 3 Viewing and Managing NE Properties Configuring and Viewing NEs using Basic Management Commands Step 3 Do one of the following: • To update the interface description, right-click the interface and choose Commands > Configuration > Remove Interface Configuration. • To delete the properties from the interface, right-click the interface and choose Commands > Configuration > Remove Interface Configuration. Step 4 Preview the command, and then execute it. Enable, Disable Interface To enable or disable an interface on an NE: Step 1 In the Network Vision List or Map View, open the logical inventory. Step 2 Click Routing Entities > Routing Entity. Step 3 Choose Commands > Configuration > Enable Interface or Commands > Configuration > Disable Interface. Step 4 Preview the command, and then execute it. Add Loopback Interface To add a loop back interface to a selected network element: Step 1 In the Network Vision List or Map View, open the physical inventory and navigate to the physical interface. Step 2 Right-click the interface and choose Commands > Configuration > Add Interface Configuration. Step 3 Enter the value for the following parameters. Step 4 Preview, schedule, or execute the command. Input Parameter Description and Notes IP Address Type IP address family (IPv4 or IPv6) IP Address IP address (IPv4 or IPv6) Loopback ID Loopback identifier for the IP address Mask Subnet mask 3-41 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 3 Viewing and Managing NE Properties Configuring and Viewing NEs using Basic Management Commands Remove Rate Limit Note This command is not supported on Cisco IOS XR software. IP Routing Commands Use these commands to list IP interfaces and display IP routes for a device. VRF Commands Use these commands to display the routing table and perform trace route for a selected VRF. Command Description and Notes Configuration > System > Remove Rate Limit. Removes rate limit configuration for an interface. Command Input Parameters and Notes Show > IP > Interface Brief Lists all IP interfaces on a device. No inputs required for Cisco IOS devices. Following inputs are required for Cisco IOS XR devices: • IP Interface Type • Interface Name Show > IP Route Displays IP routes (routing table) of a device. For Cisco IOS XR devices, following input parameter is required: • IP Address Type OAM > Trace Route from Device Performs trace route from selected device to a destination address. Following input parameters are required: • IPInterface Type • Destination Address Command Input Parameter and Notes Show > VRF IP route Displays the routing table of a selected VRF OAM > Trace Route VRF Performs trace route for a selected VRF to a destination address. Following input parameter is required: • Destination Address OAM > Ping VRF VRF ping for a selected VRF. Following input parameter is required: • Destination Address 3-42 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 3 Viewing and Managing NE Properties Configuring and Viewing NEs using Basic Management Commands ACL Commands Use these commands to remove ACLs and ACL entries. Note These commands are not supported on Cisco IOS XR software. Step 1 In the Network Vision List or Map View, open the logical inventory and click Access Lists. Step 2 Locate the appropriate ACL in the ACL table, and do one of the following: • To delete the ACL, right-click it and choose Commands > Configuration > System > Remove access list. • To delete an entry in the ACL, double-click it to open the entries table. Right-click the entry you want to remove and choose Commands > Configuration > System > Remove access list. Step 3 Preview, schedule, or execute the command. Server Setting Commands These commands let you apply NE system-level settings, such as adding a host name or deleting an NTP server. To run a command, right-click the NE and choose Commands. Before running the command, click Preview to see what the results will be. The parameters you can set depends on the device type and device operation system. Command Input Parameter and Notes System > Add Host Name Host Name System > Remove Host Name. Click Execute Now to remove the host name. System > DNS > Add DNS Server Domain name Domain list name Domain name server address System > DNS > Remove DNS Server N/A; performed from command launch point System > NTP > Add NTP Server Address family (IPv4 or IPv6) NTP server IP address NTP version number Key identifier (0-4294967295) Interface name System > NTP > Remove NTP Server NTP server IP address 3-43 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 3 Viewing and Managing NE Properties Configuring and Viewing NEs using Basic Management Commands Syslog Host Logging Command Use this command to change the syslog logging level on a network element. The input parameters that are displayed depend on the device type and operating system. Step 1 In the Network Vision List or Map View, right-click the network element. Step 2 Choose Commands > Configuration > System > Syslog Host Logging. Step 3 Enter the values for the following parameters. Step 4 Preview, schedule, or execute the command. System > RADIUS > Add Radius Server RADIUS server host name Authentication port (0-65535) Key value of RADIUS server Authentication list name Group name System > RADIUS > Remove Radius Server Radius server host address and authentication list name System > TACACS > Add Tacacs Server TACACS server host IP address Retransmit value (0-100) Timeout value (1-1000) System > TACACS > Remove Tacacs Server TACACS server host address System > TACACS+ > Add Tacacs+ Server TACACS+ server host IP address. Key value of TACACS+ server Authentication list name Group name System > TACACS+ > Remove Tacacs+ Server. Host address and authentication list name Command Input Parameter and Notes Input Parameter Description and Notes Host Type Host type (IPv4 or IPv6) Logging Host IP address of logging host Logging Buffer Size Size (4096-2147483647) Logging Buffered Logging levels: alerts, critical, debugging, emergencies, errors, informational, notifications, warnings Logging History Logging Severity Level Logging Facility auth, cron, daemon, kern, local0, local1, local2, or local3 3-44 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 3 Viewing and Managing NE Properties Configuring and Viewing NEs using Basic Management Commands SNMP Configuration SNMP Trap Commands Prime Network supports these SNMP configuration and traps commands: • Add, Remove SNMP Traps, page 3-44 • Enable SNMP Traps, page 3-44 • Add or Update SNMP Configuration, page 3-44 • Remove SNMP Configuration, page 3-45 Enable SNMP Traps To enable SNMP traps on a selected network element: Step 1 In the Network Vision List or Map View, right-click the network element. Step 2 Choose Commands > Configuration > System > SNMP > Enable traps. Step 3 Enter the value for the following parameters: Step 4 Preview, schedule, or execute the command. Add, Remove SNMP Traps To add or remove SNMP traps from an NE: Step 1 In the Network Vision List or Map View, right-click the network element. Step 2 Choose Commands > Configuration > System > Snmp > Add Traps. Step 3 Select the traps you want to add (or remove) by locating them on one of the drop-down lists. You can repeat the procedure to add or remove more traps as needed. Step 4 Preview, schedule, or execute the command. Add or Update SNMP Configuration To add or update an NE’s SNMP configuration: Step 1 In the Network Vision List or Map View, right-click the network element. Step 2 Choose Commands > Configuration > System > Snmp > Add Snmp Configuration. To update the settings, choose Update Snmp Configuration. Input Parameter Description Community SNMP community Host address SNMP host IP address 3-45 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 3 Viewing and Managing NE Properties Configuring and Viewing NEs using Basic Management Commands Step 3 Enter the values for the following parameters. Note The input parameters that are displayed depend on the device type and operating system. Step 4 Preview, schedule, or execute the command. Remove SNMP Configuration Step 1 In the Network Vision List or Map View, right-click the network element. Step 2 Choose Commands > Configuration > System > Snmp > Add Snmp Configuration. Step 3 Enter the values for the following parameters:. Input Parameter Description and Notes Host address SNMP host IP address Community String SNMP community string Community Access Type SNMP community access type (RO, RW) Trap community Type SNMP trap community type (SNMPv3 Auth, SNMPv3 NoAuth, SNMPv3 Priv) Snmp Engine ID SNMP engine identifier (this field cannot be updated) Snmp Server View Name Name of SNMP server view (for view-based access control) MIB View Family Name Name of MIB view family (for view-based access control) MIB family Included/Excluded from the view Include or exclude (for view-based access control) Snmp Server Group Name Group name for SNMP server SNMPv3 Group Security Model Group security (auth or noauth) Group Read View Name Name of view for group-read Group Write View Name Name of view for group-write Group Notify View Name Name of view for group-notify Snmp Server User Name User name for SNMP server SNMPv3 User Security Model User security (md5 or sha) Authentication Password Password Input Parameter Description Host address SNMP host IP address Community String SNMP community string Trap community Type SNMP community access type (RO, RW) Snmp Server View Name SNMP trap community type (SNMPv3 Auth, SNMPv3 NoAuth, SNMPv3 Priv) Snmp Server Group Name Group name for SNMP server 3-46 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 3 Viewing and Managing NE Properties Configuring and Viewing NEs using Basic Management Commands Step 4 Preview, schedule, or execute the command. Device Configuration Files and Memory Commands To assign properties to a physical interface. Step 1 In the Network Vision List or Map View, open the physical inventory and navigate to the physical interface. Step 2 Right-click the interface and choose Commands > Configuration > Add Interface Configuration. Step 3 Enter the value for the following parameters. Step 4 Preview, schedule, or execute the command. SNMPv3 Group Security Model Group security (auth or noauth) Snmp Server User Name User name for SNMP server Input Parameter Description Command Command Input Write memory N/A; performed from command launch point Show > Running Config N/A; performed from command launch point Show > Running Config from file N/A; performed from command launch point Show > Startup Config N/A; performed from command launch point Tools > File copy > From FTP, Tools > File copy > From TFTP Note Not supported on Cisco Carrier Packet Transport (CPT) System. Source file FTP user (not required for TFTP) FTP user password (not required for TFTP) Source IP address Destination file (running or startup) Tools > File copy > To FTP, Tools > File copy > To TFTP Note Not supported on Cisco Carrier Packet Transport (CPT) System. Source file FTP user (not required for TFTP) FTP user password (not required for TFTP) Destination IP address Destination file (running or startup) 3-47 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 3 Viewing and Managing NE Properties Configuring and Viewing NEs using Basic Management Commands Show Users (Telnet Sessions) Command Use the Users (Telnet Sessions) command to view the details of the telnet sessions of the selected network element. To run this command, right-click the NE and choose Commands > Show > Users (Telnet Sessions). Ping Destination from Device Command Use the Destination From Device command to view the destination from device on the selected network element. To run this command, right-click the NE and choose Commands > OAM > Ping > Destination From Device. Enter a destination address. 3-48 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 3 Viewing and Managing NE Properties Configuring and Viewing NEs using Basic Management Commands CHAPTER 4-1 Cisco Prime Network 3.10 User Guide OL-28065-01 4 Device Configurations and Software Images Cisco Prime Network Change and Configuration Management provides tools for managing the software images and device configuration files used by the devices in your network. These topics provide an overview of the features that Change and Configuration Management provides, some initial setup tasks you must perform, and how to work with the GUI: • What is Change and Configuration Management?, page 4-1 • Set Up Change and Configuration Management, page 4-2 • Use the CCM Dashboard, page 4-10 • Device Configurations, page 4-11 • Software Images, page 4-24 • Configuration Audit, page 4-42 • Global Settings and Administration, page 4-47 What is Change and Configuration Management? Cisco Prime Network Change and Configuration Management provides tools that allow you to manage the software and device configuration changes that are made to devices in your network. Device configuration management tools are provided by the Configuration Management (CM) function, and software image management tools are provided by the Image Management function. Operations can be performed on user-created groups of devices. For more information on user-defined device groups, see Device Groups Setup Tasks, page 4-8. Configuration Management Configuration Management enables you to control and track changes that are made to a device configuration. It uses a change management feature to detect ongoing changes to devices in two ways: • When doing the periodic collection of device configurations; this is called periodic archiving. If CM detects a change in a configuration file, it will get the new version of the file from the device and copy it to the archive. • When a configuration change notification is received from a device. This is called event-triggered archiving. You can configure CM to copy a new version of a configuration file to the archive whenever a change is detected, or to queue the changes and then copy the files to the archive according to a schedule. 4-2 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 4 Device Configurations and Software Images Set Up Change and Configuration Management By default, neither of these methods are enabled. You can configure them from the Configuration Management Settings page (see Configuration Management Setup Tasks, page 4-5). Change Logs provide information on the changes made to devices in the network, sorted by their time stamp. The Configuration Management Settings page controls how long these logs are saved. CM saves messages that can be used for debugging in PRIME_NETWORK_HOME/XMP_Platform/logs/ConfigArchive.log. Note All configuration management operations are performed only on devices with Communication State as Reachable and Investigation State as Operational, Partially Discovered, or Currently Unsynchronized. For a Cisco IOS device with SNMPv3 configuration, configuration management operations can be performed only if the device is configured with write permission for CISCO-CONFIG-COPY-MIB MIB group. Image Management Image Management provides tools for performing rapid, reliable software upgrades and automate the steps associated with upgrade planning and monitoring. This topic provides an overview of both features and an introduction to the Change and Configuration Management dashboard. Cisco IOS and Cisco IOS XR software images are stored in the Prime Network image repository, to which you can add new images by importing them from Cisco.com, from existing devices, from a local file system, or from an external image repository. Software images in the repository are stored in binary format. Before an image is distributed, NEIM performs an upgrade analysis to ensure that the network element is compatible with the image. For Cisco IOS XR devices, you can add individual packages, deactivate packages, test changes before committing them, commit changes, and roll packages back to stored rollback points. The image repository is located in the Cisco Prime database. NEIM saves messages that can be used for debugging in PRIME_NETWORK_HOME/XMP_Platform/logs/NEIM.log. Note All image management operations are performed only on completely managed devices. (This means the Communication State of the device must be Reachable and Investigation State of the device must be Operational.) Note We recommend that you verify that an image operation is correct on a single device, preferably in a lab, prior to distributing and activating a change in image on multiple devices in a production network. Set Up Change and Configuration Management The following topics explain the setup tasks required for Change and Configuration Management: • Prime Network Setup Tasks, page 4-3 • Device Setup Tasks, page 4-4 • Configuration Management Setup Tasks, page 4-5 • NEIM Setup Tasks, page 4-6 • Device Groups Setup Tasks, page 4-8 4-3 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 4 Device Configurations and Software Images Set Up Change and Configuration Management Prime Network Setup Tasks Verify the following: • Verify that Change and Configuration Management is installed. The installation process is described in the Cisco Prime Network 3.10 Installation Guide. Change and Configuration Management can be installed using the network-conf command. The guide includes information about supported browsers, ports that must be available, and so forth. To check if Change and Configuration Management is installed, log into the Prime Network gateway and enter the following command: # cd $PRIME_NETWORK_HOME/Main # dmctl status If you see the following in the output, Change and Configuration Management is installed and running. - Checking Prime Network Web Server Status [UP] • Verify the port to be used. 8043 is the secure HTTP port enabled by default for Change and Configuration Management web client. However, you can still use port 8080 to launch the Change and Configuration Management GUI. To do so, you must manually enable it using this command: # cd $NCCM_HOME/scripts/ # ./nccmHTTP.csh enable # dmctl stop # dmctl start To disable port 8080, perform the same operation but use the disable argument. • If a gateway is behind a firewall, you must open special ports. You do not have to open special ports if units are located behind firewalls (and with NAT). This approach prevents issues when the unit is behind NAT, as the unit does not require a publicly available IP address for the gateway to contact it. • SNMP read-write community in Cisco Prime Network Administration must match that on the devices. Make sure that pop-up windows are enabled on the Firefox and Internet Explorer browsers. • For IPv6, CM and NEIM functions run smoothly on a combination of network and devices with IPv6 addresses. Either the device or the unit must be configured with an IPv6 address to work. For Cisco IOS devices with IPv6 address, the CM and NEIM operations will work only in FTP mode. • For NEIM, verify that the gateway has sufficient space for the storing and staging directories (see Change Image Management Global Settings, page 4-53). • For config and image transfers using TFTP, verify that the TFTP directory is set up and available in the Prime Network gateway and/or unit. To modify and verify the TFTP directory, run the following commands: – To change the TFTP directory, go to the Prime Network directory and run the following commands in the Prime Network gateway: ./runRegTool.sh -gs 127.0.0.1 set avm83/services/tftp/read-dir tftp dir name ./runRegTool.sh -gs 127.0.0.1 set avm83/services/tftp/write-dir tftp dir name – To check the TFTP directory, run the following commands: ./runRegTool.sh -gs 127.0.0.1 get avm83/services/tftp/read-dir ./runRegTool.sh -gs 127.0.0.1 get avm83/services/tftp/write-dir 4-4 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 4 Device Configurations and Software Images Set Up Change and Configuration Management – Restart AVM 83 in the gateway or the unit, by using the following command: anactl -avm 83 restart Device Setup Tasks • For CM, verify that devices are configured to forward configuration change notifications to Prime Network. This is documented as a prerequisite to adding VNEs, in the Cisco Prime Network 3.10 Administrator Guide. (Specifically, if you will be using event-triggered archiving, make sure the logging gateway-IP command is configured on all devices. This command should have been configured as a prerequisite to adding VNEs to Prime Network.) • Simple Network Management Protocol (SNMP) read-write community must be configured on devices. For more information on configuring SNMP community strings for devices, see the Cisco Prime Network 3.10 Administrator Guide. SNMP read-write community in Cisco Prime Network Administration must match that on the devices. • Ensure reachability from Prime Network units to devices and vice versa. • Make sure you have performed all of the device configuration prerequisites for adding VNEs. These commands are described in the Cisco Prime Network 3.10 Administrator Guide. • Change and Configuration Management supports FTP for all config and image transfers. Although you can configure a username and password using the ip ftp command, adding the unit’s FTP credentials to the device may not be safe if the network is not secure. Before using FTP for Change and Configuration Management, we recommend that you: – Configure the network device to add the Prime Network Unit User credentials of the unit that manages the device. You need not add the super user credentials of the Prime Network Unit Server to the device configuration. – For Cisco Carrier Packet Transport (CPT) devices, add the Prime Network Unit User credentials to the registry. This is required because Prime Network initiates the FTP operation using a TL1 interface, and the TL1 commands require the username and password as input parameters. After you add this information to the registry, the credentials are automatically read when needed. # $ANAHOME/Mail/runRegTool.sh -gs 127.0.0.1 setEncrypted 127.0.0.1 nccm-settings/ftpsettings/username ftp-username # $ANAHOME/Mail/runRegTool.sh -gs 127.0.0.1 setEncrypted 127.0.0.1 nccm-settings/ftpsettings/password ftp-passwd – Restrict the FTP configuration such that the Prime Network Unit User has read-write access only to the $PRIME_NETWORK_HOME/tftp directory and hence does not have access to unwanted files outside the home directory. Note FTP support is not available for Cisco IOS XR devices and Cisco Nexus 5000 and Cisco Nexus 7000 series devices. • For IPv6, CM and NEIM functions run smoothly on a combination of network and devices with IPv6 addresses. Either the device or the unit must be configured with an IPv6 address to work. For Cisco IOS devices with IPv6 address, the CM and NEIM operations will work only in FTP mode. 4-5 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 4 Device Configurations and Software Images Set Up Change and Configuration Management Configuration Management Setup Tasks Note In the Configuration Management and Image Management Settings pages, Change and Configuration Management does not support the following special characters: • For Password fields—>, <, ', /, \, !, :, ;, and " • For all other fields—`, ~, @, #, $, %, ^, &, *, (, ), +, =, |, {, }, [, ], ', ?, >, <, /, \, !, :, ;, and " The CM features are disabled by default so that you do not encounter unexpected processing loads on your server. The following steps explain what you must do to set up CM. All of these items are configured from the Configuration Management Settings page (Configurations > Settings). Many of these settings can be overridden when you create specific jobs. 1. Configure the transport protocol that Prime Network will use between the device and the gateway. these are controlled from the Transport Protocol area. The options are TFTP, SFTP/SCP, and FTP. The default is TFTP. Note the following: Caution FTP is not a secure mode of transfer. Use SCP/SFTP instead, for secure config and image transfers. – The TFTP source interface on the devices must be able to reach the unit. Otherwise, the configuration management jobs that require TFTP may fail. – To use SFTP/SCP for config transfers from a device to a unit, you need to ensure that an SSH server is configured and running on the device, such that the device acts as a server and the unit as a client during the transfer. For Cisco IOS XR devices, you need to configure the device with K9 security (k9sec) enabled images such that the SSH server is up and running on the device. 2. Enable CM to perform an initial synchronization of the CM archive files with the configurations that are running on the network devices. Whenever the Prime Network gateway is restarted, CM will perform this synchronization. By default, synchronization is disabled. To enable it, activate Enable Initial Config Syncup. 3. Configure the policies that control how often CM retrieves information from devices and copies configuration files to the archive. By default, all of these settings are disabled. You must answer the following basic questions: a. How much disk space is available? Smaller space may require more frequent purging. b. Should new configuration files be copied (backed up) to the archive on a periodic basis or on an event-driven basis? If configurations are changing frequently and the changes are not important to you, you should use periodic backups by selecting Enable Period Config Backup. This will minimize server workload. Note The periodic setting is recommended. If every change is considered significant, use event-driven backups (Enable Event-Triggered Config Archive). c. For event-driven archiving, should information be copied to the archive immediately upon receiving a change (Sync archive on each configuration change)? Or should changes be queued and then copied at a certain interval (Sync archives with changed configurations 4-6 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 4 Device Configurations and Software Images Set Up Change and Configuration Management every ___ hours and ___ minutes)? If information needs to be copied to the archive immediately, you must sync the archive on each configuration change. Otherwise, you can sync the archive with changed configurations at a certain interval (every 1-24 hours). 4. Enable CM to perform periodic synchronization of out-of-sync devices by selecting Enable Periodic Sync for Out of Sync Devices (24Hours). 5. Enable CM to export archived configuration to an export server on a periodic basis by selecting Enable Periodic Config Export and Export Settings. This allows you to free up disk space while keeping a permanent record of historical archives. 6. Configure when configuration files should be purged from the archive using the Archive Purge Settings. You should consider: – How big are the configuration files? – How often are changes made to devices? 7. Specify the default mode of restoring configuration files to the devices using Restore Mode. 8. Configure the SMTP server and e-mail IDs to send notifications on the status of configuration management jobs to users. (You can also specify e-mail settings when you create a job.) 9. Specify the commands that you want CM to exclude when comparing files (for example, clock rates). A set of common exclude commands is provided by default (for example, ntp-clock-period). these are controlled in the Exclude Commands area (see Notes on Exclude Commands, page 4-51). Note Configuring exclude commands is especially important if you are using event-driven archiving. Doing so avoids unnecessary file backups to the archive. NEIM Setup Tasks Note In the Configuration Management and Image Management Settings pages, Change and Configuration Management does not support the following special characters: • For Password fields—>, <, ', /, \, !, :, ;, and " • For all other fields—`, ~, @, #, $, %, ^, &, *, (, ), +, =, |, {, }, [, ], ', ?, >, <, /, \, !, :, ;, and " Caution FTP is not a secure mode of transfer. Use SCP/SFTP instead, for secure config and image transfers. The following are the NEIM prerequisites, all of which are controlled by the Image Management Settings page (Images > Settings). Many of these settings can be overridden when you create specific jobs. 1. Configure the transport protocol that Prime Network will use between the device and the gateway; these are controlled from the Transport Protocol area. The options are TFTP, SFTP/SCP, and FTP. The default is TFTP. Note the following: – The TFTP source interface on the devices must be able to reach the unit. Otherwise, the image management jobs that require TFTP may fail. 4-7 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 4 Device Configurations and Software Images Set Up Change and Configuration Management – To use SFTP/SCP for image transfers from a device to a unit, you need to ensure that an SSH server is configured and running on the device, such that the device acts as a server and the unit as a client during the transfer. For Cisco IOS XR devices, you need to configure the device with K9 security (k9sec) enabled images such that the SSH server is up and running on the device. 2. Configure the gateway staging directory to use when transferring images from Prime Network out to devices in the File Locations area. The default is PRIME_NETWORK_HOME/NCCMComponents/NEIM/staging/. PRIME_NETWORK_HOME is the Cisco Prime Network installation directory (by default, /export/home/network-user; where network-user is the operating system user for the Prime Network application and an example of network-user is network39). 3. Use the Clear Flash option (under Flash Properties) to recover the disk space occupied by files that were marked for deletion in the device, before distributing the image or package, if there is insufficient memory. 4. Enable the warm upgrade facility to reduce the downtime of a device during planned Cisco IOS software upgrades or downgrades (in the Warm Upgrade area). 5. Configure the gateway storing directory to use when transferring images from an outside source into the image repository (from Cisco.com or from another file system). This is controlled from the File Locations area. The default is PRIME_NETWORK_HOME/NCCMComponents/NEIM/images/. PRIME_NETWORK_HOME is the Prime Network installation directory (by default, /export/home/network-user; where network-user is the operating system user for the Prime Network application and an example of network-user is network39). 6. Configure the SMTP server and e-mail IDs to send notifications on the status of image management jobs to users. (You can also specify e-mail settings when you create a job.) This is controlled in the E-mail Settings area. 7. If you plan to download files from Cisco.com, configure the necessary vendor credentials to connect to Cisco.com. These are set in the Vendor Credentials area. If you do not have login privileges, follow the procedure in Obtaining Cisco.com Login Privileges for Image Management, page 4-7. 8. Configure the proxy server details to use while importing images to the archive from Cisco.com (in the Proxy Settings field). 9. If you plan to download images from an external repository, set up the details of the external server to import images to the Prime Network image repository (in the External Server Details area). Obtaining Cisco.com Login Privileges for Image Management Login privileges are required for all Images operations that access Cisco.com. To get access, you must have a Cisco.com account. If you do not have a user account and password on Cisco.com, contact your channel partner or enter a request on the main Cisco website. You can register by going to the following URL: http://tools.cisco.com/RPF/register/register.do To download cryptographic images from Cisco.com, you must have a Cisco.com account with cryptographic access. To obtain the eligibility for downloading strong encryption software images: Step 1 Go to the following URL: http://tools.cisco.com/legal/k9/controller/do/k9Check.x?eind=Y&return_url=http://www.cisco.com Step 2 Enter your Cisco.com username and password, and click Log In. 4-8 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 4 Device Configurations and Software Images Set Up Change and Configuration Management Step 3 Follow the instructions provided on the page and update the user details. Step 4 Click Accept to submit the form. Step 5 To verify whether you have obtained the eligibility to download encrypted software: a. Go to the following URL: http://tools.cisco.com/legal/k9/controller/do/k9Check.x?eind=Y&return_url=http://www.cisco .com b. Enter your username and password, and click Log In. The following confirmation message is displayed: You have been registered for download of Encrypted Software. Device Groups Setup Tasks You can create user-defined device groups for ease of performing operations. A static group contains a specific set of devices; new devices must be added manually. A dynamic group is populated according to membership rules; if newly-added devices match the rules, they are automatically added to the group. If you are backing up the configuration archive or importing software images from devices into the repository, and a device group changes during the operation, Prime Network updates the job accordingly such that all the devices available in the group at the time of execution of the job are considered for the backup or import operation. All other job types are not updated; you must delete and recreate the job. To view the existing and create new user-defined device groups: Step 1 Click the Device Groups tab. The Device Groups page appears as shown in Figure 4-1. Figure 4-1 Device Groups Page The Device Groups page displays the name, description, and whether the membership is static or dynamic. To delete a group, click the red X next to the group name. To view the devices in a group, click the hyperlinked group name to view the devices mapped to the group in the Group Members page. The device status, IP address and element type is listed. To display more properties, click the Device Name hyperlink. The status icons are illustrated in the following. Symbol Description Device is in operational state. Device is not in operational state. Most likely the device is in the Maintenance investigation state or the Unreachable communication state. Click the device hyperlink and open the device properties popup to see details about the device. 4-9 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 4 Device Configurations and Software Images Set Up Change and Configuration Management Step 2 To create a new group, click Create and enter the required information. Names must be unique; do not use the reserved names adminGroup and ROOT-DOMAIN. Step 3 In the Membership Update drop-down list box, choose Static or Dynamic. • For dynamic groups, set up a membership rule to indicate which devices must be added to the group. The following figure provides an example of the Create Device Group page for a dynamic group. You can set up membership rules with parameters such as device name, range of device IP addresses, and the device element type. For example: Device Name equals 1800 IP Address between 10.77.214.107 And 10.77.214.171 IPv4 Element Type equals Cisco 1801 Note You can choose to include any one or a combination of these parameters in the rule by using the And/Or operator. Also, you can provide multiple values for the Device Name and Element Type parameters as a comma-separated list, if required. • For static device groups, in the Group Members section, under the Available Devices list, Prime Network lists all the devices that are available in the database. The following figure provides an example of the Create Device Group page for a static group. Step 4 Click OK to save the group. 4-10 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 4 Device Configurations and Software Images Use the CCM Dashboard Use the CCM Dashboard To launch the GUI from a web browser, enter the following URL in the address bar: https://gateway-IP:8043/ccmweb/ccm/login.htm Note Change and Configuration Management does not support special characters for any of the editable fields in the GUI, including filters. Figure 4-2 shows the Change and Configuration Management Dashboard, which contains four dashlets or subdivisions to display real-time information about the most frequently used software images, devices with startup and running configurations that are not in sync, and recent configuration changes. Figure 4-2 Change and Configuration Management Dashboard Dashlet Provides information about: Top Families Four device families with the highest number of devices in the network. Smaller groups can be viewed by toggling to the tabular form. From here, you can distribute and activate software images to a selected family. Note You may face resizing issues when you hover the cursor over this dashlet, if you have enabled the Right to Left (Hebrew) settings in your browser. Configuration Sync Status (Cisco IOS) Devices for which the startup and running device configurations are in sync or not in sync. Whenever a Cisco IOS configuration file is retrieved from a device and copied to the archive, Prime Network compares the latest version of the startup configuration with the latest version of the running configuration file. If there is a mismatch, Prime Network adds the device to the list of out-of-sync devices. The information is refreshed whenever you click the Dashboard. A “100% Unavailable” message is displayed when there are no Cisco IOS device images or if the initial configuration sync up setting is not enabled (controlled by the “Enable/Disable Initial config sync up on restart” setting on the Configuration Management Settings page). 4-11 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 4 Device Configurations and Software Images Device Configurations Use the following icons to toggle between different views in the Top Families, Configuration Sync Status, and Configuration Changes in the Last Week dashlets. Device Configurations The following topics explain how to work with device configurations: • What is In the Archive?, page 4-11 • Protect Configurations in the Archive, page 4-12 • Find Out What is Different Between Configurations, page 4-13 • Copy a Configuration File to a Central Server, page 4-15 • Are Running and Startup Configs Mismatched? (Cisco IOS and Cisco Nexus), page 4-16 • Copy the Device Files to the Archive (Backups), page 4-17 • Fix a Live Device Configuration (Restore), page 4-20 • Clean Up the Archive, page 4-22 • Find Out What Changed on Live Devices, page 4-23 What is In the Archive? Choose Tools > Change and Config Mgmnt to open Change and Configuration Management. Choose Configurations > Archives to view the contents of the archive. The CM archive maintains copies of device configuration files, storing them in the Prime Network database. Configuration files are stored in readable format, as received from the device. Users can only see devices that are in their device Configuration Changes in the Last Week Number of device configuration changes detected for each day of the previous week. This dashlet is empty when configuration change notification is not enabled (controlled by the “Enable/Disable Event-Triggered Config Archive” setting on the Configuration Management Settings page). Most Recent Configuration Changes Last five device configuration changes that were made to devices in the network. This dashlet is empty if configuration change notification is not enabled. It is controlled by the “Enable/Disable Event Triggered Config Archive” setting on the Configuration Management Settings page (see Change Configuration Archive Global Settings, page 4-48). The Commit ID and Diff columns apply only to Cisco IOS XR devices. Other device types will display N/A in those columns. Dashlet Provides information about: Icon Description Displays the details in the form of a pie or bar chart. If you hover your mouse cursor over a section in the pie chart, a tooltip displays the information associated with that section. Displays the details in a tabular form. 4-12 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 4 Device Configurations and Software Images Device Configurations scope. The total number of archives available in the Prime Network database is also displayed in the header. The Archived Configurations page displays the following information about each configuration file. Protect Configurations in the Archive Table 4-1 Configuration Information Displayed on Archived Configurations Page Field Description Device Name Name of device. Click the icon next to the device name to open a popup that displays device properties. Additional information is listed depending on the device type: • Current active packages on the device—For Cisco IOS XR devices • Active kickstart images—For Cisco Nexus series devices • Priority list—For Cisco ASR 5000 series devices. The priority list displays various combinations of a configuration file and an image file in priority order for the device. Version An internally-used number. A version will not have an associated configuration file under the following circumstances: • The associated configuration file was deleted from the archive. • The associated configuration file has not yet been copied to the archive. (Prime Network supports queuing change notifications and copying the configuration files to the archive at a later time. See Change Image Management Global Settings, page 4-53.) Click a version number hyperlink to launch the Device Configuration Viewer, from which you can view the contents of a configuration file. Type Type of configuration: • Cisco IOS and Cisco Nexus series devices—Running or Startup • Cisco IOS XR devices—Running or Admin • Cisco ASR 5000 series devices—Running or Boot. For boot configuration, the version is always displayed as 1. • Cisco CPTdevices—Startup Commit Id (Cisco IOS XR only) ID that identifies the last configuration change on the device (maximum number saved is 100). Date Changed Date and time of last change, displayed accordingly to the local time zone settings of the client. For Cisco CPT and Cisco ASR 5000 series devices, this field displays N/A. Label User-assigned archive labels. Running Image The software image currently running on the device. 4-13 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 4 Device Configurations and Software Images Device Configurations Assigning labels to configuration files is a clear, simple way to identify important configurations and convey critical information. You can manage labels by choosing Labels > Manage. • Adding a label adds it to the catalog where it is made available to all users. Add labels by clicking Add Row. • Deleting a label unassigns the label from configurations that are using it. Likewise, if you edit a label, the change is applied to all configurations using the label. • Unassigning a label does not delete the label from the catalog. • Labels with the “do not purge” property will not be purged from the archive (the delete action is disabled). When calculating the total number of archives to see if the maximum has been reached and archives should be purged, CM does not include configurations with this label in the total (see Change Configuration Archive Global Settings, page 4-48). Find Out What is Different Between Configurations Prime Network allows you to compare two configuration files that are saved in the archive and display them side by side, highlighting configuration differences and allowing you to move between them. Prime Network excludes a small set of commands by default, such as the NTP clock rate (which constantly changes on a managed network element but is not considered a configuration change). You can change the excluded commands list as described in Change Configuration Archive Global Settings, page 4-48. Additions, deletions, and excluded values are color-coded as shown in the following example. Comments User-assigned free text. Context / Module / Priority For Cisco Nexus series devices, this field displays the virtual device context (VDC) name. For Cisco 7600 series devices, this field displays the module name. For Cisco ASR 5000 series devies, this field displays the boot configuration files with their priorities. For other devices, this field displays N/A. Table 4-1 Configuration Information Displayed on Archived Configurations Page (continued) Field Description 4-14 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 4 Device Configurations and Software Images Device Configurations Figure 4-3 Compare Configurations Dialog Box You can compare any types of configurations as long as they run on the same operating system. However, you cannot compare a Cisco IOS configuration with Cisco IOS XR configuration. The following are typical scenarios for using the compare function: • Compare the latest and next-to-latest configuration to see the most recent change. • Compare Cisco IOS running and startup configurations to see how they are out of sync. • Compare the configurations on two different devices to find out how they are different. Note When you are trying to compare an archive with an active startup, running, or admin configuration, if there is a change in the device configuration, Prime Network initiates a backup job and creates a latest version of the device configuration file. You can view the latest version of the configuration file in the Archived Configurations page. To compare configurations: Step 1 Choose Configurations > Archives. Step 2 Locate the archives you want to compare. You can click the Version hyperlink next to a device to open the Device Configuration Viewer and quickly view the contents of the configuration file. 4-15 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 4 Device Configurations and Software Images Device Configurations Step 3 You can choose to do the following: Copy a Configuration File to a Central Server You can export configurations to an FTP or SFTP server that is specified on the Configuration Management Settings page. They are exported as a .cfg (configuration) file. Configuration files are saved using the following format: deviceName-configurationType-version-configChangeTimestamp.cfg For example, the following file would contain the 18th version of a running configuration for the device named 7200-5, saved on March 27, 2010 at 2:40:30 P.M: 7200-5-RUNNING_CONFIG-18-2010327144030.cfg Before You Begin Make sure of the following: • Export location and required credentials, and (for emails) SMTP host and port are configured on the Configuration Management Settings page. • Specified FTP or SFTP server must have sufficient free space to accommodate the exported configurations. Also, the destination subdirectory on the FTP or SFTP server must have the required permissions. To export configuration files: Step 1 Choose Configurations > Archives and locate the archives you want to export. You can click the Version hyperlink next to a device to open the Device Configuration Viewer and quickly view the contents of the configuration file. Step 2 Click Export and set the desired schedule and enter the e-mail ID(s) to which to send a notification after the scheduled export job is complete. For two or more users, enter a comma-separated list of e-mail IDs. A notification e-mail is sent based on the e-mail option specified in the Configuration Management Settings page. Note The time you specify here to schedule the export job is the server time. Step 3 Click Export. The export job is created and you are redirected to the Job Manager page, where you can monitor the status of the job. Device Type or OS Supported Function For Cisco IOS XR devices Compare > To Active Running or Compare > To Active Admin Cisco IOS device Compare > To Active Startup or Compare > To Active Running Cisco ASR 5000 series device Compare > To Active Boot or Compare > To Active Running All Compare > Selected Archives 4-16 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 4 Device Configurations and Software Images Device Configurations Are Running and Startup Configs Mismatched? (Cisco IOS and Cisco Nexus) Cisco IOS and Cisco Nexus series devices contain a startup and running configuration file. The startup configuration is loaded when a device is restarted. Ongoing changes to the device are applied to the running configuration. As a result, unless the running configuration is saved as the startup configuration, upon a device restart, any changes would be lost. It is therefore important to ensure that the device startup and running configurations are in sync. When Prime Network synchronizes a file, it overwrites the startup configuration on the device with the configuration that is currently running on the device. Whenever a configuration file is retrieved from a device and copied to the archive (that is, backed up), Prime Network compares the latest version of the startup configuration with the latest version of the running configuration file. If there is a mismatch, Prime Network adds the device to the list of out-of-sync devices. For Cisco Nexus series devices, CM backs up the startup and running configurations for all VDCs configured in the device. If there is a mismatch between the startup and running configurations of a VDC, CM creates an out-of-sync entry for that VDC. Note The synchronize operation affects only the configurations running on the device. It does not affect any configuration files that are saved in the archive. Configuration sync is not applicable for Cisco CPT and Cisco ASR 5000 series devices. The Dashboard maintains a Configuration Sync Status pie chart that shows how many devices have out-of-sync startup and running configuration files. When you click the pie chart (or choose Configurations > Synchronize), you are directed to the Out of Sync Devices page, where Prime Network lists all of the out-of-sync devices in tabular format. The information is refreshed whenever you choose Configurations > Synchronize. Before You Begin Make sure the specified FTP or SFTP server must have sufficient free space to accommodate the exported configurations. Also, the destination subdirectory on the FTP or SFTP server must have the required permissions. To view differences and synchronize configurations: Step 1 Choose Configurations > Synchronize. Prime Network lists all out-of-sync devices, the date and time when the device configurations were last changed, and when the files were last archived. Figure 4-4 provides an example. The date and time are displayed according to the local time zone settings of the client. Figure 4-4 Configuration Synchronization - Out of Sync Devices Page Step 2 Click the Compare icon to launch the Compare Configuration window, which provides a side-by-side view of the two configurations and highlights the differences. 4-17 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 4 Device Configurations and Software Images Device Configurations Step 3 Choose the network elements you want to synchronize. This directs Prime Network to overwrite the startup configuration on the device with the configuration that is currently running. Step 4 Click Synchronize. The Schedule Synchronization page opens. Step 5 Set the desired schedule and enter the e-mail ID(s) to which to send a notification after the scheduled synchronization job is complete. For two or more users, enter a comma-separated list of e-mail IDs. Note The time you specify here to schedule the synchronization job is the server time. Step 6 Click Synchronize. Prime Network schedules the job and redirects you to the Jobs page, where you can monitor the status of the job. Copy the Device Files to the Archive (Backups) These topics describe how to automatically and manually back up configuration files to the archive: • Automatic Backups and Manual Backups • Manually Backing Up Configuration Files Backing up a device configuration entails getting a copy of the configuration file from the device, and copying that file to the configuration archive. As part of the backup procedures, it is compared with the latest archived version of the same type (e.g. running with running, startup with startup). A new version of the file is archived only if the two files are different. If the number of archived versions exceeds the maximum, the oldest archive is purged (according to the values on the Configuration Management Settings page). Configurations marked with a “do not purge” label are not removed from the archive by the auto-purging procedures. The backup procedure is also when Prime Network identifies out-of-sync devices. The backup operation includes: • Cisco IOS XR devices: Includes active packages. Change and Configuration Management does not back up running configurations for Cisco IOS XR devices that are managed with non-system user credentials; because copy command is not available in the command-line interface (CLI) for non-system users. • Cisco Nexus series devices: Startup and running configurations for all VDCs configured in the device. • Cisco 7600 series devices with an ACE card: Startup and running configurations of the ACE card. • Cisco ASR 5000 series devices: Boot configuration file (Prime Network always overwrites the existing boot configuration in the archive) 4-18 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 4 Device Configurations and Software Images Device Configurations Automatic Backups and Manual Backups Table 4-2 describes the methods you can use to back up configuration files to the archive. None of these methods are enabled by default. Choose the method that is appropriate to your network and how often changes are made to it. For more information, see Configuration Management Setup Tasks, page 4-5. Table 4-2 Methods for Archiving Configuration Files Method Description Initial Sync Activates CM to perform an initial synchronization of the CM archive files with the configurations that are running on the network devices. If this setting is enabled, whenever the Prime Network gateway is restarted, CM performs this synchronization. This behavior is controlled by the Enable Initial Config sync up setting on the Configuration Management Settings page. See Change Image Management Global Settings, page 4-53. Manual A user-driven backup that is controlled from the Configurations > Backup page. Performing a backup from the Backup page overrides all other archive settings. You can schedule the file backup to occur immediately or according to a schedule. Note Any backups scheduled using this method are completely independent of any schedules for ongoing archiving. However, users can only back up devices that are within their scope, and if they have a sufficient device scope-based role. See Manually Backing Up Configuration Files, page 4-19. Ongoing • Event-Driven—Backs up device files when Prime Network receives a configuration change notification. Use this method if you consider every configuration file change to be significant. This is controlled by the Enable Event-triggered Config Archive setting on the Configuration Management Settings page. For this form of backup, you can choose one of the following methods for performing the archiving: – Back up the files to the archive immediately when a change is detected. – Queue the changes and back up the files to the archive according to a schedule. Both of these settings are controlled from the Configuration Management Settings page. If you are using event-driven archiving, you should also make sure that exclude commands are properly configured. Exclude commands are commands that Prime Network ignores when comparing configurations, and they are controlled from the Settings page. Using this mechanism eliminates unnecessary file backups to the archive. • Periodic—Archives device files every 24 hours (system-defined). A new archive is created only if the newly-collected device configuration is different from the last version in the archive. Use this method if configurations change frequently and the changes are not important to you. This setting is controlled by the Enable Periodic Config Backup setting on the Configuration Management Settings page. Note This CM collection is independent of the Prime Network inventory collection. See Change Configuration Archive Global Settings, page 4-48. 4-19 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 4 Device Configurations and Software Images Device Configurations Manually Backing Up Configuration Files Files are automatically backed up to the archive according to the values on the Configuration Management Settings page. To perform an on-demand backup of configuration files to the archive: Step 1 Choose Configurations > Backup. Prime Network lists all devices with the following status symbols as shown in Figure 4-5. Step 2 Choose the devices with files you want to back up. Figure 4-5 Configuration Backup Page Step 3 To choose devices from a specific device group, click Select Groups. Click the hyperlinked device group name to view the list of devices that belong to the group. Step 4 Select the required device group in the Device Groups page and click OK. The devices that belong to the selected device group are highlighted in the Configuration Backup page. You can also schedule a backup simultaneously for all the devices existing in a group: • Select a device group and click Backup Groups. • Enter the scheduling information as explained after Step 5 and click Backup Groups. Step 5 In the Configuration Backup page, click Backup to configure the backup schedule. By default, the backup is performed as soon as possible. Other schedule choices (once, periodically, weekly, and so forth) are activated when you deselect Start as Soon as Possible. Note The time you specify here to schedule the backup job is the server time. Step 6 Enter the e-mail ID(s) to which to send a notification after the schedule backup job is complete. For two or more users, enter a comma-separated list of e-mail IDs. A notification e-mail is sent based on the e-mail option specified in the Configuration Management Settings page. Symbol Description Device is available for backup. Device is not available for backup. The device is most likely in the Maintenance investigation state or the Unreachable communication state. Click the device hyperlink and open the device properties popup to see details about the device. 4-20 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 4 Device Configurations and Software Images Device Configurations Step 7 Click Backup. Prime Network schedules the job and redirects you to the Jobs page, where you can monitor the status of the job. Note If a backup is scheduled for an entire device group and if there is a change in the group by addition or deletion of devices after job creation, Prime Network updates the job accordingly such that all the devices available in the group at the time of execution of the job are considered for backup. Fix a Live Device Configuration (Restore) Prime Network performs the configuration restore operation in the following modes: • Overwrite mode—Prime Network overwrites the existing configuration on the device with the file you selected from the archive. The configuration on the device is restored to exactly match the archived version. • Merge mode—Prime Network compares the file you selected for the restore with the existing running or startup configuration on the device. If they are different, the existing running or startup configuration on the device is merged with the configuration present in the version you selected from the archive. (For Cisco ASR 5000 series and Cisco ASR 903 devices, Prime Network allows restoring of running configuration only in Merge mode.) For Cisco IOS XR devices, a restore operation basically rolls back the configuration file to a commit ID. If the commit ID associated with the archived version is not available on the device, the configuration is restored in merge mode. Note Restore operation is not applicable for boot configuration files of Cisco ASR 5000 series devices. Prime Network uses the default restore mode (Overwrite or Merge) set up in the Configuration Management Settings page. However, you can modify the default mode while scheduling the restore operation. If you have selected the Overwrite mode, you can use the Use Merge on Failure option to restore the files in Merge mode, if Overwrite mode fails. Before You Begin • Make sure you have installed Flash Player version 10 or higher to view the Configuration Restore page. • Make sure you have the permissions to perform the restore operation. You will not be allowed to schedule a restore job, if you do not have permissions. 4-21 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 4 Device Configurations and Software Images Device Configurations To restore a configuration: Step 1 Choose Configurations > Restore. Prime Network lists all configuration files in the archive. Figure 4-6 shows an example of a filtered Restore page. Figure 4-6 Configuration Restore Page Step 2 (Cisco IOS only) Specify the type of configuration files you want to restore: Running, Startup, or both. If you choose to restore to startup configuration, Prime Network will first copy the file to running configuration and then to startup configuration. Note Cisco IOS XR and Cisco ASR 5000 series device configuration files are always restored to the same type. For Cisco CPT devices, the Running option restores the selected configuration to startup config and then to running config on the device. Step 3 Choose the configuration files you want to restore. You can click the arrow mark next to the device name to view the different versions of the configuration file of the device. You can also click the Version hyperlink to view the contents of a file. Step 4 If you want to edit a file before restoring it, click Edit Config (edited files are restored only in Merge mode). You can view the details of the selected configuration file in the Configuration Editor page as shown in Figure 4-7. 4-22 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 4 Device Configurations and Software Images Device Configurations Figure 4-7 Configuration Edit Edit the configuration lines, as required. Note the following: • To remove a command, add no in front of the command. • To update a command, add no in front of the command and then add the new command. Step 5 Click Restore. The Config Restore Schedule dialog box opens. Step 6 (Optional) Override the default transport protocol and default restore mode. Step 7 Enter a comma-separated list of e-mail ID(s) to which to send a notification after the scheduled restore job is complete. Step 8 Click Restore. Prime Network schedules the job and redirects you to the Jobs page, where you can monitor the status of the job. Clean Up the Archive Deleting a file removes it from the archive. You cannot delete an archived file if: • It is marked “do not purge.” • Deleting it would bring the number of versions below the minimum number of versions that must be retained (as specified on the Configuration Management Settings page). 4-23 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 4 Device Configurations and Software Images Device Configurations When a device is removed from Prime Network, its configuration files are also removed from the archive. To delete a configuration file from the archive: Step 1 Choose Configurations > Archives. Step 2 Choose the configuration file you want to delete. You can click the Version hyperlink to verify the contents of the configuration file. Step 3 To delete a single configuration file, click the delete icon (red X) at the end of the row. If the delete icon is disabled, this means the archive is assigned a label that is marked “do not purge.” To delete this type of configuration, you must first unassign the label from the configuration. Step 4 To delete multiple configuration files, select the required files and then click the Delete button in the table header. Step 5 Confirm your choice. Prime Network schedules the job and redirects you to the Jobs page, where you can monitor the status of the job. Find Out What Changed on Live Devices The Change Logs page displays a list of the latest device configuration changes detected by Prime Network. How Prime Network responds to these changes depends on the values on the Configuration Management Settings page. By default, Prime Network does not get new information from the device and copy it to the archive when a change occurs, but you can set it to do so. See Change Configuration Archive Global Settings, page 4-48. All users can view the change logs, regardless of the user access role or assigned device scopes. To view the latest changes, choose Configurations > Change Logs. Figure 4-8 provides an example. Figure 4-8 Configuration Change Logs The Configuration Change Logs page displays change information, sorted according to the latest time stamp. (For a description of common fields, see Device Configurations, page 4-11.) The date and time stamps are displayed according to the local time zone settings of the client. These fields are specific to the Configuration Change Logs page: 4-24 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 4 Device Configurations and Software Images Software Images Software Images The following topics explain how to work with software images and packages: • Add New Images to the Repository, page 4-24 • New Devices: Create an Image Baseline, page 4-25 • Distribute Images and Make Sure They Will Work, page 4-27 • Activate Cisco IOS Software Images, page 4-32 • Perform Cisco IOS XR Software Package Operations, page 4-34 • Clean Up the Repository, page 4-41 Add New Images to the Repository Images are copied to the storing directory specified on the Image Management Settings page. Prime Network verifies whether the file contents are different from the previous version in the repository. If there are no differences, the image is not added to the repository. By default, the storing directory is PRIME_NETWORK_HOME/NCCMComponents/NEIM/images/, where PRIME_NETWORK_HOME is the Prime Network installation directory (by default, /export/home/network-user; where network-user is the operating system user for the Prime Network application and an example of network-user is network310). From there, they are imported into the repository. Note Before importing images, make sure internet connectivity is available to the server; otherwise, the imported images will not be populated with RAM, boot ROM, and feature set. When you download an image from Cisco.com, Prime Network creates a job for the download. The job information is saved, along with other job information, in the database. Field Description Diff (Cisco IOS XR only) Displays only the commands that were changed. For long text, hover the cursor over the hyperlink to display the entire contents. Compare Launches the Compare Configuration window, which displays the entire original and changed files side by side. This data is generated only if file versions are available. Additions and deletions are color-coded. From here, you can: • Click Show All Lines or Only Differences to display the entire file contents or just the differences between the two files. • Click Previous Diff or Next Diff to jump forward or backward to the previous or next difference between the two files. • Click the arrow buttons or enter the page number to jump forward or backward to view the file contents that are running across pages. 4-25 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 4 Device Configurations and Software Images Software Images To import images into the Prime Network image repository: Step 1 Choose Images > Repository. Step 2 Choose the appropriate method: Step 3 Select the images and import them. Change and Configuration Management redirects you to the Jobs page, where you can monitor the status of the import job. Step 4 Choose Images > Repository again to refresh the list of images. Step 5 If a field displays NA, the image attributes were not available from the image header. (If pre-existing filters are still in use, you may need to click Clear Filter.) We recommend that you manually enter the information to ensure the accuracy of the upgrade analysis. Step 6 Delete files from the storing directory (if applicable) to free space for future imports. After the import, you can also add informational text to the Comments field. Normally at this point you will distribute the images; see Distribute Images and Make Sure They Will Work, page 4-27. New Devices: Create an Image Baseline Use this method to create an image baseline—that is, import software images directly from existing devices to the Prime Network image repository. This is useful when you add devices from a new device series or family. This information is imported: • Cisco IOS devices: Currently-running images. For Cisco 7600 series devices with ACE cards: ACE card images in the Cisco 7600 supervisor module filesystem (FTP, TFTP, and SCP are all supported). • Cisco IOS XR devices: pie and .vm files corresponding to active packages. Note Image baseline is not applicable for Cisco CPT devices. To import from: Choose: Notes Cisco.com web site From Cisco.com Make sure the Cisco.com credentials are set on the Image Management Settings page. You must enter a device type, software version, and feature set. Another IPv4 or IPv6 gateway server From External Repository The GUI will display available images, their size, and whether they already exist in the repository. Change and Configuration Management displays all images or packages (bin, pie, smu, and so on) from the directory specified in the Image Management Settings page, and also from its sub directory in order to support tar files. A file system on the local gateway server From File System 4-26 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 4 Device Configurations and Software Images Software Images To import images from devices into the Prime Network image repository: Step 1 Choose Images > Repository. Step 2 From the Import drop-down list, choose From Devices. The Devices dialog box displays information about the device. For long texts in the Element Type, Software Version, and Running Image fields, hover the cursor over the hyperlink to display the entire contents. Step 3 To import images from devices of a specific group, click Select Groups. Click the hyperlinked device group name to view the list of devices that belong to the group. See Device Groups Setup Tasks, page 4-8 for more information on user-defined device grouping. Step 4 Select the required device group in the Device Groups page and click OK. The devices that belong to the selected device group are highlighted in the Devices page. You can also import all the devices existing in a group. To do so: – Select a device group and click Import from Group. – Enter the scheduling information as explained after Step 5 and click Import from Group. Step 5 In the Devices page, click Import. A scheduler popup window appears. Step 6 Enter the scheduling information. By default, jobs are scheduled to run as soon as possible. Note The time you specify here to schedule the import job is the server time. Step 7 If you do not want to use the default transfer protocol, select a different protocol: • TFTP (unsecured; Cisco ASR 5000 series devices use this protocol for importing images) • SFTP/SCP (secured; Cisco IOS XR devices and Cisco Nexus 5000 and 7000 series devices use SFTP, and Cisco IOS devices use SCP) • FTP (unsecured) Step 8 If you have selected two or more devices, click one of the following to specify the operation mode: • Parallel Order—Imports images from all devices at the same time. • Sequential Order—Allows you to specify the order of the devices to import the images from. You can do so by moving the devices up and down in the Device Order box. Note The Device Order box will not be available, if the number of devices is more than 300. Prime Network sequences the devices based on the default order (that you used while selecting the devices.) Step 9 Enter the e-mail ID(s) to which to send a notification after the import job is complete. For two or more users, enter a comma-separated list of e-mail IDs. A notification e-mail is sent based on the e-mail option specified in the Image Management Settings page. Note Before you enter the e-mail ID(s), ensure that you have set up the SMTP host and SMTP port in the Image Management Settings page (see Change Image Management Global Settings, page 4-53). The e-mail ID(s) configured in the Image Management Settings page, if any, will be displayed by default. You can modify the e-mail ID(s) if required. 4-27 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 4 Device Configurations and Software Images Software Images Step 10 Click Import. Prime Network redirects you to the Jobs page, where you can monitor the status of the import job. Note If you chose to import all devices from a group and if there is a change in the group by addition or deletion of devices after job creation, Prime Network updates the job accordingly such that all the devices available in the group at the time of execution of the job are considered. Step 11 Choose Images > Repository again to refresh the list of images. If any of the image information could not be retrieved, the field will display NA. (If pre-existing filters are still in use, you may need to click Clear Filter.) Step 12 If a field displays NA, the image attributes were not available from the image header. (If pre-existing filters are still in use, you may need to click Clear Filter.) We recommend that you manually enter the information to ensure the accuracy of the upgrade analysis. Step 13 Delete files from the storing directory (if applicable) to free space for future imports. After the import, you can also add informational text to the Comments field. Normally at this point you will distribute the images; see Distribute Images and Make Sure They Will Work, page 4-27. Distribute Images and Make Sure They Will Work Prime Network copies an image to a network element without activating it. This lets you perform these tasks before activating the image: • Find out if there is insufficient memory, clear the disk space for distributing the image or package • Do an upgrade analysis to check the suitability of the device for the chosen image If appropriate, the images can be activated as part of the distribution job, and these tasks can also be performed: • Commit Cisco IOS XR (so that changes are saved across device reloads) • Perform a warm upgrade, where one Cisco IOS image can read in and decompress another Cisco IOS image and transfer control to this new image (thus reducing the downtime of a device during planned software upgrades and downgrades) • Perform an in-service software upgrade (ISSU) for Cisco ASR 903 devices to update the router software with minimal service interruption. ISSU can be performed in two ways: – Consolidated image—A single software image containing a full collection of software packages. This method is not recommended as it requires at least 600 MB of memory. – Sub-package—One or more sub-images extracted from the consolidated image. Change and Configuration Management uses this method to upgrade Cisco ASR 903 devices. For more information on performing an ISSU in sub-package mode and the required prerequisites, refer to the Cisco ASR 903 Series Router Chassis Configuration Guide. • Activate Cisco ASR 5000 boot configuration files Prime Network uses the image staging location and transport protocol (TFTP, by default) specified on the Image Management Settings page. Prime Network displays the available upgradable modules and the storage partitions (if any) on the network element for the image distribution, from which you can choose the storage location you want to use. 4-28 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 4 Device Configurations and Software Images Software Images The final step is to schedule the distribution job to occur either as soon as possible or at a future date (the default is as soon as possible). What is Upgrade Analysis? An upgrade analysis checks the attributes of the selected image, checks certain device features, and generates a separate report for each device. It is required before any image can be distributed. However, even if the upgrade analysis reports errors, Prime Network will allow you to proceed with the distribution (because an error can be a simple matter of an unpopulated field). Prime Network gathers this information from two sources: • The Prime Network image repository, which contains information about minimum RAM, minimum Flash, and so on, in the image header. • The Prime Network inventory, which contains information about the active images on the device, as well as Flash memory, modules, and processor details. Note For Cisco Nexus 5000 or Cisco Nexus 7000 series devices, Prime Network displays the upgrade analysis results for both the system and kickstart images selected for the device. An upgrade analysis verifies that the device contains sufficient RAM or storage, the image is compatible with the device family, and the software version is compatible with the image version running on the device. Table 4-3 denotes the symbols used on the Distribution page. Distribute Images to Devices The following procedure explains how to perform an image distribution. You can also use this procedure to perform an upgrade analysis and then exit the procedure before performing the distribution. Table 4-3 Status Icons Symbol Description In Device Status Column In Distribution Upgrade Analysis Column or Activation Analysis Results Device is available for upgrade analysis and distribution. Device passed without warnings. Device is not available for upgrade analysis or distribution. Most likely the device is in the Maintenance investigation state or the Unreachable communication state. Click the device hyperlink and open the device properties popup to see details about the device. Device passed with warnings. Click the icon to get more information. n/a Device did not pass analysis. Click the icon to get more information. 4-29 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 4 Device Configurations and Software Images Software Images Before You Begin • If you are doing a Cisco IOS XR version upgrade (which upgrades the core package), see Software Images, page 4-24 for information about other packages that you should upgrade at the same time. • The device VNE (the device model in Prime Network) must be in a managed state when you run the command. (This means the VNE Communication State must be Reachable, and the Investigation State must be Normal or Incomplete. For more information on VNE states, see the Cisco Prime Network 3.10 Administrator Guide.) • Make sure you have the permissions to perform the distribute operation. You will not be allowed to schedule a distribution job, if you do not have permissions. To distribute images and use upgrade analysis: Step 1 Choose Images > Distribute and then choose the device type (IOS or IOS XR) and selection method (by image or package, or by device). It is often easier to start with devices due to the sometimes cryptic nature of software image names. In this example we start with devices. a. To choose devices of a specific device group, click Select Groups in the table header. Click the hyperlinked device group name to view the list of devices that belong to the group. b. Select the required device group in the Device Groups page and click OK. c. Choose one or more devices and click Next. Step 2 Prime Network displays all images or packages which are valid for the selected devices from the internal image repository (for example, kickstart images for Cisco Nexus 5000 or Cisco Nexus 7000, and boot configs for Cisco ASR 5000). You can also choose From External Repository from the drop-down list (in the table header) to display the images or packages from the external image repository. Choose an image and click Next. Note Change and Configuration Management allows image distribution from external repository only through FTP. Make sure you have configured the required credentials for accessing the external image repository in the Image Management Settings page. Step 3 In the Select Storage page, choose a storage location by device or for all devices. This specifies where on the network element the image or package will be copied when it is distributed. This operation is not applicable for Cisco CPT devices. 4-30 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 4 Device Configurations and Software Images Software Images Step 4 Perform an upgrade analysis to check whether the network element has sufficient space for the image or package by clicking Upgrade Analysis. After a few moments, Prime Network displays the results of the analysis in the Upgrade Analysis column. Click the symbol next to the icon to see the Upgrade Analysis report. If an error is reported, you will see a prompt asking you to confirm whether or not to proceed with the operation. Note Check the report to verify whether the storage location has sufficient space for the image or package. If the space is insufficient, the distribution will fail. If there is insufficient memory, you can choose to clear the disk space while scheduling the distribution in the Schedule Distribution page. Step 5 If you do not want to distribute any images or packages (for example, if you only wanted to perform a manual upgrade analysis), click Cancel. Otherwise, proceed to Step 6. Step 6 Click Next to open the Schedule Distribution page in the wizard, and complete the schedule information. Note You can proceed with scheduling the distribution only if upgrade analysis is completed for all the devices (spanning across multiple pages) in the Select Storage page. Symbol Description In Device Status Column In Distribution Upgrade Analysis Column or Activation Analysis Results Device is available for upgrade analysis and distribution. Device passed without warnings. Device is not available for upgrade analysis or distribution. Most likely the device is in the Maintenance investigation state or the Unreachable communication state. Click the device hyperlink and open the device properties popup to see details about the device. Device passed with warnings. Click the icon to get more information. n/a Device did not pass analysis. Click the icon to get more information. Field Description Schedule Distribution When the distribution job should run. Note The time you specify here to schedule the distribution job is the server time. File Transport Protocol Overrides the default transfer protocol (as configured on the Image Management Settings page). Clear Flash (Optional) If the job encounters insufficient space, recovers the disk space occupied by files that were marked for deletion in the device. 4-31 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 4 Device Configurations and Software Images Software Images Step 7 Click Finished. You are redirected to the Jobs page, where you can check the status of the distribution job. Note Distribution fails if a timeout occurs after 30 minutes. You can view the job results for information on why the distribution failed. Remember to delete older images and packages from the staging directory. E-mail Id(s) E-mail ID(s) to which to send a notification after the scheduled distribution job is complete. For two or more users, enter a comma-separated list of e-mail IDs. A notification e-mail is sent based on the e-mail option specified in the Image Management Settings page. Install Add Package(s) (Optional) Adds packages during distribution for Cisco IOS XR devices Schedule Activation (Optional) Starts an activation job once the images or packages are distributed (immediately or at future time). For multiple devices, we recommend that you perform the activation separately from the distribution. Process For multi-device jobs, controls the job processes for both distribution and activation. If you chose Sequentially, you can also do the following: • Specify the order in which the operations should be processed, by moving the items up and down in the Reorderable Rows box. • Stop the job if an error is encountered by checking the Stop if an error occurs check box. Note If the job includes a reload, choose Sequentially. Otherwise, routers in the connectivity path of other routers may reload and cause problems. Commit Commits the packages after distribution for Cisco IOS XR devices. Warm Upgrade (For Cisco IOS only) Activates the Warm Upgrade feature to reduce the device downtime during the distribution process. ISSU (For Cisco ASR 903 devices only) Activates in-service software upgrade (ISSU) to update the router software with minimal service interruption. Change and Configuration Management performs the ISSU in sub-package mode. For more information on performing an ISSU in sub-package mode and the required prerequisites, refer to the Cisco ASR 903 Series Router Chassis Configuration Guide. Note For Cisco ASR 903 devices, you can perform either warm upgrade or ISSU only. Field Description 4-32 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 4 Device Configurations and Software Images Software Images Activate Cisco IOS Software Images These topics describe the tasks you can perform from the Activate page: • Activate Cisco IOS Software Images • Activate After Performing Boot Priority Modification for Cisco ASR 5000 Series Devices When a new Cisco IOS image is activated on a device, it becomes the running image on the disk. Deactivated images remain on the disk to be removed by a user. Older images are automatically deactivated. Before You Begin • The device VNE (the device model in Prime Network) must be in a managed state when you run the command. (This means the VNE Communication State must be Reachable, and the Investigation State must be Normal or Incomplete. For more information on VNE states, see the Cisco Prime Network 3.10 Administrator Guide.) • Make sure you have the permissions to perform the activate operation. You will not be allowed to schedule an activation job, if you do not have permissions. Activate Cisco IOS Software Images To activate a Cisco IOS image on a network element: Step 1 Choose Images > Activate > IOS and the activation method (by Images or Devices). It is often easier to start with devices due to the sometimes cryptic nature of software image names. In this example we start with devices. Step 2 Prime Network displays all managed devices. It also displays the images that are currently running on the devices. You can filter by device name, IP address, element type, running image, or software version. a. To choose devices of a specific device group, click Select Groups in the table header. Click the hyperlinked device group name to view the list of devices that belong to the group. b. Select the required device group in the Device Groups page and click OK. c. Choose one or more devices and click Next. Prime Network displays all images or packages which are valid for the selected devices from the internal image repository (for example, kickstart images for Cisco Nexus 5000 or Cisco Nexus 7000, and boot configs for Cisco ASR 5000). You can also choose From External Repository from the drop-down list (in the table header) to display the images or packages from the external image repository. Step 3 Prime Network displays all images or packages which are valid for the selected devices from the internal image repository. Prime Network displays only root level bin files for selection. For a Cisco Nexus 5000 or Cisco Nexus 7000 series device, Prime Network displays the kickstart images available on the device in the Kickstart Images field. The field displays N/A if there are no kickstart images for the device. Step 4 Choose the image that you want to activate on the devices, and click Next. Step 5 For Cisco ASR 5000 series device, the Enter Boot Config page appears. You can activate a boot configuration file on the device in addition to an image. Select a boot configuration file from the available list and click Save and then Next. 4-33 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 4 Device Configurations and Software Images Software Images Step 6 Prime Network performs an image analysis. Check the Image Analysis page to see if analysis was successful. Click the icon in the Analysis column to get information about why the operation can or cannot proceed. If it cannot proceed, you will not be permitted to continue. Otherwise, click Next. Step 7 Enter the scheduling information in the Schedule Activation page. By default, jobs are scheduled to run as soon as possible. Note The time you specify here to schedule the activation job is the server time. Step 8 Enter the e-mail ID(s) to which to send a notification after the scheduled activation job is complete. For two or more users, enter a comma-separated list of e-mail IDs. A notification e-mail is sent based on the e-mail option specified in the Image Management Settings page. Step 9 (For Cisco IOS only) Activate the Warm Upgrade option, which allows a Cisco IOS image to read in and decompress another Cisco IOS image and transfer control to this new image (thus reducing the downtime of a device during planned software upgrades and downgrades). Step 10 (For Cisco ASR 903 devices only) Activate the ISSU option, to update the router software with minimal service interruption. Change and Configuration Management performs the ISSU in sub-package mode. For more information on performing an ISSU in sub-package mode and the required prerequisites, refer to the Cisco ASR 903 Series Router Chassis Configuration Guide. Note For Cisco ASR 903 devices, you can perform either warm upgrade or ISSU only. Step 11 Click one of the following to specify the operation mode, if you have selected two or more devices in the Select Devices page. • In Parallel—Activates all packages for the devices at the same time. • Sequentially—Allows you to define the order of the devices to activate the packages for. Step 12 Click Finished to schedule the activation. Symbol Description In Device Status Column In Distribution Upgrade Analysis Column or Activation Analysis Results Device is available for upgrade analysis and distribution. Device passed without warnings. Device is not available for upgrade analysis or distribution. Most likely the device is in the Maintenance investigation state or the Unreachable communication state. Click the device hyperlink and open the device properties popup to see details about the device. Device passed with warnings. Click the icon to get more information. n/a Device did not pass analysis. Click the icon to get more information. 4-34 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 4 Device Configurations and Software Images Software Images Activate After Performing Boot Priority Modification for Cisco ASR 5000 Series Devices To modify boot priorities for Cisco ASR 5000 series devices and then perform activation: Step 1 Choose Images > Activate > IOS and the activation method (by Devices). Step 2 Choose the Cisco ASR 5000 device family from the table header. Prime Network displays all managed Cisco ASR 5000 series devices. It also displays the images that are currently running on the devices. You can filter by device name, IP address, element type, running image, or software version. Step 3 Select a Cisco ASR5000 series device, choose the Perform Edit Boot Priorities option from the drop-down menu in the table header, and then click Next. The Select Boot Config page appears. Step 4 Click the Edit Boot Priorities hyperlink. The Current Boot Priorities table lists the existing boot configuration files with their priorities. Step 5 Provide the following inputs to set up and fetch the desired boot priorities: • Number of boot priority entries to be maintained. Value should be in the range of 1-10. • Boot priority number to start with. Value should be in the range of 1-100. Boot priority starting value should be greater than or equal to the number of boot priorities to be maintained. Step 6 Click Go to generate boot priorities based on the inputs provided. The modified boot priorities are listed in the table below. Step 7 You can choose to perform one of the following for each row in the table: • Edit—Modify the boot priority value, the image name, and the configuration file, if required. The modified boot priority value should be unique. • Delete—Delete the boot configuration priority. • Add Row—Add boot priorities to the existing list. Change and Configuration Management generates boot priority values based on the inputs provided. Note that only the top ten boot priorities are considered for the device. Step 8 Click Save. A dialog box appears listing the existing and the modified boot priorities for your confirmation. Step 9 Click Save to confirm and apply the boot priority changes. Step 10 You can then schedule the activation as explained in steps 7 through 13 in the Activate Cisco IOS Software Images topic. Perform Cisco IOS XR Software Package Operations Note We recommend that you do not commit the package change until the device runs with its configuration for a period of time, until you are sure the change is appropriate. In that way, the change is not yet persisted across device reloads. These topics explain how to perform package operations: • Notes on Cisco IOS XR Packages, page 4-35 • Add Cisco IOS XR Packages, page 4-35 4-35 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 4 Device Configurations and Software Images Software Images • Activate, Deactivate, and Delete Cisco IOS XR Packages, page 4-36 • Synchronize and Upgrade Satellites for Cisco ASR 9000 Devices, page 4-38 • Commit Cisco IOS XR Packages Across Device Reloads, page 4-39 • Roll Back Cisco IOS XR Packages, page 4-40 Notes on Cisco IOS XR Packages Package management includes the add, activate, deactivate, commit, and rollback operations on Cisco IOS XR devices. Before you perform any of these operations, read the following: • When doing a version upgrade (which upgrades the core package and involves a router reload) on a Cisco IOS XR device, all of the packages on the router should be upgraded at the same time, as part of the same job. For example, if the c12k-mini, c12k-mgbl, c12k-mpls, c12k-k9sec, and c12k-mcast packages are on the router at version 3.4.1, when upgrading to version 3.5.0, all of the packages must be upgraded at the same time to version 3.5.0. Note An upgrade pie is required only when you upgrade Cisco IOS XR devices from version 3.x to 4.x. You must deactivate and remove the upgrade pie, if you wish to perform any install operations, including the install commit operation on the devices upgraded from 3.x to 4.x. • When upgrading the core router package (such as c12k-mini or comp-hfr-mini), the manageability package (such as c12k-mgbl or hfr-mgbl-p) must be upgraded at the same time to ensure that the router remains manageable after the reload. • Cisco IOS XR routers support the clear install rollback oldest x command, that allows you to manage the number of rollback points maintained on the router. Executing this CLI command periodically on the router allows you to limit the number of rollback points. When executing this command, you must ensure that at least one valid rollback point is always maintained to enable Prime Network to show the package status correctly. We recommend that you maintain about 20 rollback points on the router. • NEIM does not support upgrading a router running Cisco IOS software to Cisco IOS XR software. For more information, refer to the System Management Configuration Guide for the Cisco IOS XR release and device of interest. Add Cisco IOS XR Packages Image Management supports package addition as a separate operation for Cisco IOS XR devices. To complete the package management life cycle, Image Management supports adding a package from a pie file, which is already present in the Cisco IOS XR device storage. Before you begin: Make sure you have the permissions to perform package addition. You will not be allowed to schedule a package addition job, if you do not have permissions. To add packages for Cisco IOS XR devices: Step 1 Choose Images > Package Add. The Package Add wizard displays all the Cisco IOS XR devices in the Select Device(s) page. Step 2 Select a device and click Next to open the Select Package(s) page. Prime Network displays all the packages available for the selected device. 4-36 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 4 Device Configurations and Software Images Software Images Step 3 Choose the package(s) that you want to add for the selected device and click Next to open the Schedule Package Addition page in the wizard. Step 4 Enter the scheduling information. By default, jobs are scheduled to run as soon as possible. Note The time you specify here to schedule the package addition job is the server time. Step 5 If you have selected two or more devices in the Select Devices page, click one of the following to specify the operation mode: • In Parallel Order—Add packages for all devices at the same time. • In Sequential Order—Allows you to specify the order of the devices to import the packages for. Step 6 Enter the e-mail ID(s) to which to send a notification after the scheduled package addition job is complete. For two or more users, enter a comma-separated list of e-mail IDs. A notification e-mail is sent based on the e-mail option specified in the Image Management Settings page. Step 7 Click Finished. Prime Network schedules the job and redirects you to the Jobs page, where you can monitor the status of the job. Activate, Deactivate, and Delete Cisco IOS XR Packages Note For Cisco IOS XR devices, we recommend that you do not commit the package change until the device runs with its configuration for a period of time, until you are sure the change is appropriate. In that way, the change is not yet persisted across device reloads. Before You Begin • If you are doing a Cisco IOS XR version upgrade (which upgrades the core package), see Software Images, page 4-24 for information about other packages that you should upgrade at the same time. • The device VNE (the device model in Prime Network) must be in a managed state when you run the command. (This means the VNE Communication State must be Reachable, and the Investigation State must be Normal or Incomplete. For more information on VNE states, see the Cisco Prime Network 3.10 Administrator Guide.) To activate or deactivate a Cisco IOS XR package, or delete a Cisco IOS XR package from a device: Step 1 Choose Images > Activate > IOS-XR and the activation method (by Packages or Devices.). It is often easier to start with devices due to the sometimes cryptic nature of software image names. In this example we start with devices. Step 2 Prime Network displays all managed devices. (It also displays the packages that are currently running on the devices.) From this page you can also view the running package of the Cisco IOS XR device. a. To choose devices of a specific device group, click Select Groups. In the Device Groups page, you can view the user-defined device groups. Click the hyperlinked device group name to view the list of devices that belong to the group. See Device Groups Setup Tasks, page 4-8 for more information on user-defined device grouping. b. Select the required device group in the Device Groups page and click OK. 4-37 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 4 Device Configurations and Software Images Software Images c. Choose one or more devices and click Next. Prime Network displays all packages which are valid for the selected devices. You can filter your results by package name and version. d. Choose the packages that you want to activate on the devices, and click Next. Step 3 Specify the operations you want to perform. You can perform different operations on different devices or the same operation on all devices (by selecting the desired operation from the Use the following Operation for all Packages drop-down list in the table header). When you select a device, Prime Network will display all of the packages that are installed on the device. a. Choose a package operation for each package. Cisco IOS XR packages can be removed from a device only if they have been deactivated. If you want to apply the same operation to all packages, choose the operation from the Use the following Operation for all Packages drop-down list in the table header, and click Apply. b. (Optional) Check Test Only to run a test of the activation (or deactivation) procedure on the device. This will not change the real device configuration. (This is similar to using the Compatibility Check option in the rollback process.) c. Click Next. The Package Analysis page is displayed. Check the Package Analysis page to see if analysis was successful. Click the icon in the Analysis column to get information about why the operation can or cannot proceed (it will be one of the icons listed in Table 4-3 on page 4-28). If it cannot proceed, you will not be permitted to continue. Otherwise, click Next. Step 4 Enter the scheduling information. By default, jobs are scheduled to run as soon as possible. Note The time you specify here to schedule the activation job is the server time. Step 5 Enter the e-mail ID(s) to which to send a notification after the scheduled activation job is complete. For two or more users, enter a comma-separated list of e-mail IDs. A notification e-mail is sent based on the e-mail option specified in the Image Management Settings page. Step 6 (For Cisco Carrier Routing System (CRS) devices only) Activate the ISSU option, to update the router software with minimal service interruption. Change and Configuration Management performs the ISSU in sub-package mode. For more information on performing an ISSU in sub-package mode and the required prerequisites, refer to the Cisco ASR 903 Series Router Chassis Configuration Guide. Step 7 Check the Commit check box to commit the packages after activation. Note We recommend that you do not commit the package change until the device runs with its configuration for a period of time, until you are sure the change is appropriate. In that way, the change is not yet persisted across device reloads. Step 8 Click one of the following to specify the operation mode, if you have selected two or more devices in the Select Devices page. • In Parallel—Activates packages for all devices at the same time. • Sequentially—Allows you to define the order of the devices to activate the packages for. Step 9 Click Finished to schedule the activation. Step 10 After the job completes: • For Test Only jobs, repeat this procedure to activate the packages. 4-38 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 4 Device Configurations and Software Images Software Images • If you activated or deactivated a Cisco IOS XR package, remember to commit your changes. However, we recommend that you do not commit the package change until the device runs with its configuration for a period of time, until you are sure the change is appropriate. In that way, the change is not yet persisted across device reloads. See Commit Cisco IOS XR Packages Across Device Reloads, page 4-39. Synchronize and Upgrade Satellites for Cisco ASR 9000 Devices Change and Configuration Management provides satellite support for Cisco ASR 9000 devices. Satellites are used to enhance performance bandwidth of Cisco ASR 9000 devices. Each satellite is a Cisco IOS device connected to the Cisco ASR 9000 device. Multiple satellites can be connected to a single Cisco ASR 9000 device and all communications to the satellites happen only through the Cisco ASR 9000 device. Each satellite has its own configuration and software image. Change and Configuration Management provides the following support for Cisco ASR 9000 device with satellites: • Synchronization of all satellites together. • Activation of the satellite pie image on Cisco ASR 9000 device with and without synchronization of satellites. You must run a CLI/XML command to check for compatibility and then push the image to the remote satellite. Synchronize all satellites together without activation To synchronize all satellites together without activation: Step 1 Choose Images > Activate > IOS-XR and the activation method (by Devices). Step 2 Choose the Cisco ASR 9000 device family and the Sync Satellites option from the Select Operations drop-down menu in the table header. Prime Network displays all managed Cisco ASR 9000 series devices having satellites. (It also displays the packages that are currently running on the devices.) Step 3 Click Next to schedule the synchronization for all the satellites together. You cannot select a particular satellite for synchronization. The Select Operation function is not applicable for the Sync Satellites option. Step 4 In the Schedule Activation page, provide the scheduling information for synchronization of all satellites. Note The time you specify here to schedule the synchronization job is the server time. Step 5 Check the Sync Satellite(s) check box and click Finished. The Sync Satellite(s) check box is available only for Cisco ASR 9000 devices having satellites. Activate satellite image on Cisco ASR 9000 device with/without synchronization To activate a satellite image on the Cisco ASR 9000 device with/without satellite synchronization: Step 1 Choose Images > Activate > IOS-XR and the activation method (by Devices). Step 2 Choose the Cisco ASR 9000 device family and the Activate and/or Sync Satellites option from the Select Operations drop-down menu in the table header. 4-39 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 4 Device Configurations and Software Images Software Images Step 3 Perform steps 3 through 7 in the Activate, Deactivate, and Delete Cisco IOS XR Packages, page 4-36 topic. Step 4 Check the Sync Satellite(s) check box, if you wish to upgrade and synchronize the satellites. The Sync Satellite(s) check box is available only for Cisco ASR 9000 devices having satellites. Note Synchronization of satellites is done, only if the operation selected is activation or deactivation. Otherwise, synchronization will not happen even if this check box is selected. Step 5 Click Finished to schedule the activation and/or synchronization. Commit Cisco IOS XR Packages Across Device Reloads Committing a Cisco IOS XR package makes the device package configurations persist across device reloads. The commit operation also creates a rollback point on the device. See Roll Back Cisco IOS XR Packages, page 4-40, for more information on rollback points. Note We recommend that you do not commit package changes until the device runs with its configuration for a period of time, until you are sure the change is appropriate. In that way, the change is not yet persisted across device reloads. Before You Begin • Verify that the package to be committed is operating properly (for example, by doing a show status command). • The device VNE (the device model in Prime Network) must be in a managed state when you run the command. (This means the VNE Communication State must be Reachable, and the Investigation State must be Normal or Incomplete. For more information on VNE states, see the Cisco Prime Network 3.10 Administrator Guide.) • Make sure you have the permissions to perform the commit operation. You will not be allowed to schedule a commit job, if you do not have permissions. To commit a package after it has been activated, deactivated, or rolled back: Step 1 Choose Images > Commit. Step 2 Choose the network elements with the packages you want to commit. Step 3 Click one of the following (in the table header) to specify the commit mode: • Commit in Parallel—Commits all changes at the same time. • Commit Sequentially—Allows you to define the order in which the changes are committed. Step 4 Enter the scheduling information. Note The time you specify here to schedule the commit job is the server time. Step 5 Enter the e-mail ID(s) to which to send a notification e-mail after the scheduled commit job is complete. For two or more users, enter a comma-separated list of e-mail IDs. A notification e-mail is sent based on the e-mail option specified in the Image Management Settings page. 4-40 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 4 Device Configurations and Software Images Software Images Step 6 Click Commit. By default, jobs are scheduled to run as soon as possible. Roll Back Cisco IOS XR Packages Rolling back a Cisco IOS XR package reverts the device packages to a previous installation state—specifically, to a package installation rollback point. If a package has been removed from a device, all rollback points associated with the package are also removed and it is no longer possible to roll back to that point. Before You Begin • Read Software Images, page 4-24, for information about managing rollback points on Cisco IOS XR devices. • The device VNE (the device model in Prime Network) must be in a managed state when you run the command. (This means the VNE Communication State must be Reachable, and the Investigation State must be Normal or Incomplete. For more information on VNE states, see the Cisco Prime Network 3.10 Administrator Guide.) • Make sure you have the permissions to perform the rollback operation. You will not be allowed to schedule a rollback job, if you do not have permissions. To roll back a Cisco IOS XR package: Step 1 Choose Images > Rollback. Prime Network displays all Cisco IOS XR devices. You can filter the results by using the Quick Filter option. Step 2 Choose the network elements. Prime Network populates the rollback points for the selected device package. Step 3 Choose a rollback ID from the Rollback ID drop-down list. The Rollback Point Details field lists the packages that were active when that ID was created. Step 4 To view all of the packages associated with the rollback point, place the mouse cursor on the Rollback Point Details field; see Figure 4-9 for an example. To view the time stamp associated with the selected rollback, see the value displayed in the Time Stamp field. Note The date and time stamps are displayed according to the local time zone settings of the client. Figure 4-9 Packages Rollback Page with Rollback Point Details 4-41 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 4 Device Configurations and Software Images Software Images Step 5 Click OK to close the popup window. Note If a package has been deleted from the repository, the rollback points of the package are still displayed in the GUI. If you choose a rollback point for a deleted package, the rollback will fail. The job results popup provides information explaining why it failed. Step 6 (Optional) Click Compatibility Check in the table header to run a test of the rollback procedure on the device. This will not change the real device configuration. (This is similar to using the Test Only option in the activation process.) Step 7 Click Rollback or Rollback and Commit. Note We recommend that you do not commit package changes until the device runs with its configuration for a period of time, until you are sure the change is appropriate. In that way, the change is not yet persisted across device reloads. See Commit Cisco IOS XR Packages Across Device Reloads, page 4-39. Step 8 Enter the scheduling information. Note The time you specify here to schedule the rollback job is the server time. Step 9 Enter the e-mail ID(s) to which to send a notification after the scheduled rollback job is complete. For two or more users, enter a comma-separated list of e-mail IDs. A notification e-mail is sent based on the e-mail option specified in the Image Management Settings page. Note Before you enter the e-mail ID(s), ensure that you have set up the SMTP host and SMTP port in the Image Management Settings page (see Change Image Management Global Settings, page 4-53). The e-mail ID(s) configured in the Image Management Settings page, if any, will be displayed by default. You can modify the e-mail ID(s) if required. Step 10 Click Rollback. Clean Up the Repository The repository is purged according to the settings described in NEIM Setup Tasks, page 4-6. When files are removed from the repository, this does not affect files that are installed on the device. However, deleting a package could cause a rollback point to become unexecutable. If a package or version of a package that is associated with a specific rollback point is removed, it will no longer be possible to roll back to that point. See Roll Back Cisco IOS XR Packages, page 4-40. To delete images from the Prime Network image repository: Step 1 Choose Images > Repository. Step 2 Select the image you want to delete and click the Delete button (with red X) in the table header. Step 3 To collectively delete all images in the repository, click the Delete All button in the table header. You will see a prompt asking you to confirm whether or not to proceed with the operation. 4-42 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 4 Device Configurations and Software Images Configuration Audit Step 4 Click OK to confirm and image(s) available in the repository will be deleted. These topics provide administrative information on Change and Configuration Management: • Global Settings and Administration, page 4-47—How to use the Configuration Management Settings page to specify when configurations should be collected, when they should be purged, commands to exclude from comparisons, and other global settings. • Change Image Management Global Settings, page 4-53—How to use the Image Management Settings page to specify the default transfer protocol, staging and storing locations, and credentials for accessing a vendor website. • Check the Processes, page 4-54—How Change and Configuration Management ensures communication security, authenticates and authorizes users, where log files for debugging purposes are located, and so forth. You should also make sure you have properly set up Change and Configuration Management by reading Configuration Management Setup Tasks, page 4-5. Note In the Configuration Management and Image Management Settings pages, Change and Configuration Management does not support the following special characters: • For Password fields—>, <, ', /, \, !, :, ;, and " • For all other fields—`, ~, @, #, $, %, ^, &, *, (, ), +, =, |, {, }, [, ], ', ?, >, <, /, \, !, :, ;, and " Configuration Audit Change and Configuration Management facilitates a configuration compliance mechanism, which enables auditing configurations on a device against a specified configuration policy file (also called as a baseline or expected configuration). Prime Network facilitates administering multiple configuration policy files through a Configuration Audit Policy Manager. Each configuration policy is a set of CLI commands that define a desired baseline or expected configuration. Configuration policies can also be configured using valid, Java-based regular expressions. Table 4-4 provides examples of configuration policy CLIs. Table 4-4 Configuration Policy CLI Examples Policy Name Policy Description Policy CLI SamplePolicy1 Sample policy for global configuration auditing spanning-tree mode rapid-pvst SamplePolicy2 Sample policy for global regex and first sub level cli matching audit interface GigabitEthernet(.*) port-type nni SamplePolicy3 Sample policy for global regex, first sub level cli matching, and second sub level regex matching router (.*) address-family ipv4 unicast network (.*) SamplePolicy4 Sample policy for fixed cli matching interface GigabitEthernet3/4 address-family ipv4 unicast 4-43 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 4 Device Configurations and Software Images Configuration Audit Sample Configuration Policy The following example shows a policy that performs audit for BGP configuration for a Cisco IOS router: #BGP Configuration Audit router bgp (.*) neighbor (.*) remote-as (.*) address-family ipv4 If user likes to have an audit check for specific BGP AS or neighbor ip address, the above CLI can be changed accordingly. For example: router bgp 65000 neighbor (.*) remote-as 65001 address-family ipv4 User can combine multiple different configurations into one policy. For example: #BGP Configuration Audit router bgp (.*) neighbor (.*) remote-as (.*) address-family ipv4 # Interface MEP check interface GigabitEthernet(.*) ethernet (.*) mep domain UP (.*) Configuration audit can be scheduled against multiple configuration files to obtain an audit report that indicates the existence of configuration sequences stated in the baseline policy and any deviations from the baseline. You can define a configuration policy, select the devices that need to be audited against the policy, and schedule the audit job to run immediately or at a later point in time. The audit job compares the CLI commands (as part of the configuration policy) against the actual running configuration on the device to identify the discrepancies. You can view the status of all the scheduled configuration audit jobs in the Job Manager page. The configuration audit results are in the form of a report indicating the discrepancies (missing configuration commands on the device) in red and the matching commands in green. Manage Configuration Policies Change and Configuration Management allows you to create, modify, view, and delete configuration policies. Choose Configuration Audit > Configuration Policies. The Configuration Policies page provides the list of existing policies. You can search the configuration policies by CLI strings. Create Configuration Policy To create a configuration policy: Step 1 In the Configuration Policies page, click Create. Step 2 Provide the policy name and description. Step 3 Enter the CLI commands to set up a baseline configuration for that policy. This can also be a valid, Java-based regular expression. See Table 4-4 for sample configuration CLIs. 4-44 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 4 Device Configurations and Software Images Configuration Audit Step 4 Make sure you follow the guidelines while entering the CLI commands. Click Guidelines to view these guidelines as shown in Figure 4-10. Figure 4-10 Create Configuration Policy-Showing Guidelines Edit, View, or Delete Configuration Policy In the Configuration Policies page, you can also do the following: • Select a policy and click Edit to modify the policy description and CLI commands. You cannot modify the policy name. Keep in mind the policy guidelines while modifying the CLI commands. • Select a policy and click View to view the policy name, description, and CLI commands. • Select a policy or multiple policies and click Delete to delete the configuration policies. You cannot delete a policy if it is part of a scheduled audit job. Schedule Configuration Audit You can schedule configuration audit jobs to run immediately or at a later point in time. Note Only a maximum of 10 policies and 500 devices can be used for scheduling an audit job. To schedule a configuration audit job: Step 1 Choose Configuration Audit > Basic Audit. The Select Configuration Policies page lists the available configuration policies. You can search the configuration policies by using CLI strings. Step 2 Select the desired configuration policy from the available list and click Next. 4-45 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 4 Device Configurations and Software Images Configuration Audit Step 3 In the Select Devices page, select the devices that must be audited against the selected configuration policy, and then click Next. Step 4 In the Schedule Audit page, provide a job name and the scheduling information for the configuration audit job. You can choose to run the audit job immediately or at a later point in time. A popup with the server time is available to assist you in setting up the time for scheduling the audit job. Step 5 Click Audit. You will be redirected to the Configuration Audit Jobs page. Note Once scheduled, you cannot edit the policies or devices that are part of the scheduled job. View Configuration Audit Jobs and Audit Results The Configuration Audit Jobs page (Configuration Audit > Configuration Audit Jobs) provides the following details: • Jobs—This table lists all configuration audit jobs submitted by the login user. The ‘root’ user can view jobs submitted by other users, by selecting the username from the table header. • History—For a selected job in the Jobs table, this table lists all the instances. You can select only one job at a time to view the history details. You can select a job and click View to view the associated devices and policies, and the schedule for the selected audit job. You can also use this page to suspend, resume, cancel, delete, or reschedule a job. To view the configuration audit job details and the audit result: Step 1 Click on the hyperlinked LastRun Result (Success/Partial Success/Failure) against a particular job in the Jobs table. The Configuration Audit Job Details dialog box displays the job details and the audit results for a device and policy combination, as shown in Figure 4-11. The Job Results table includes the device audited, policy against which the device was audited, audit status, and the running configuration version used for the audit. A blue tick mark in the Status column indicates ‘Audit Pass’, and a red X indicates ‘Audit Fail’. Click the hyperlinked policy name to view the configuration policy details, with updates if the policy has been modified. Note For Cisco Nexus devices, the VDC name is also displayed in the Device Name column. 4-46 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 4 Device Configurations and Software Images Configuration Audit Figure 4-11 Configuration Audit Job Details Step 2 Click on the hyperlinked Status (Pass/Fail icon) in the Job Results table. Or, click the hyperlinked Success or Failure hyperlink in the Result field of the History table. The Configuration Audit Result dialog box displays the audit result with matching commands (for ‘Audit Pass’) and discrepancies or missing commands (for ‘Audit Fail’) between the policy and the running configuration on the device. See Figure 4-12 for an example of the Configuration Audit Result dialog box for an ‘Audit Fail’ scenario. Figure 4-12 Configuration Audit Result - Audit Fail 4-47 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 4 Device Configurations and Software Images Global Settings and Administration The matching commands are displayed in green (see Figure 4-13), while the discrepancies are displayed in red (see Figure 4-12). For a failed job, the Audit Result section also displays the reason why the audit was not successful as shown in Figure 4-12. Some reasons for audit failure are: • Failed to back up running configuration of the device • Device not reachable • Unable to download running configuration • Device not under the scope of the user • Policy is not available • Invalid regular expression in the CLI Figure 4-13 Configuration Audit Result - Audit Pass Step 3 Click Export in the Job Results table to export the audit job results to a .csv file. You can view the job details and audit results in the exported file. Global Settings and Administration This topic contains the following sections: • Change Configuration Archive Global Settings, page 4-48 • Change Image Management Global Settings, page 4-53 • Check the Processes, page 4-54 4-48 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 4 Device Configurations and Software Images Global Settings and Administration • Manage Jobs, page 4-55 • User Authentication and Authorization, page 4-55 Change Configuration Archive Global Settings To open the Configurations global settings page, choose Configurations > Settings. Table 4-5 lists all of the global settings you can configure for Configuration Management. The backup settings you enter here do not affect the manual backups you can perform by choosing Configurations > Backup. The backups you perform from that page and the backups you configure on this Settings page are completely independent of each other. Note Make sure that the configuration change detection schedule does not conflict with purging, since both processes are database-intensive. Table 4-5 Configuration Archive Global Settings Field Description Export Settings Server Name DNS-resolvable server name. Note Change and Configuration Management supports export servers with IPv4 or IPv6 address. Location The full pathname of the directory to which Prime Network should copy the file on the server specified in the Server Name field. Username The login username that Prime Network should use when connecting to the server specified in the Server Name field. Password The login password that Prime Network should use when connecting to the server specified in the Server Name field. Export Protocol Default export protocol that Prime Network should use when exporting configuration files to another server. The choices are FTP and SFTP. The default is FTP. You can override this protocol while scheduling an export job, if required. Archive Purge Settings Minimum Versions to Retain Minimum number of versions of each configuration that should be retained in the archive (default is 2). Maximum Versions to Retain Maximum number of versions of each configuration that Prime Network should retain (default is 5). The oldest configuration is purged when the maximum number is reached. Configurations marked “do not purge” are not included when calculating this number. Minimum Age to Purge Age (in days) at which configurations should be purged (between 5-360). Configuration Change Purge Settings Purge Change Logs after The age in days at which configuration change notifications (Change Logs) that are sent by devices should be purged. The default is 30 days and the range is 5-360. 4-49 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 4 Device Configurations and Software Images Global Settings and Administration Global Settings Transport Protocol Default transport protocol that Prime Network should use when copying configuration files to and from a device. The options are TFTP, SFTP/SCP, and FTP. The default is TFTP. Note the following: • The TFTP source interface on the devices must be able to reach the unit. Otherwise, the configuration management jobs that require TFTP may fail. • To use SFTP/SCP for config transfers from a device to a unit, you need to ensure that an SSH server is configured and running on the device, such that the device acts as a server and the unit as a client during the transfer. For Cisco IOS XR devices, you need to configure the device with K9 security (k9sec) enabled images such that the SSH server is up and running on the device. Global Settings Enable Periodic Config Backup Detect ongoing configuration changes by performing a periodic collection of device information. Use this method if configurations change frequently and those changes are not important to you. CM compares the timestamp for the last configuration change on the archived version with the timestamp on the newer version. If they are different, CM backs the new file to the archive immediately. By default, this is not enabled. You can set up an interval in the range of 1-100 hours. Default value is 72 hours. Note This CM collection is independent of the Prime Network inventory collection. Enable Periodic Sync for Out of Sync Devices (24Hours) (For Cisco IOS only) Enables automatic synchronization of the out-of-sync devices on a periodic basis. Prime Network adds a device to the list of out-of-sync devices whenever the latest version of the startup configuration is not in sync with the latest version of the running configuration file on the device. Enable Periodic Config Export Allows CM to export archived configurations periodically to the export server. You can set up an interval in the range of 1-100 hours to export the archived configurations. The default value for export interval is 24 hours. You can also specify the start time for the periodic export operation. If there are no configuration changes i.e. if the archived configuration is available in the export server, choose one of the following options to indicate how the export job should be performed: • Export configuration file will all configuration—Overwrite the existing configuration on the export server. • Do not export configuration file—Skip configuration export. • Export configuration file with reference to previous configuration file—Create a configuration file with only a reference to the file having the actual configuration. Refer to Configuration Export File Type for Devices, page 4-52, to know more about the type of configuration files exported for different devices. Table 4-5 Configuration Archive Global Settings (continued) Field Description 4-50 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 4 Device Configurations and Software Images Global Settings and Administration Enable Initial Config Syncup Allows CM to fetch the configuration files from the network devices and archive it whenever a new device is added to Prime Network. If this setting is enabled: • CM performs the configuration file fetch operation whenever the Prime Network gateway is restarted. • The Disable Initial Config Syncup on Restart check box is enabled by default to prevent network device performance issues on subsequent Prime Network gateway restarts. To preserve this setting such that CM fetches the configuration files from network devices on Prime Network gateway restarts, you must uncheck the Disable Initial Config Syncup on Restart check box after enabling the Enable Initial Config Syncup option. Note The “sync up” described here pertains to making sure the archive correctly reflects the network device configurations. This is different from the CM Synchronize operation, where devices are checked to make sure their running and startup configurations are the same. This “sync up” is required in order for Prime Network to populate the Configuration Sync Status dashlet (on the dashboard). Disable Initial Config Syncup on Restart Check the check box to set Enable Initial Config Syncup to its default setting (not enabled) if Prime Network restarts. Enable Event-Triggered Config Archive Detect ongoing configuration changes by monitoring device configuration change notifications. This setting also controls whether Prime Network populates the Configuration Changes in the Last Week and the Most Recent Configuration Changes dashlets (on the dashboard). Use this method if you consider every configuration file change to be significant. When a notification is received, CM backs up the new running configuration file to the archive using one of the following methods. Note If you are using event-triggered archiving, you should also make sure that exclude commands are properly configured. Exclude commands are commands that Prime Network ignores when comparing configurations, and they are controlled from the Settings page. Using this mechanism eliminates unnecessary file backups to the archive. Sync archive on each configuration change Upon receiving a change notification from a device, immediately backs up the device configuration file to the archive. Sync archives with changed configurations every ___ hours and ___ minutes Upon receiving a change notification from a device, queue the changes and backs up the device configuration files according to the specified schedule. Restore Mode Settings Restore Mode Mode for restoring configuration files to a device: • Overwrite—Prime Network overwrites the existing configuration on the device with the file you selected from the archive. Check the Use Merge on Failure check box to restore configuration files in Merge mode, if Overwrite mode fails. • Merge—Prime Network merges the existing running or startup configuration on the device with the configuration present in the version you selected from the archive. E-mail Settings SMTP Host SMTP server to use for sending e-mail notifications on the status of configuration management jobs to users. If an SMTP host is configured in the Image Management Settings page, the same value will be displayed here by default. You can modify it, if required. Table 4-5 Configuration Archive Global Settings (continued) Field Description 4-51 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 4 Device Configurations and Software Images Global Settings and Administration Notes on Exclude Commands Exclude commands are inherited; in other words, if three exclude commands are specified for Cisco routers, all devices is any of the Cisco router families will exclude those three commands when comparing configuration files. Caution Exclude commands configured for a device family (such as Cisco 7200 Routers) will be applied to all device types in that family (Cisco 7201, Cisco 7204, Cisco 7204VXR, and so forth). When you are working in the Exclude Commands GUI, your current selection will be highlighted in green. All exclude commands applied to that selection will be listed below the device selector. When Prime Network compares the router configuration files, it will exclude all of the commands listed in the Device Commands field. If a series is selected (example, Cisco 7200 Series), the commands listed in the Series Commands field will be excluded and so on. E-mail Id(s) E-mail addresses of users to send a notification to after the scheduled job is complete. For two or more users, enter a comma-separated list of e-mail IDs. For example: xyz@cisco.com,abc@cisco.com The e-mail IDs configured here will appear by default while scheduling the configuration management jobs. However, you can add/modify the e-mail IDs then. SMTP Port SMTP port ID to connect to the host server. The default port is 25. Email Option Choose from the following options to specify when you want to send an e-mail notification for CM jobs: • All—To send a notification e-mail irrespective of the job result. • Failure—To send a notification e-mail only when the job has failed. • No Mail—Do not send a notification e-mail on the job status. The selected option will appear by default while scheduling CM jobs. However, you can modify the option then. Exclude Commands (Device Selector) Selected devices to which the exclude commands should be applied (that is, the commands will not be considered when comparing any type of device configuration files). The current selection (highlighted in green)All exclude commands applied to that selection will be listed below the device selector. See Notes on Exclude Commands, page 4-51. Category Commands Comma-separated list of commands to be excluded when comparing device configurations for any devices in this category (for example, all Cisco routers) Series Commands Comma-separated list of commands to be excluded when comparing device configurations for any devices in this series (for example, all Cisco 7200 series routers) Device Commands Comma-separated list of commands to be excluded when comparing device configurations for any devices of this same device type (for example, all Cisco 7201 routers) Table 4-5 Configuration Archive Global Settings (continued) Field Description 4-52 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 4 Device Configurations and Software Images Global Settings and Administration The following procedure describes how to configure exclude commands. Step 1 Choose Configurations > Settings. Step 2 In the Exclude Commands area, navigate and choose one of the following (your selection is highlighted in green): • A device category • A device series • A device type Step 3 Enter a comma-separated list of commands you want to exclude when comparing configuration files for that device category, series, or type. You can also edit an existing list of commands. Your entries change to red until they are saved, and all affected device types, series, or categories are indicated in bold font. Step 4 If you want a device type to ignore the parent commands (that is, the series and category commands), check the Ignore Above check box. Step 5 Click Save to save your changes. Configuration Export File Type for Devices The following table provides the types of configuration files exported for different types of devices. Device Type Configuration File Exported Condition(s) Cisco IOS device Only the latest running configuration If there is no running version, the latest startup configuration is exported Cisco IOS XR device Latest running and startup configuration None Cisco ASR 5000 series devices Latest running configuration If there is no running version, boot configuration is NOT exported Cisco 7600 device with ACE card Latest running configuration If there is no running version, the latest startup configuration is exported Cisco Nexus device Latest running configuration If there is no running version, the latest startup configuration is exported 4-53 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 4 Device Configurations and Software Images Global Settings and Administration Change Image Management Global Settings To open the Image Management global settings page, choose Images > Settings. Table 4-6 lists all of the global settings you can configure for Image Management. Table 4-6 Image Management Global Settings Field Description Transfer Protocol Default transfer protocol to use when copying images to and from a device. This setting can be overridden when creating a distribution job (for example, if you know a device does not support the default protocol). FTP and TFTP are unsecured. • The TFTP source interface on the devices must be able to reach the unit. Otherwise, the image management jobs that require TFTP may fail. • To use SFTP/SCP for image transfers from a device to a unit, you need to ensure that an SSH server is configured and running on the device, such that the device acts as a server and the unit as a client during the transfer. For Cisco IOS XR devices, you need to configure the device with K9 security (k9sec) enabled images such that the SSH server is up and running on the device. (Cisco IOS XR devices use SFTP, and Cisco IOS devices use SCP). Flash Properties If Clear Flash is checked, the flash memory is cleared on a device when performing a distribution if there is insufficient memory on the device. Warm Upgrade If Warm Upgrade is checked, a Cisco IOS image can read in and decompress another Cisco IOS image and transfer control to this new image. This functionality reduces the downtime of a device during planned Cisco IOS software upgrades or downgrades. This can be overridden when creating the job. File Locations Full pathname of directories where images are stored when they are being imported into the Prime Network image repository, or when they are being transferred out of the repository to devices. New directories must be empty and have the proper permissions (read, write, and execute permissions for users). The entries must be full pathnames. In the following default locations, PRIME_NETWORK_HOME is the Prime Network installation directory, normally /export/home/network-user; where network-user is the operating system user for the Prime Network application and an example of network-user is network39. Staging Directory Location where images from the Prime Network image repository are placed before transferring them out to devices. The default is PRIME_NETWORK_HOME/NCCMComponents/NEIM/staging/. Storing Directory Location where images from an outside source are placed before importing them into the Prime Network image repository (from Cisco.com, from existing devices, or from another file system). The default is PRIME_NETWORK_HOME/NCCMComponents/NEIM/images/. External Server Details Details about external server from which images can be imported into repository. Server Name IP address of the external server (IPv4 or IPv6 addresses supported). Image Location Path where the image is located on the server. User Name Username to access the external server. Password Password to access the external server. SSH Port SSH port ID to connect to the server. 4-54 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 4 Device Configurations and Software Images Global Settings and Administration Check the Processes Change and Configuration Management runs on AVM 77. To check, start, stop, or restart the process, use the following commands: dmctl status dmctl start dmctl stop dmctl restart E-mail Settings Settings for automatic e-mail notifications about the status of jobs. SMTP Host SMTP server to use for sending e-mail notifications on the status of image management jobs to users. If an SMTP host is configured in the Configuration Management Settings page, the same value will be displayed here by default. You can modify it, if required. E-mail Id(s) E-mail address of the user to send a notification to after the scheduled job is complete. For two or more users, enter a comma-separated list of e-mail addresses. For example: xyz@cisco.com,abc@cisco.com The e-mail IDs configured here will appear by default while scheduling the image management jobs. However, you can add/modify the e-mail IDs then. SMTP Port SMTP port ID to connect to the host server. The default port is 25. Email Option Controls when e-mail notifications for NEIM jobs are sent (can be overridden when creating the job): • All—Send a notification irrespective of the job result. • Failure—Send a notification e-mail only when the job has failed. • No Mail—Do not send a notification e-mail on the job status. Proxy Settings Details about proxy server to use when importing images from Cisco.com HTTP Proxy HTTP proxy server to use for downloading images from Cisco.com. Port Port address to use for downloading images from Cisco.com. Vendor Credentials Usernames and passwords that can be used to download images from Cisco.com. (See the procedure described in Check the Processes, page 4-54) Table 4-6 Image Management Global Settings (continued) Field Description 4-55 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 4 Device Configurations and Software Images Global Settings and Administration Manage Jobs Prime Network redirects you to the Jobs page whenever a CM or image management job is scheduled to run immediately. When a job is created, Cisco Prime Network assigns it a job specification ID and attaches a time stamp, indicating when the job was created. Only the job creator and users with Administrator privileges can change the job settings. If a job involves more than 300 devices, the Jobs page only displays successful and unsuccessful jobs (not pending jobs). Prime Network also facilitates automatic e-mail notification of the status of the CM and NEIM jobs upon completion based on the e-mail option you set up in the configuration and image management settings. The notification is sent to a list of e-mail IDs configured either in the settings page or while scheduling the job. Keeps these items in mind when managing jobs: • Job properties cannot be edited; you must delete the old job and create a new one. • Jobs are persisted even if the gateway server is restarted. • Only the job creators and users with Administrator privileges can perform the actions provided on the Jobs page (suspend, resume, reschedule, cancel, delete, refresh). • Configuration and image management jobs fail under the following conditions: – If the device is not under the scope of the user to perform the config or image operation. – If the user is not authorized to perform the config or image operation. – For Cisco CPT devices, if the device is not in Cisco IOS mode. • To view all instances of a job, in the Action area, click the hyperlinked ShowAllRuns. • Running jobs cannot be suspended or cancelled; you must let them complete. • Cancel stops all future instances of a job. To stop a job and resume it later, use Suspend and Resume. Messages that can be used for debugging are saved in PRIME_NETWORK_HOME/XMP_Platform/logs/JobManager.log. User Authentication and Authorization User Authentication and Authorization Change and Configuration Management uses the security methods employed by Prime Network. These are described in the Cisco Prime Network 3.10 Administrator Guide Note If authentication fails, check the status of AVM 77 (XMP runtime DM) and Prime Network using Cisco Prime Network Administration. Cisco Prime Network Administration displays AVM 77 only when Change and Configuration Management is installed. For information on how to use Cisco Prime Network Administration, see the Cisco Prime Network 3.10 Administrator Guide. The GUI-based functions and required roles are listed in Table 4-7. Note that these functions do not perform any actions on devices. 4-56 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 4 Device Configurations and Software Images Global Settings and Administration Table 4-8 lists all of the Change and Configuration Management functions that are that filtered to only show devices in the device scope of a user, along with the role required to perform any functions on those devices. Table 4-7 GUI-Based Access Roles Required to Use Change and Configuration Management Function Viewer Operator OperatorPlus Configurator Administrator Dashboard Access top families X X X X X Configuration Management Delete files from archive 1 1. Configuration files are filtered according to the device scope of a user. X X Add, change, delete archive file labels1 X X Add change, delete archive file comments1 X X Export files from archive1 X X Image Management View images in repository X X X X X Add images to repository X X Delete images from repository X X Global Tasks View jobs X X X X X Administer jobs (suspend, delete, and so forth) X X Change settings X X Configuration Audit Define configuration policies X X Schedule configuration audit X X View configuration audit jobs and audit results XXX Managing Device Groups Create device groups X X X X X Edit device group details X X Delete device groups X X 4-57 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 4 Device Configurations and Software Images Global Settings and Administration For information on how Prime Network performs user authentication and authorization, including an explanation of user access roles and device scopes, see the Cisco Prime Network 3.10 Administrator Guide. Table 4-8 Device Scope-Based Roles Required to Use Change and Configuration Management Function Viewer Operator Operator Plus Configurator Administrator Dashboard Access configuration sync status1 1. Although users can view configuration files for devices in their scopes, the actions they can perform on those configuration files are controlled by the GUI-based access roles in Table 4-7. XX X X X Access configuration changes in the last week1 XX X X X Access most recent configuration changes1 XX X X X Configuration Management View files in archive1 XX X X X Compare files in archive X X X X X Synchronize configurations X X Back up (copy) files from devices to archive XXX Restore files from archive to devices X X Edit configuration files before restoring them to devices X X View configuration change logs X X X X X Image Management Distribute images X X Activate and deactivate images X X Commit image changes X X Rollback images X X Managing Device Groups Create device groups X X Edit device group details X X Delete device groups X X Configuration Audit Define configuration policies X X Schedule configuration audit X X View configuration audit jobs and audit results XXX 4-58 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 4 Device Configurations and Software Images Global Settings and Administration CHAPTER 5-1 Cisco Prime Network 3.10 User Guide OL-28065-01 5 Working with Prime Network Vision Maps The topological map is the main tool used by Cisco Prime Network Vision (Prime Network Vision) to display the links and relationships between the network elements and aggregations. The following topics describe how to work with the topological maps displayed in the content pane of the Prime Network Vision window: • User Roles Required for Working with Prime Network Vision Maps, page 5-2 • Opening and Closing Maps, page 5-5 • Creating and Deleting Maps, page 5-6 • Adding and Removing NEs from Maps, page 5-9 • Managing Maps, page 5-11 • Finding NEs, Services, and Links, and Elements Affected by Tickets, page 5-15 • Working with Aggregations, page 5-16 • Working with Overlays, page 5-21 • Filtering Links in a Map, page 5-25 • Opening the CPU Usage Graph, page 5-27 • Communicating with Devices Using Ping and Telnet, page 5-28 You can also perform the following functions from the map and list views if they are configured for your client: • Launch external applications or tools, such as an SSH client. • Launch available scripts and commands, depending on the NE device type, OS, supported technologies, and so forth. Those commands are documented throughout this guide (for example, Configuring and Viewing NEs using Basic Management Commands, page 3-37). This also includes commands you create using Command Builder. These scripts can be launched against multiple network elements at the same time. For more information on these functions, see the Cisco Prime Network 3.10 Customization Guide. 5-2 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 5 Working with Prime Network Vision Maps User Roles Required for Working with Prime Network Vision Maps User Roles Required for Working with Prime Network Vision Maps This topic identifies the roles that are required to work with Prime Network Vision maps. Prime Network determines whether you are authorized to perform a task as follows: • For GUI-based tasks (tasks that do not affect elements), authorization is based on the default permission that is assigned to your user account. • For element-based tasks (tasks that do affect elements), authorization is based on the default permission that is assigned to your account. That is, whether the element is in one of your assigned scopes and whether you meet the minimum security level for that scope. For more information on user authorization, see the Cisco Prime Network 3.10 Administrator Guide. The following tables identify the tasks that you can perform: • Table 5-1 identifies the tasks that you can perform if a selected element is not in one of your assigned scopes. • Table 5-2 identifies the tasks that you can perform if a selected element is in one of your assigned scopes. By default, users with the Administrator role have access to all managed elements. To change the Administrator user scope, see the topic on device scopes in the Cisco Prime Network 3.10 Administrator Guide. Table 5-1 Default Permission/Security Level Required for Working with Prime Network Vision Maps - Element Not in User’s Scope Task Viewer Operator OperatorPlus Configurator Administrator Map-Related Tasks Apply a background image ——— X X Create maps — — X X X Define a map layout X X X X X Delete maps — — X X X Open maps XXX X X Preview and print maps X X X X X Rename maps ——X X X Save as a new map — — X X X Save as an image X X X X X Save map appearance — — X X X Select viewing options X X X X X Use Overview window X X X X X View maps XXX X X 5-3 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 5 Working with Prime Network Vision Maps User Roles Required for Working with Prime Network Vision Maps Element-Related Tasks Add elements to a map — — X X X Remove elements from a map ——X X X Resize elements in a map XXX X X Aggregation-Related Tasks Group and ungroup aggregations ——X X X Rename aggregations X X X X X View aggregation thumbnails XXX X X Finding Items in Maps Find affected elements — — — — X Find an element or service XXX X X Find and select a link in a map1 XXX X X Link-Related Task Filter links X X X X X Overlay-Related Tasks Apply an overlay X X X X X Hide or view an overlay X X X X X Remove an overlay X X X X X Other Tasks Open the CPU Usage Graph ——— — X Use Ping and Telnet to communicate with elements ——— — X 1. This applies to links within the selected context, and not links identified as network links. Table 5-1 Default Permission/Security Level Required for Working with Prime Network Vision Maps - Element Not in User’s Scope (continued) Task Viewer Operator OperatorPlus Configurator Administrator 5-4 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 5 Working with Prime Network Vision Maps User Roles Required for Working with Prime Network Vision Maps Table 5-2 Default Permission/Security Level Required for Working with Prime Network Vision Maps - Element in User’s Scope Task Viewer Operator OperatorPlus Configurator Administrator Map-Related Tasks Apply a background image ——— X X Create maps — — X X X Define a map layout X X X X X Delete maps — — X X X Open maps X X X X X Preview and print maps X X X X X Rename maps ——X X X Save as a new map — — X X X Save as an image X X X X X Save map appearance — — X X X Select viewing options X X X X X Use Overview window X X X X X View maps XXX X X Element-Related Tasks Add elements to a map — — X X X Remove elements from a map ——X X X Resize elements in a map XXX X X Aggregation-Related Tasks Group and ungroup aggregations ——X X X Rename aggregations X X X X X View aggregation thumbnails XXX X X Finding Items in Maps Find affected elements X X X X X Find an element or service XXX X X Find and select a link in a map1 XXX X X 5-5 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 5 Working with Prime Network Vision Maps Opening and Closing Maps Opening and Closing Maps Whenever you open a map, the network information is automatically refreshed. For example, if a device was up the last time that the map was saved and closed, and then the device is moved to maintenance, the next time you open the map the management status of the device is updated accordingly and the device displays a maintenance status. When you first log in, Prime Network Vision lists the maps you recently viewed but did not close when you exited the session. You can also open other maps by choosing File > Open, which displays the Open Map dialog. By default, you can view and work on a maximum of five maps at any given time (per client instance) in the Prime Network Vision window. To change this default setting, contact your Cisco account representative. To create a new map or select a new map, close the required number of maps. You can save maps as images or print them, if desired. To close a map, choose File > Close. Prime Network Vision saves basic map information whether or not you manually save the map. This default information includes device and link additions, device and link removals, aggregations, and disaggregations. If you made any changes that will not be saved, Prime Network Vision prompts you to save the map. Link-Related Task Filter links X X X X X Overlay-Related Tasks Apply an overlay X X X X X Hide or view an overlay X X X X X Remove an overlay X X X X X Other Tasks Open the CPU Usage Graph ——X X X Use Ping and Telnet to communicate with devices ——— X X 1. This applies to links within the selected context, and not links identified as network links. Table 5-2 Default Permission/Security Level Required for Working with Prime Network Vision Maps - Element in User’s Scope (continued) Task Viewer Operator OperatorPlus Configurator Administrator 5-6 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 5 Working with Prime Network Vision Maps Creating and Deleting Maps Creating and Deleting Maps You can create maps that cover specific network segments, customer networks, or any other mix of network elements required. Network maps provide a graphic display of active faults and alarms, and serve as access points for activating services. When you create a map, it is saved in the database and made available to other users if they have sufficient access and security privileges. When you delete a map, it is removed from the database. See these topics for more information: • Creating New Maps, page 5-6 • Deleting Maps from the Database, page 5-8 Creating New Maps To create a new map, choose File > New Map in the main menu. The following figures give examples of how you can create and manipulate maps. To add NEs to maps, see Adding and Removing NEs from Maps, page 5-9. Link Filters Link filters let you choose the links in which you are interested, and then build a map that only displays NEs using those link types. Examples are physical links, data links, MPLS, VLANs, and so forth. When you open the New Map dialog, click the Advanced button and choose the types you want to display. Figure 5-1 Map with Link Filter To create a map with link filters, see Figure 5-13. 5-7 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 5 Working with Prime Network Vision Maps Creating and Deleting Maps Aggregations Aggregations are user-defined groups of elements. An aggregation can contain network elements, services, other aggregations, and so forth. Figure 5-2 shows an example of an aggregation. Figure 5-2 Map with Aggregation (Thumbnail View) When you delete an aggregation, the member devices are not deleted from Prime Network; only the aggregation definition is deleted. To create an aggregation, see Working with Aggregations, page 5-16. Overlays Overlays isolate the parts of a network that are being used by a specific service, such as an ethernet service or network clock. Figure 5-3 shows an example of an Ethernet Service overlay, where the ethernet link is using the service. 5-8 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 5 Working with Prime Network Vision Maps Creating and Deleting Maps Figure 5-3 Map with Overlay To create an overlay, see Working with Overlays, page 5-21. Deleting Maps from the Database If another client is using a map that you are deleting, Prime Network Vision displays a message to those clients advising them that the map is being closed and deleted from the database. To delete a map from Prime Network Vision and the Prime Network Vision database: Step 1 Open the Open Map dialog by choosing File > Open. Step 2 In the Open Map dialog box, complete the following steps: a. Select the map you want to delete. b. In the toolbar, click Delete Map. A confirmation message is displayed. c. Click Yes. The selected map is deleted from the Open Map dialog box, the Prime Network Vision window, and the database. If the map is open when you click Yes, a message is displayed, stating that the map will be closed. d. Click OK to acknowledge that the map can be closed. e. Click Cancel to close the Open Map dialog box. 5-9 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 5 Working with Prime Network Vision Maps Adding and Removing NEs from Maps Adding and Removing NEs from Maps When you add an element to a map, the map is automatically saved in the Prime Network Vision database If the element you want to add is outside of your scope, it is not displayed if you enter a search string. You can display all NEs by selecting Show All in Step 2, but devices outside your scope will be displayed with a lock icon. To add an element to a map: Step 1 Choose File > Add to Map > element. Figure 5-4 shows the type of elements you can add to maps. Figure 5-4 Available Elements to Add to Maps If you choose to add a new VPN, the Create VPN dialog box is displayed. For information on creating a VPN, see Creating a VPN, page 19-21 In all other instances, the Add element to map dialog box is displayed, as shown in Figure 5-5. 5-10 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 5 Working with Prime Network Vision Maps Adding and Removing NEs from Maps Figure 5-5 Add Element Dialog Box Step 2 In the Add element dialog box, do one of the following: If you are working with a very large number of network elements, keep these items in mind: • Search for the elements you want to add to the map. For example, you can search Ethernet Services by the system name, NEs element type, pseudowires by their role, and so forth. Note If you are working with a large number of NEs, using the search filter Otherwise, it may take some time for all of the NEs to be listed. • To view all available elements, choose Show All. The available elements are displayed in the Add element dialog box in table format. The dialog box also displays the date and time at which the list was generated. To update the list, click Refresh. If a network element is not included in your scope, it is displayed with the locked device icon. Step 3 In the Add element dialog box, select the elements that you want to add. You can select and add multiple elements by pressing Ctrl while selecting individual network elements or by pressing Ctrl + Shift to select a group of elements. 5-11 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 5 Working with Prime Network Vision Maps Managing Maps Step 4 Click OK. If you selected a large number of elements (for example, more than 25 VLANs or VPLS instances), the action may take a while to complete. The NEs are added to the map and are displayed in the navigation pane and content area. In addition, any associated tickets are displayed in the ticket pane. Removing Elements from a Map When you delete an element or aggregation from a map, it is removed from the map in the database, but the elements are still managed by Prime Network Vision. Note Based on the security level and access permissions assigned, this option might not be available to all users. To remove a network element or aggregation from a map: Step 1 In the navigation pane or map, select the element or aggregation that you want to delete. Step 2 Right-click to display the right-click menu and choose Remove from Map. The selected element or aggregation is removed from the map. The element is removed from the map in the database, but is still managed by Prime Network Vision and can be added again. Managing Maps The following topics describe how to manage maps in Prime Network Vision: • Selecting Map Viewing Options, page 5-12 • Applying a Background Image, page 5-12 • Using the Overview Window, page 5-14 • Saving Maps, page 5-15 5-12 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 5 Working with Prime Network Vision Maps Managing Maps Selecting Map Viewing Options Table 5-3 describes the tools that you can use to view and manipulate maps in the Prime Network Vision map pane. Applying a Background Image Prime Network Vision allows you to apply a background image to the map view. You can also choose the same background image or different images for other subordinate windows, such as detailed views of aggregations, VLANs, and VPNs. The supported file formats are GIF, JPG/JPEG, and PNG. Note Background images are not supported in thumbnail views. To apply a background image to a map: Step 1 Navigate to the required map in Prime Network Vision. The map can reside at the top level or in a subordinate window. Step 2 Right-click the map background and choose Set Map Background. The Manage Map Background dialog box is displayed, as shown in Figure 5-6. Table 5-3 Prime Network Vision Map Viewing Options Button Name Function Layout Map Defines how a topology should be displayed: Circular, hierarchical, orthogonal, or symmetric. The default is circular. When you choose a map layout, the elements align accordingly, using animation by default. Related characteristics, such as the speed of the animation and whether an expanded node causes sibling nodes to move aside, are also configured by settings in the registry. Fit in Window Fits an entire aggregation or map in the map pane. Normal Selection Mode Activates normal selection mode. Zoom Selection Mode Activates the zoom selection mode, which enables you to select an area in the map pane to enlarge by clicking and dragging the zoom mode cursor. Pan Mode Activates the pan mode, which enables you to move around in the map pane by clicking and dragging the pan mode cursor. 5-13 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 5 Working with Prime Network Vision Maps Managing Maps Figure 5-6 Manage Map Background Dialog Box Step 3 Enter the required information as described in Table 5-4. Step 4 Click OK. The current map background is updated as specified. Step 5 To retain the background image for subsequent logins, do one of the following: • Click Save in the toolbar. • Choose File > Save. Table 5-4 Manage Map Background Options Field Description Select Image Applies the selected image to the current map background: 1. Choose Select Image. 2. Click Browse. 3. In the Open dialog box, select the desired image and click OK. The name of the selected image is displayed in the Manage Map Background dialog box. 4. Click OK. The selected image is displayed as the map background. Use Image From Upper Level Indicates whether the selected subordinate map should use the same image as the parent map or a different image: • To use the same image that is used by the parent map, choose Use Image from Upper Level. The name of the image used by the parent map is displayed by default. • To use a different image than that used by the parent map, choose Select Image and complete the steps described for that option. Remove Image Removes the current image from the map background. To remove an image from the current map, click Remove Image. 5-14 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 5 Working with Prime Network Vision Maps Managing Maps Using the Overview Window The Prime Network Vision Overview window enables you to display the entire network map or any part of the map that you require in the map pane. The Overview window also enables you to see all the changes and alarms taking place in the network. To open the network Overview window do either of the following: • Click Overview in the main toolbar. • Choose View > Overview from the main menu. Figure 5-7 shows an example of the Overview window. Figure 5-7 Overview Window The Overview window can contain the following components: • Dot—Indicates an element. The dot color indicates the severity of an associated alarm. • Line—Indicates a link. The line color indicates the severity of an associated alarm. • Blue rectangle—Indicates the selection area. The area within the rectangle is displayed in the map pane. Handles on the corners enable you to resize the selection area. • Pan mode cursor—Displayed within the selection area. Use this cursor to move the selection area, and thereby view different elements in the map pane. • Zoom mode cursor—Displayed outside the selection area. Use this cursor to define a new selection area or to zoom in on an existing selection area. Click the upper right corner to close the Overview window. 5-15 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 5 Working with Prime Network Vision Maps Finding NEs, Services, and Links, and Elements Affected by Tickets Saving Maps By default, Prime Network Vision saves basic map information whether or not you manually save the map. This default information includes element additions and removals, link additions and removals, aggregations, and disaggregations. However, you must use the Save Map option if you want to retain the following information in the database: • Device location on the map • Thumbnails • Icon size To save these changes, do one of the following: • Click Save Map Appearance in the main toolbar. • Choose File > Save Map. Step 6 Click OK. The map is saved as an image in the directory you specified. Finding NEs, Services, and Links, and Elements Affected by Tickets The following topics describe how to find network elements, services, links, or elements affected by a ticket in Prime Network Vision maps. Table 5-5 Aggregation Thumbnail Options If you want to find... Do this... An NE or service From the Prime Network Vision main menu, choose Edit > Find in Map. Enter an element or service (such as a VPN or VLAN) by entering any part of its name or device IP address. If you want your search to include aggregations, check the Search all map levels check box. A link From the Links view, right-click the link and choose Find Link in Map. The link is highlighted in the map pane. If two or more lines represent the same link (such as a VRF link), you can choose the appropriate one. If more than one edge device contains the same link in the same map or context, all related edge devices are selected in the map. Which NEs are affected by a ticket In the ticket pane, right-click the required ticket and choose Find Affected Elements. If only one element is affected, the affected element is selected in the navigation pane and the content area; if a link is affected, the affected link is selected in the links view. If two or more elements are affected, the affected elements are displayed in the Affected Elements window. 5-16 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 5 Working with Prime Network Vision Maps Working with Aggregations Working with Aggregations Prime Network Vision enables you to group network elements and display them as an aggregation. Aggregations can contain network elements, services, other aggregations, and so forth. Note You cannot aggregate service entities that exist within a service. For example, you cannot aggregate VRFs that exist within a VLAN. For more information on working with aggregations, see the following topics: • Grouping Network Elements into Aggregations, page 5-16 • Adding Elements to an Existing Aggregation, page 5-18 • Viewing an Aggregation Thumbnail, page 5-16 • Ungrouping Aggregations, page 5-19 • Viewing Multi Chassis Devices, page 5-19 Grouping Network Elements into Aggregations To aggregate network elements: Step 1 Select the network elements. To select multiple items, press Ctrl. Step 2 Aggregate the network elements by choosing Node > Aggregate. Step 3 In the Aggregation dialog box, enter a unique name for the aggregation and click OK. The aggregation is displayed in the navigation pane and the map pane. Aggregations are displayed as a single entity with the Aggregation icon and a plus sign, as in the following examples: The aggregation icon changes color according to the alarm severity. For more information about severity colors, see Alarm Indicators, page 2-11. Viewing an Aggregation Thumbnail You can view a thumbnail of a selected aggregation in the map pane, including all aggregated elements and any nested aggregations. 5-17 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 5 Working with Prime Network Vision Maps Working with Aggregations To display an aggregation thumbnail: Step 1 Select the existing aggregation in the map pane. Step 2 Open the thumbnail by right-clicking the aggregation, and choosing Show Thumbnail. The thumbnail is displayed in the map pane as shown in Figure 5-8. Figure 5-8 Aggregation Thumbnail When a thumbnail is opened, neighboring nodes are moved aside by default to allow room for the thumbnail to expand. Similarly, when a thumbnail is closed, the neighboring nodes usually return to their original locations. This behavior of the neighboring nodes when a thumbnail is opened and closed is configured in the registry, and can be disabled, if required. A dashed gray border around an icon indicates that the element resides within a thumbnail and not at the current map level. 5-18 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 5 Working with Prime Network Vision Maps Working with Aggregations Table 5-6 describes the options available when working with aggregation thumbnails. Step 3 To close the aggregation thumbnail, right-click the thumbnail frame and choose Show As Aggregation. Adding Elements to an Existing Aggregation You can add elements to an existing aggregation at any time. When adding elements to an aggregation, keep in mind that certain restrictions exist. For example, you cannot add an EVC to a VLAN. To add elements to an existing aggregation: Step 1 Select the existing aggregation in the map pane. Step 2 Open the thumbnail by right-clicking the aggregation, and choosing Show Thumbnail. Step 3 Double-click the thumbnail frame to view the aggregation at the map level. Step 4 Click Add to Map to add the required element to the aggregation. Step 5 Return to the map by double-clicking the map background. Table 5-6 Aggregation Thumbnail Options If you want to... Do this... Rearrange the icons in the thumbnail Click and drag the required icons to arrange them as needed. Resize an icon Select the icon to be resized, and then either click and drag the gray border or right-click a selected icon and choose Resize. The right-click Resize option allows you to resize multiple selected icons at the same time. Resize the thumbnail frame Click and drag one or more icons. If you drag an icon beyond the thumbnail frame, Prime Network Vision adjusts the thumbnail size automatically. View a nested aggregation Click the nested aggregation plus sign. View only the aggregation in the map pane Double-click the thumbnail frame. View the next higher level in the map pane Double-click the current map background. Zoom in or out in the thumbnail Position your mouse cursor in the map and use the mouse scroll wheel to zoom in or out. 5-19 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 5 Working with Prime Network Vision Maps Working with Aggregations Ungrouping Aggregations Aggregations can be ungrouped. If the aggregation that you ungroup contains nested aggregations, the nested aggregations move up one level, and the original aggregation is removed. If an element in the aggregation that you ungroup also exists at the parent level, the element is represented only once after the aggregation is ungrouped. As a result, no elements are represented twice at the same level. To ungroup an aggregation: Step 1 Select the required aggregation in Prime Network Vision. Step 2 Ungroup the node by selecting the aggregation in the map pane and choosing Node > Disaggregate. If the aggregation contains elements that already exist at the parent level, a confirmation message is displayed, stating that any duplicate elements will be removed. Step 3 Confirm the disaggregation. The node is disaggregated. Any aggregations in the selected node move up one level, and the original aggregation is removed. Viewing Multi Chassis Devices Using Prime Network Vision, you can view the physical layout and topology among the multi-chassis devices on the map. The multi chassis devices are grouped as an aggregation and are displayed as a single entity with a plus sign on the map as show in Figure 5-9. The plus sign can be expanded to display the devices under the group as shown in Figure 5-10. You can see the multichassis grouping in the map view for network elements such as Cisco Aggregation Service Router (ASR) 9000 series network element and Cisco Unified Computing System (UCS). If satellites are configured for a Cisco ASR 9000 series network element, you can view the satellites grouped with the other chassis. For more information on how to view satellite properties, see Viewing Satellite Properties, page 3-22. The physical ethernet links used for connecting the multi chassis devices are ICL (Inter Chassis Link) and IRL (Inter Rack Link). For more information on when each of these links are used, see Viewing Inter Rack Links, page 5-20 and Viewing Inter Chassis Links, page 5-20. 5-20 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 5 Working with Prime Network Vision Maps Working with Aggregations Figure 5-9 Multichassis Devices in Map View Viewing Inter Rack Links Inter Rack Links (IRLs) are used to represent connectivity between the cluster hosts, Cisco ASR 9000 network elements. Figure 5-10 Multiple Chassis in a Cluster To view the cluster IRLs: Step 1 In Prime Network Vision, double-click the cluster device to open the Inventory Window for the device. Step 2 Choose the Cluster IRL container in the logical inventory of the cluster device. The content pane displays a list of cluster IRLs with the following details: • A End Point—Device or site that is the source of the link, hyperlinked to the inventory of the device or site. • Z End Point—Device or site that is the destination of the link, hyperlinked to the relevant entry in the inventory. Viewing Inter Chassis Links Inter Chassis Links (ICLs) are used to represent the connectivity between the host Cisco ASR 9000 network element and the satellites. One or more satellites are connected to the host Cisco ASR 9000 series network element by using the ICLs. Figure 5-11 shows an ICL in the map view. 5-21 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 5 Working with Prime Network Vision Maps Working with Overlays Figure 5-11 ICL Connecting a Satellite with a Chassis To view the satellite ICLs: Step 1 In Prime Network Vision, double-click the satellite device to open the Inventory Window for the device. Step 2 Choose the Satellite ICL container in the logical inventory of the cluster device. The content pane displays a list of Satellite ICLs with the following details: Working with Overlays When you apply an overlay to a map, you can isolate the parts of a network that are being used by a specific service. The following topics discuss the overlay options in more detail: • Applying an Overlay, page 5-22 • Hiding and Viewing Overlays, and Removing Overlays from a Map, page 5-25 Table 5-7 Satellite ICL Properties Field Description Host Interface Interface by which satellite is configured on the host network element. Click the hyperlink to view the interface properties in the physical inventory. Satellite IC Interface Inter-chassis interface used by the satellite. Click the hyperlink to view the satellite interface properties in the physical inventory. Satellite ID Satellite ID. Click the hyperlink to view the satellite properties in the physical inventory. Satellite Port Range Port associated with the satellite. Satellite Status Connection status of the satellite: Connected or Disconnected. Fabric Link Status Status of the fabric link connected to the satellite. 5-22 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 5 Working with Prime Network Vision Maps Working with Overlays Applying an Overlay To apply an overlay: Step 1 In Prime Network Vision, choose the map in which you want to apply an overlay. Step 2 From the toolbar, choose Choose Overlay Type > overlay-type where overlay-type is one of the following options: With the exception of the None option, a dialog box is displayed that allows you to select the specific overlay to apply. Figure 5-12 shows an example of the Select Pseudowire Overlay dialog box. Overlay Option Description Ethernet Service Applies an Ethernet service overlay to the map. MPLS-TP Tunnel Applies and MPLS-TP tunnel overlay to the map. Network Clock Applies a network clock overlay to the map. None Removes any existing overlays on the map. Pseudowire Applies a pseudowire overlay to the map. VLAN Applies a VLAN overlay to the map. VPLS Applies a VPLS instance overlay to the map. VPN Applies a VPN overlay to the map. 5-23 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 5 Working with Prime Network Vision Maps Working with Overlays Figure 5-12 Select Pseudowire Overlay Dialog Box Each overlay type allows you to search for specific overlays. Table 5-8 identifies the search fields available for each overlay type. Table 5-8 Overlay Type Search Fields Overlay Type Search Fields Ethernet Service • EVC Terminating EFPs • Name • System Name MPLS-TP Tunnel • Description • Name • System Name Network Clock • Name Pseudowire • Description • Is Multisegment Pseudowire • Name • Pseudowire Role • Pseudowire Type • System Name 5-24 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 5 Working with Prime Network Vision Maps Working with Overlays Step 3 In the Select Overlay dialog box, do either of the following: • To search for specific overlays: a. Choose Search. b. In the Search field, choose a search category. c. Enter a search string to narrow the display to a range of overlays or to a specific overlay. Table 5-8 identifies the search categories available for each type of overlay. d. Click Go. Search strings are case-insensitive. If you choose Name and enter NET, the overlays that contain “net” in their names are displayed. If you choose System Name and enter System123, only the overlay with the system named System123 is displayed. • To view all available overlays, choose Show All. The available overlays that meet the specified search criteria are displayed in the Select Overlay dialog box in table format. The dialog box also displays the date and time at which the list was generated. To update the list, click Refresh. Step 4 Select the overlay that you want to apply to the map. The elements and links that are used by the overlay are displayed in the map, and the overlay name and date are displayed in the toolbar, as shown in Figure 5-13. VLAN • EFD Name • EFD System Name • ID • Name • System Name VPLS • Name • System Defined Name • VPN ID VPN • Description • Name Table 5-8 Overlay Type Search Fields (continued) Overlay Type Search Fields 5-25 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 5 Working with Prime Network Vision Maps Filtering Links in a Map Figure 5-13 Overlay Example Note The overlay is a snapshot taken at a specific point in time and does not reflect changes that occur in the service. As a result, the information in an overlay can become stale. To update the overlay, click Refresh Overlay in the toolbar. Hiding and Viewing Overlays, and Removing Overlays from a Map When an overlay is applied to a map, the Show Overlay/Hide Overlay button becomes active in the toolbar. To hide and view the overlay, click Hide Overlay/Show Overlay in the toolbar. The button toggles depending on whether the overlay is currently displayed or hidden. To remove an overlay, choose Choose Overlay Type > None. The overlay is removed from the map. Filtering Links in a Map The links filter enables you to filter the links displayed in the map view and the links view. You can quickly select the types of links to be filtered by selecting from a predefined set of link types in the list, or by manually configuring a customized set of link types. To filter links, do either of the following: • Create a new map, select a filter, and then add the devices to the map. This filter is applied to the new map and only the required link types are visible in the map view and the links view. For more information, see Filtering Links During Map Creation, page 5-26. • Create a map and add the devices with all links enabled and visible in the map view and links view. You can then filter (display or hide) the different types of links as required. For more information, see Filtering Links in an Existing Map, page 5-27. 5-26 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 5 Working with Prime Network Vision Maps Filtering Links in a Map The links filter applies to all aspects of Prime Network Vision: the map view, links view, ticket pane, severity calculation, and other items, such as memory consumption and thresholds. Prime Network Vision holds only the links that are relevant to the filter and synchronizes the links with the gateway according to that filter. For more information about links in Prime Network Vision, see Chapter 6, “Working with Links.” Filtering Links During Map Creation To filter links while creating a map: Step 1 Open the Create Map dialog box by choosing File > New Map from the main menu. The Create Map dialog box is displayed. For more information, see Creating and Deleting Maps, page 5-6. Step 2 Click Advanced. The Link Filter dialog box is displayed. Figure 5-14 Link Filter Dialog Box The Link Filter dialog box displays a list of all the types of links that you can filter in the map view and links view. Note By default all link types are selected in the Link Filter dialog box. That is, all links are displayed in the map view and links view. Step 3 Select the required option from the Group drop-down list: • All—All the links are displayed in the map view and links view. • Custom—Only the links defined for the customized filter are displayed in the map view and links view. 5-27 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 5 Working with Prime Network Vision Maps Opening the CPU Usage Graph • Data Link—The data link layer class of links (ATM and Frame Relay) is displayed in the map view and links view. • None—None of the links are displayed in the map view and links view. • Physical—Only the physical links are displayed in the map view and links view. • VPN—Only VPN-related links (GRE, Pseudowire, VPN, and VPN IPv6) are displayed in the map view and links view. Note You can customize the Group drop-down list options by selecting an option and adding or removing the required link types. The next time the Link Filter dialog box is opened, the Custom option is displayed with the specified link types. Step 4 Click Apply to apply the defined link filter settings and continue with more selections. Step 5 Click OK when you have completed your selections. Step 6 In the Create Map dialog box, enter a name for the new map and click OK. An empty new map is displayed in the navigation pane and content area, and the Link Filter Applied button is displayed in the to indicate that the links have been filtered. Step 7 Add the required elements to the map. For more information, see Creating and Deleting Maps, page 5-6. The links are displayed in the map view and links view according to your selections. Filtering Links in an Existing Map You can also create a map, add elements with all links enabled and visible in the map view and links view, and then filter (display or hide) the different types of links as required. To filter links in an existing map: Step 1 Click Link Filter in the main toolbar. Step 2 In the Link Filter dialog box, uncheck the check boxes for the links that you do not want to display in the map view and links view. Step 3 Click Apply to apply the defined link filter settings and continue with more selections. Step 4 Click OK when you have completed your selections. The links are displayed in the map view and links view according to the defined filter, and the Link Filter Applied button is displayed in the to indicate that the links are filtered. Opening the CPU Usage Graph Prime Network Vision enables you to display memory and CPU usage information for a device or network element, including its history. 5-28 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 5 Working with Prime Network Vision Maps Communicating with Devices Using Ping and Telnet To open the CPU usage graph: Step 1 Right-click a network element in the navigation tree and choose Tools > CPU Usage. The CPU Usage dialog box displays the following information: • CPU Usage—The CPU usage rate as a percentage. • CPU Usage History—The CPU usage rate history is graphically displayed. • Memory Usage—The memory usage rate as a percentage. • Memory Usage History—The memory usage rate history is graphically displayed. Step 2 If desired, click Save to CSV File to export the displayed data. Step 3 Click the upper right corner to close the CPU Usage dialog box. Communicating with Devices Using Ping and Telnet Prime Network Vision enables you to communicate with devices in the following ways: • Pinging a Device, page 5-28 • Telneting a Device, page 5-28 Pinging a Device Prime Network Vision enables you to ping a device to verify that the device is responding. The ping is performed from the client to the device, and not from the Prime Network Vision unit hosting the VNE to the device. To ping a device, right-click a device in the navigation tree or map, and choose Tools > Ping. The results are displayed in a new window. Telneting a Device Prime Network Vision enables you to communicate with a device using the Telnet window. The Telnet session is performed from the client to the device, and not from the Prime Network Vision unit hosting the VNE to the device. Note If you are using a Windows 7 system, you must enable the Windows Telnet Client before you can use the Prime Network Telnet option. - For Windows 7 32-bit systems, enable the Windows Telnet Client to use the Prime Network Telnet option. - For Windows 7 64-bit systems, a solution is available on the Cisco Developer Network at http://developer.cisco.com/web/prime-network/forums/-/message_boards/message/2780108. 5-29 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 5 Working with Prime Network Vision Maps Communicating with Devices Using Ping and Telnet To telnet a device: Step 1 Right-click a device in the navigation tree or map, and choose Tools > Telnet. A terminal window opens. Step 2 Log in and use the Telnet window as needed. 5-30 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 5 Working with Prime Network Vision Maps Communicating with Devices Using Ping and Telnet CHAPTER 6-1 Cisco Prime Network 3.10 User Guide OL-28065-01 6 Working with Links The following topics describe how to view information about static and dynamic links using the Cisco Prime Network Vision (Prime Network Vision) user interface: • User Roles Required to Work with Links, page 6-1 • What Are Dynamic and Static Links?, page 6-3 • Link Discovery and Flickering Ethernet Topology Links, page 6-3 • Viewing Link Properties, page 6-4 • Viewing Link Impact Analysis, page 6-12 • Adding Static Links, page 6-15 • Filtering Links Using the Collection Method, page 6-17 • Selecting a Link, page 6-18 User Roles Required to Work with Links This topic identifies the GUI default permission or element scope security level that is required to work with links in Prime Network Vision. Prime Network determines whether you are authorized to perform a task as follows: • For GUI-based tasks (tasks that do not affect elements), authorization is based on the default permission that is assigned to your user account. • For element-based tasks (tasks that do affect elements), authorization is based on the default permission that is assigned to your account. That is, whether the element is in one of your assigned scopes and whether you meet the minimum security level for that scope. For more information on user authorization, see the Cisco Prime Network 3.10 Administrator Guide. The following tables identify the tasks that you can perform: • Table 6-1 identifies the tasks that you can perform if a selected element is not in one of your assigned scopes. • Table 6-2 identifies the tasks that you can perform if a selected element is in one of your assigned scopes. By default, users with the Administrator role have access to all managed elements. To change the Administrator user scope, see the topic on device scopes in the Cisco Prime Network 3.10 Administrator Guide. 6-2 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 6 Working with Links User Roles Required to Work with Links Table 6-1 Default Permission/Security Level Required for Working with Links - Element Not in User’s Scope Task Viewer Operator OperatorPlus Configurator Administrator View link properties in Map view X1 1. Link properties are limited in the Map view; not all link information is available. X1 X1 X1 X View link properties in Links view X2 2. Link properties are limited in the Links view; not all link information is available. X2 X2 X2 X View link properties in the Link Properties window ——— — X View link impact analysis ——— — X Add static links — — — — X Filter links using collection method XXX X X Find and select a link in a map XXX X X Table 6-2 Default Permission/Security Level Required for Working with Links - Element in User’s Scope Task Viewer Operator OperatorPlus Configurator Administrator View link properties in Map view XXX X X View link properties in Links view X1 1. Link properties are limited in the Links view; not all information is available. X1 X1 X1 X View link properties in the Link Properties window XXX X X View link impact analysis ——— — X Add static links — — — X X Filter links using collection method XXX X X Find and select a link in a map XXX X X 6-3 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 6 Working with Links What Are Dynamic and Static Links? What Are Dynamic and Static Links? Dynamic links are the physical and logical links that exist between elements in the network. These links are discovered by Prime Network using various protocols (such as STP, CDP, and LLDP). The ongoing process of autodiscovery maintains this topological information. Property information is provided for links that are: • Between two devices. • Between a device and an aggregation that connects this device to another device inside the aggregation. • Between two aggregations that contain devices that cross the aggregations. If a link is unidirectional, Prime Network Vision displays an arrowhead on the link. If it is bidirectional, an arrowhead is not displayed. Static links are links that are created at the VNE level but are not updated. These links do not perform any configuration or provisioning on a device or in the network. Static links are useful for map visualization and network correlation; for example, if Prime Network Vision does not discover a link that you know exists in the network, you can create a static link that is displayed in the map. For correlation purposes, Prime Network Vision treats the static link as if it were a physical or logical link and allows correlation flows to go through the static link. For information on creating static links, see Adding Static Links, page 6-15. Link Discovery and Flickering Ethernet Topology Links As mentioned in What Are Dynamic and Static Links?, page 6-3, Prime Network discovers topology links using various protocols, such as STP, CDP, and LLDP. In some situations, the link configurations themselves can prevent Prime Network from discovering the correct information. For example, if Layer 2 protocol tunneling is configured and the discovery protocols are tunneled, Prime Network can create an incorrect link. This scenario results in a flickering link that is first created incorrectly due to tunneled discovery information, and then disconnected when the Prime Network counters test discovers that the counters on the edges of the link do not match. During the next topology cycle, Prime Network recreates the link, which is disconnected again during the counters test. A link is considered flickering when it is connected, disconnected, and reconnected when using the same connection technique because the topology information is conflicting. When this situation occurs, Prime Network generates a system event with the message “Physical Link discovery inconsistent.” To prevent an ongoing cycle of link creation and disconnecting, Prime Network detects such case of flickering links, creates a system event with the message “Inconsistent Physical Link Discovery between system:interface1 and system:interface2,” and stops the link from flickering by disconnecting it. To remedy the situation, we recommend that you wait until the link disappears from the map and then create a static link. Note This feature applies only to Ethernet links. 6-4 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 6 Working with Links Viewing Link Properties Viewing Link Properties In maps, you can view a link only if both ends of the link are in your scope. However, Prime Network Vision provides an option that allows users to view links and any associated tickets if only one end of the link is in your scope. For more information about this option, see the Cisco Prime Network 3.10 Administrator Guide. Prime Network Vision provides information about links in the following ways: • Through the physical characteristics of the link in a map, tooltips, and link quick views—See Viewing Link Properties in Prime Network Vision Maps, page 6-4. • In the Links view—See Viewing Link Properties in the Links View, page 6-8. • In the link properties window—See Viewing Link Properties in the Link Properties Window, page 6-10. Viewing Link Properties in Prime Network Vision Maps The representation of a link in a map provides information about that link. The characteristics that provide information about a link are: • Whether the link is solid or dashed. • Whether or not the link displays an arrow at one end. • Link color. Table 6-3 describes the link variations that can be displayed in a map and provides examples of each. Table 6-3 Link Properties in Prime Network Vision Maps Link Characteristic Description Example Solid Line vs. Dashed Line Solid line Physical, topological, or service link, such as a link between two devices. Dashed line Association or business link between such elements as EVCs, VPLS service instances, or VPN components. 6-5 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 6 Working with Links Viewing Link Properties Note The color of a selected link is customizable. The default color is blue. For more information on link colors, see Map View, page 2-7. Link Widths Normal Contains links of the same group. Available groups are: • Business • GRE • MPLS-TP • Pseudowire • VLAN • All others Wide Aggregated links that contain links of different groups. When viewing a map at a low zoom level, aggregated links cannot be distinguished in the GUI. Tunnel A tunnel, with the center color representing the severity of any alarms on the link. Arrowhead vs. No Arrowhead No arrowhead Bidirectional link. Arrowhead Unidirectional link, with the flow in the direction of the arrowhead. Link Color Red Critical alarm is on the link. Orange Major alarm is on the link. Yellow Minor alarm is on the link. Green Link is operating normally. Blue Link is selected. Table 6-3 Link Properties in Prime Network Vision Maps (continued) Link Characteristic Description Example 6-6 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 6 Working with Links Viewing Link Properties To view link properties: Step 1 Hover your mouse cursor over the required link in a map. A link tooltip is displayed as shown in Figure 6-1. Figure 6-1 Link Tooltip in Prime Network Vision The tooltip contains the following information about the link: • Link endpoints, identified by the element or service name. • The number of links represented by the line on the map. Examples of tooltips are: • 169.254.12.34 <--> 169.254.56.78 6 links • 22@169.254.12.34 <--> CEM1/2:1@169.254.56.78 1 link Step 2 To view additional link information, click the tooltip. The link quick view window is displayed as shown in Figure 6-2. 6-7 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 6 Working with Links Viewing Link Properties Figure 6-2 Link Quick View Example Step 3 To view more link properties, click Properties in the link quick view. For more information about the link properties window, see Viewing Link Properties in the Link Properties Window, page 6-10. 1 Number of links represented by the single link in the map. In this example, 29 links. 2 Link endpoints. 3 List of all links represented by the link in the map with the following information, as appropriate: • Type of link, such as Physical, MPLS, or Tunnel. For a complete list of the types of links and their abbreviations, see Link Icons, page A-9. • Link detail, such as the interface used on each endpoint, service name, or type of service. • Link alarm status, indicated by the link color. 4 Hyperlink to the link properties window. The Properties button is available for physical, topographical, and service links, but is not available for business links (dashed links). For more information, see Viewing Link Properties in the Link Properties Window, page 6-10. 6-8 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 6 Working with Links Viewing Link Properties Viewing Link Properties in the Links View The links shown in a map represent many other links as described in Viewing Link Properties in Prime Network Vision Maps, page 6-4. By using the links view, you can view a list of all links represented in a map and their status. To display the links view in the Prime Network Vision window, click Show Links View in the main toolbar. Figure 6-3 shows an example of the links view. Figure 6-3 Links View Note A link external to the network has a blue cell background in the table. Any links that are added or removed from the map are automatically added or removed from the links view, provided they have not been filtered out. 6-9 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 6 Working with Links Viewing Link Properties Table 6-4 describes the information that is displayed in the links view. By default, the links displayed in the links view are sorted according to link type and the deep collection method. The buttons in Table 6-5 are displayed at the top of the links view and enable you to filter the links according to the collection method. Note If you load a map with many links (for example, thousands of links), it can take a while for the complete list of links to load. The filtering options in the table are unavailable until the table has completely loaded. Table 6-4 Links View Content Field Description Context Name of the map or aggregation containing the link. The links view can include multiple contexts. This field can be empty for either of the following reasons: • One side of the link is not included in the map. • The link is filtered out of all contexts. Severity Severity bell icon, colored according to the severity of the alarm on the link and indicating the impact of the alarm on the network. For more information, see Prime Network Vision Status Indicators, page 2-16. A End Point Device or site that is the source of the link, as a hyperlink to the inventory of the device or site. Bidirectional Whether the link is bidirectional or unidirectional: True (bidirectional) or False (unidirectional). Z End Point Device or site that is the destination of the link, hyperlinked to the relevant entry in inventory. Link Type Type of link, such as Physical Layer, VPN, MLPPP, or MPLS. Table 6-5 Links View Tools Icon Name Description All Links Complete list of links for the selected map or aggregation. External Links Links with one side of the link in the selected map or aggregation and the other side of the link outside the currently selected map or aggregation. Flat Links Links currently visible in the map pane for the selected map or aggregation, excluding any thumbnails. Deep Links Links for the selected aggregation and any nested aggregations, with both endpoints within the currently selected map or aggregation. 6-10 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 6 Working with Links Viewing Link Properties For more information about filtering links using the collection method, see Filtering Links Using the Collection Method, page 6-17. Viewing Link Properties in the Link Properties Window The link properties window contains general information about the selected link, details of the link connection, and technology-specific information appropriate for the link. In a Prime Network Vision map, open the link properties window by right-clicking a link and choosing Properties. The link properties window is displayed as shown in Figure 6-4. Figure 6-4 Link Properties Window Note If multiple links exist between the elements or aggregations, the link properties window displays information for all the links. 1 Properties pane (see Properties Pane, page 6-11) 3 Ticket and events pane (see Ticket and Events Pane, page 3-15) 2 Status bar 4 Link list pane (see Link List Pane, page 6-11) 6-11 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 6 Working with Links Viewing Link Properties The information displayed in the link properties window changes according to the ports or subports selected in the link list pane. Link List Pane In the link properties window, the link list pane displays a list of the links that are represented by a single link on the map. Each link has a single entry in the link list pane. When an entry is selected in the link list pane, the information displayed in the properties pane is updated. The color of the icon in the link list pane reflects its severity. For more information about severity, see Prime Network Vision Status Indicators, page 2-16. The heading and the link list pane display the left and right link identifiers between the two nodes, the device alias, and Connection Termination Point (CTP). Properties Pane The properties pane enables you to view the following, depending on your selection in the link list pane: • Properties of a selected link, including port properties information. • Hyperlinks to relevant entries in logical or physical inventory. • Status. The properties pane displays the link type, port alias, and port location, all of which uniquely identify the port. The port location information is also displayed as a hyperlink to the inventory window. The properties pane also displays the parameters for each end of the link, aligned under the relevant link identifier. Any discrepancies between the link’s ports are displayed in red. The following fields are displayed in the Connection Information area for physical links: • Type—Type of connector, such as fiber optic. • Status—Status of the link, such as OK. • Port Alias—Name used in the device CLI or EMS for the selected port. • Managed—Whether or not the link is managed: True or False. • Pluggable Port State—Whether or not a pluggable module is inserted. • Location—Location of the entity, slot number, and port on the slot, as a hyperlink that opens the properties of the relevant location. Depending on the link and its configuration, the following areas containing status and configuration information are displayed in the properties pane: • Ethernet CSMA/CD • Gigabit Ethernet • LAG • MLPPP • MP-BGP • MPLS Link Information • PPP • Pseudowire 6-12 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 6 Working with Links Viewing Link Impact Analysis • T1 • VRF IP addresses are displayed in IPv4 or IPv6 format, as appropriate. Depending on the type of link, the following areas might be displayed: • Affected Parties—Enables you to view all elements potentially affected by the link. For more information, see Viewing Link Impact Analysis, page 6-12. • Labels—Enables you to view all LSPs on an Ethernet link. For more information, see Viewing LSPs Configured on an Ethernet Link, page 19-11. • VCs—Enables you to view configured and misconfigured VCs on an ATM link. For more information, see Viewing ATM VPI and VCI Properties, page 21-10. Ticket and Events Pane The ticket and events pane is displayed at the bottom of the link properties window and contains the following tabs: • Tickets—Displays the tickets that are collected on the selected element, service, or component in the navigation pane. Table 10-3 on page 10-5 describes the information that is available in the Tickets tab. • Network Events—Displays all active network events associated with tickets and alarms, and all archived events with a timestamp that falls within the specified events history size (see Adjusting the Prime Network Vision GUI Client Settings, page 2-39). Table 3-7 on page 3-15 describes the information that is available in the Network Events tab. When displaying network events, Prime Network Vision monitors the history size value defined in the Events tab of the Options dialog box (Tools > Options > Events). The default value is six hours and can be changed in Prime Network Administration. In addition, Prime Network Vision limits the maximum number of network and provisioning events that are sent from the server to client to 15,000 each. If the number of network or provisioning events exceeds the limit specified in the Options Events tab or the 15,000 maximum limit, Prime Network Vision purges the oldest events from table. The purging mechanism runs once per minute. Tip You can display or hide the ticket and events pane by clicking the arrows displayed below the device view panel. Viewing Link Impact Analysis Prime Network Vision enables you to select a network link and calculate the elements that might be affected if the link were to go down. This enables you to perform proactive impact analysis when a fault has not actually occurred. Note Impact analysis applies only to physical links. 6-13 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 6 Working with Links Viewing Link Impact Analysis To calculate impact analysis: Step 1 Select a map or aggregation in the navigation pane, and click Show Links View in the main toolbar. The links view is displayed in the content pane. Step 2 In the table toolbar, click Link Filter. The Link Filter dialog box is displayed. For information about the Link Filter dialog box, see Filtering Links in a Map, page 5-25. Step 3 In the Filter dialog box: a. In the Match drop-down list, choose All. b. In the field drop-down list, choose Link Type. c. In the operand drop-down list, choose Equals. d. In the matching criteria drop-down list, choose Physical Layer. e. Click OK. Only physical links are displayed in the links view. Step 4 In the links view, right-click the required link and choose Properties. The Topological Link Properties window is displayed. Note Resize the window as needed to view all the information. Figure 6-5 Topological Link Properties Window 6-14 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 6 Working with Links Viewing Link Impact Analysis Step 5 Click Calculate Affected. The total number of potentially affected parties is displayed in the Affected Parties area. Step 6 Click Show Affected. The Affected Parties window is displayed as shown in Figure 6-6. Figure 6-6 Affected Parties Window Step 7 To view the potentially affected destinations if a link were go to down, click an entry in the Source table. The potentially affected destinations are displayed in the Destination table. Step 8 To view source or destination properties in inventory, click the required hyperlinked entry. Note The Affected Parties window occasionally displays entries that start with the word Misconfigured. Entries that start with Misconfigured indicate that the flow has stopped unexpectedly between the source and destination points. An unexpected termination point can be a routing entity, bridge, or VC switching entity. The significant aspects of Misconfigured entries are: - Because the link does not terminate as expected, the link is not actually impacted. - An error might exist in the configuration or status of the termination points. We recommend that you check the configuration and status of the affected termination points. 6-15 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 6 Working with Links Adding Static Links Adding Static Links Prime Network Vision enables you to create static links that exist only on the VNE level. Static links are useful for visualization and network correlation because Prime Network Vision allows correlation flows to go through the links, as if they were real physical or logical links. Static link properties are not updated because the links do not really exist in the network. To create a static link, select a device or port and define it as the A side. Then define a second device or port as the Z side. Prime Network Vision validates the new link after the two ports are selected. Validation checks the consistency of the port types (for example, RJ45 on both sides), and Layer 2 technology type (for example, ATM OC-3 on both sides). You can also create static links between Ethernet Link Aggregation Groups (LAGs) by choosing a LAG and the desired port channel for the A or Z side as described in the following procedure. When you add a new link, the color of the link reflects its current state. For example, if the operation status of a port is down, the link is colored red. You can add links from either the Prime Network Vision window’s navigation and a map, or from the inventory window navigation pane. In addition, you can add a new link using Cisco Prime Network Administration. For more information, see the Cisco Prime Network 3.10 Administrator Guide. Adding a Link Using a Map and Its Navigation Pane Step 1 Right-click the required A Side device in the navigation pane or in a map, and choose Topology > Mark as A Side. Step 2 Right-click the required Z Side device or LAG in the navigation pane or properties pane to display the right-click menu and choose Topology > Mark as Z Side. The Create Static Link window is displayed as shown in Figure 6-7, so that you can select the ports to connect. 6-16 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 6 Working with Links Adding Static Links Figure 6-7 Create Static Link Window Step 3 Select the required port on both the A Side device and the Z Side device. Step 4 Click Create to validate the connection and create the new link. A success message is displayed. A warning message is displayed if any of the following apply: • A validation check fails. • The operation status of one port is Up and the other port is Down. • The selected ports are not of the same type. • The Layer 2 technology type is not the same. • One of the ports is part of another link. Adding a Link Using the Inventory Window Step 1 Open the inventory window for the required A Side device. Step 2 In the navigation pane, navigate to the required port or LAG. Step 3 Right-click the required port or LAG and choose Topology > Mark as A Side. Step 4 Repeat Step 1 and Step 2 for the Z Side port or LAG. Step 5 Right-click the required port or LAG and choose Topology > Mark as Z Side. A confirmation message is displayed. 6-17 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 6 Working with Links Filtering Links Using the Collection Method Step 6 Click Yes. The ports are connected, and a link is created between the selected ports. A warning message is displayed if any of the following conditions exist: • One of the validation checks fails. • The operation status of one port is Up and the other port is Down. • The ports selected are not of the same type. • The Layer 2 technology type is not the same. • One of the ports is part of another link. For information about removing a static link, see the Cisco Prime Network 3.10 Administrator Guide. Filtering Links Using the Collection Method The links view table enables you to view links that are not displayed graphically in the Prime Network Vision window map pane. The links view table is dynamic and automatically refreshes itself so that you can view up-to-date network links in real time. The collection method enables you to filter the links displayed in the links view by selecting the collection method from the toolbar. Note • The deep collection method is applied by default in the links view. • The filter applies only to the links view; it has no effect elsewhere in Prime Network Vision. To filter links according to the collection method: Step 1 Click Show Links View in the Prime Network Vision main toolbar. Step 2 Select a map or aggregation in the navigation pane or links view. Step 3 In the links view toolbar, click one of the following buttons in the toolbar: • All Links • External Links • Flat Links • Deep Links The links are displayed in the links view according to the selected collection method. 6-18 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 6 Working with Links Selecting a Link Selecting a Link Prime Network Vision enables you to select a link listed in the links view and highlight the link in the map in the content pane. To select and highlight a link in a map: Step 1 In the Links view, right-click the required link and choose Select Link in Map. The link is displayed in blue in the map. Step 2 If two or more links are the same (for example, two VRF links), but they are in different contexts or aggregations, the Select Link Context dialog box is displayed. Select the required context from the drop-down list, then click OK. The link is displayed in blue in the map. Step 3 To remove the blue highlight from the selected link, click the map background. CHAPTER 7-1 Cisco Prime Network 3.10 User Guide OL-28065-01 7 Labeling NEs Using Business Tags A business tag is a string that is meaningful to the business, and which can be used to label a component of a network element for use in Prime Network screens and reports. Business tags are normally applied to a business element, which is a construction or organization of certain network elements and their properties into a logical entity. This provides users with the ability to track them in a way that makes sense from a business perspective. Examples of business elements include Layer 2 VPNs, Layer 3 VPNs, and virtual routers. The following topics describe how to manage and view Cisco Prime Network Vision business tags and business elements: • User Roles Required to Work with Business Tags and Business Elements, page 7-1 • Using Chinese Characters, page 7-2 • Attaching and Detaching Business Tags, page 7-3 • Searching for Business Tags and Viewing Their Properties, page 7-4 • Renaming a Business Element, page 7-7 • Deleting a Business Element, page 7-7 User Roles Required to Work with Business Tags and Business Elements This topic identifies the roles that are required to work with business tags and business elements. Prime Network determines whether you are authorized to perform a task as follows: • For GUI-based tasks (tasks that do not affect elements), authorization is based on the default permission that is assigned to your user account. • For element-based tasks (tasks that do affect elements), authorization is based on the default permission that is assigned to your account. That is, whether the element is in one of your assigned scopes and whether you meet the minimum security level for that scope. For more information on user authorization, see the Cisco Prime Network 3.10 Administrator Guide. The following tables identify the tasks that you can perform: • Table 7-1 identifies the tasks that you can perform if a selected element is not in one of your assigned scopes. • Table 7-2 identifies the tasks that you can perform if a selected element is in one of your assigned scopes. 7-2 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 7 Labeling NEs Using Business Tags Using Chinese Characters By default, users with the Administrator role have access to all managed elements. To change the Administrator user scope, see the topic on device scopes in the Cisco Prime Network 3.10 Administrator Guide. Using Chinese Characters Cisco Prime Network Vision supports Chinese characters in business tags, enabling you to perform the following activities using Chinese characters: • Create a business tag—Attaching and Detaching Business Tags, page 7-3. • Search for business tags and view business tag properties—Searching for Business Tags and Viewing Their Properties, page 7-4. Table 7-1 Default Permission/Security Level Required for Working with Business Tags and Business Elements - Element Not in User’s Scope Task Viewer Operator OperatorPlus Configurator Administrator Attach a business tag — — — Partial1 1. Configurator user role default permission supports the action for business elements, which do not have scopes. The Configurator user role default permission supports the action for elements only if the elements are in the user’s scope. X Detach a business tag — — — Partial1 X Search for a business tag — — — Partial1 X View business tag properties — — — Partial1 X Rename a business element XXX X X Delete a business element XXX X X Table 7-2 Default Permission/Security Level Required for Working with Business Tags and Business Elements - Element in User’s Scope Task Viewer Operator OperatorPlus Configurator Administrator Attach a business tag — — — Partial1 1. Configurator user role default permission supports the action for business elements, which do not have scopes. The Configurator user role default permission supports the action for elements only if the elements are in the user’s scope. X Detach a business tag — — — Partial1 X Search for a business tag — — — Partial1 X View business tag properties — — — Partial1 X Rename a business element XXX X X Delete a business element XXX X X 7-3 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 7 Labeling NEs Using Business Tags Attaching and Detaching Business Tags • Generate a list of business tags. • Edit the details of a business tag. • Write business tag notes. • Remove business tags. • Create aggregations. • Export a business tag through a northbound interface. See the following documents for more information about these features: • Configuring your system to use Chinese characters— Cisco Prime Network 3.10 Installation Guide. • Integration over northbound interfaces—Cisco Prime Network 3.10 Integration Developer Guide. Attaching and Detaching Business Tags You can attach one business tag for each entity, such as a port or interface. A business tag might identify a new subscriber to a port, or other information that is relevant in your environment. To attach a business tag: Step 1 Right-click the required network object and choose Attach Business Tag. The Attach Business Tag dialog box is displayed, as shown in Figure 7-1. Figure 7-1 Attach Business Tag Dialog Box Step 2 Enter the information for the business tag: • Unique Key—Enter a unique identifier for the business tag. • Name—Enter a name for the business tag. Note Business tag names are case-sensitive. 7-4 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 7 Labeling NEs Using Business Tags Searching for Business Tags and Viewing Their Properties • Type—Choose the type of business tag: Subscriber, Provider Connection, or Label. Note If you select Label, the name of the network object changes to display the business tag name if the Replace name with Business Tag option is selected in the Options dialog box (Tools > Options). For more information about display options, see Adjusting the Prime Network Vision GUI Client Settings, page 2-39. • Notes—(Optional) Enter a free-text message. Step 3 Click Save. The business tag is attached to the network object and displayed in the Business Tag tab of the inventory window for the selected network object. The business tag name is also displayed throughout Cisco Prime Network Vision, such as in the navigation pane, maps, and Cisco PathTracer. You can search and edit business tag information attached to a network object using tools available from the appropriate Business Tag dialog box. To detach a business tag, right-click the network object and choose Detach Business Tag. Searching for Business Tags and Viewing Their Properties Cisco Prime Network Vision enables you to find a business tag by entering the full or partial business tag key, the full or partial business tag, or by specifying a specific type of business tag. In response, the business tags that meet the search criteria are listed. If you know the location of the business tag, you can view its properties by opening the Business Tag tab in the element’s inventory window. To search for a business tag: Step 1 Choose Edit > Find Business Tag from the main menu. Figure 7-2 shows an example of the Find Business Tag dialog box. 7-5 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 7 Labeling NEs Using Business Tags Searching for Business Tags and Viewing Their Properties Figure 7-2 Find Business Tag Dialog Box Table 7-3 describes the fields in the Find Business Tag dialog box. Table 7-3 Find Business Tag Dialog Box Fields Icon Name Description Find Business Tag Finds the business tag according to a name, key, or type entered in the Find Business Tag dialog box. Clear Search Clears the search information entered in fields in the Find Business Tag dialog box. Edit Business Tag Opens the Edit Business Tag dialog box so you can edit the selected business tag. 7-6 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 7 Labeling NEs Using Business Tags Searching for Business Tags and Viewing Their Properties Step 2 Enter the search criteria using the information for the Input Fields in Table 7-3, keeping in mind that the search function is case-sensitive. Step 3 Click Find. The search results are displayed in the Results Table at the bottom of the Find Business Tag dialog box, as shown in Figure 7-2. Step 4 View additional details as required: • To view the business tag’s properties, double-click the business tag in the search results table. • To go to the business tag’s location, click the hyperlink provided in the search results table. Detach Business Tag Removes the selected business tag from the element. Help Displays online help for Cisco Prime Network Vision and Cisco Prime Network Events. Input Fields Unique Key Enter the key you are searching for. Name Enter a full or partial entry of the name you are searching for. The search function is case-insensitive, so entering the string biz tag in the Name field results in business tags with names containing Biz Tag, Biz tag, and biz tag. Type From the drop-down list, select the type of business tag you are searching for: Label, Subscriber, Provider Connection, or All Types. Note Enter a full or partial entry of the note for the business tag you are searching for. Results Table Key Business tag key matching the search criteria. Name Business tag names matching the search criteria. Type Business tag type matching the search criteria. Entity Entity to which the business tag is attached, hyperlinked to entity properties. Table 7-3 Find Business Tag Dialog Box Fields (continued) Icon Name Description 7-7 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 7 Labeling NEs Using Business Tags Renaming a Business Element Renaming a Business Element The following caveats apply when renaming a business element: • Except for network VLANs, the original name of the business element is not saved, so you cannot revert to the original name. • Renaming a business element affects all users who have the business element loaded in their service view maps. To rename business elements in service view maps, right-click the business element and choose Rename. Deleting a Business Element You can delete business elements from the database. However, if you delete a business element from the database, it can no longer be viewed in Prime Network. We recommend that you delete a business element only when the physical element no longer exists. Caution Deleting business elements affects all users who have the business elements loaded in their service view map. Table 7-4 lists the requirements that must be met before you can delete a business element. To delete a business element: Step 1 Verify that the business element meets all requirements specified in Table 7-4. You cannot delete the element if all requirements are not met. Step 2 In the Cisco Prime Network Vision navigation pane or a map, right-click the business element, and choose Delete. Step 3 In the confirmation message, click Yes to delete the currently selected element, or click Yes to All to delete multiple selected elements. The selected business element is deleted from the business configuration of all users. Table 7-4 Business Element Deletion Requirements Business Element Requirements Layer 2 VPN The Layer 2 VPN has no Logical Circuit Peers (LCPs), or, if it does, the LCPs display the reconciliation icon. Layer 3 VPN The VPN has no virtual routers, or, if it does, the virtual routers and sites display the reconciliation icon. Site No sites or interfaces are connected or bound to the VRF, or, if they are connected, they display the reconciliation icon. Virtual router The virtual router contains no VRFs, sites, or interfaces, or, if it does, the VRFs, sites, and interfaces display the reconciliation icon. 7-8 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 7 Labeling NEs Using Business Tags Deleting a Business Element CHAPTER 8-1 Cisco Prime Network 3.10 User Guide OL-28065-01 8 Working with the Prime Network Events Client These topics describe the Cisco Prime Network Events (Prime Network Events) application and the options you can use to view system events and tickets that are generated within the Prime Network system: • User Roles Required to Work with Prime Network Events, page 8-1 • Launching Prime Network Events, page 8-2 • Prime Network Events Window, page 8-2 • Prime Network Events Right-Click Options, page 8-7 • Adjusting the Prime Network Events GUI Client Settings, page 8-8 User Roles Required to Work with Prime Network Events This topic identifies the roles that are required to work with Prime Network Events. Prime Network determines whether you are authorized to perform a task as follows: • For GUI-based tasks (tasks that do not affect elements), authorization is based on the default permission that is assigned to your user account. • For element-based tasks (tasks that do affect elements), authorization is based on the default permission that is assigned to your account. That is, whether the element is in one of your assigned scopes and whether you meet the minimum security level for that scope. For more information on user authorization, see the topic on device scopes in the Cisco Prime Network 3.10 Administrator Guide. 8-2 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 8 Working with the Prime Network Events Client Launching Prime Network Events Only users with the Administrator role can log into Prime Network Events (see Table 8-1). Launching Prime Network Events Prime Network Vision is password protected to ensure security. Before you start working with Prime Network Events, make sure you know your username and password. If you use the standalone application, you also need to know the Prime Network Events gateway IP address or hostname. • Launch Prime Network Events from Prime Central—Choose Assure > Prime Network > Events in the menu bar. The Prime Network Events application is opened in a separate window. For information on Prime Central, see the Cisco Prime Central User Guide. • Launch Prime Network Events as a Standalone Application—Choose Start > Programs > Cisco Prime Network > gateway IP address > Cisco Prime Network Events, and enter your username and password. If any client updates are available, Prime Network automatically installs them. If you see messages that say the server and client have different versions of the application, you need to updated your client as described in the Cisco Prime Network 3.10 Installation Guide. The following conditions apply when working with Prime Network Events: • Prime Network Events shows events only from the fault database and not from the event archive. Use Report Manager to view events from the event archive. For more information, see Chapter 11, “Working with Reports.” • Only users with the Administrator role can log into Prime Network Events. Prime Network Events Window The Prime Network Events window displays the events generated in the system. Figure 8-1 shows an example of the Prime Network Events window. Table 8-1 Default Permission/Security Level Required for Prime Network Events Task Viewer Operator OperatorPlus Configurator Administrator Opening Prime Network Events ——— — X Selecting Prime Network Events viewing options ——— — X 8-3 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 8 Working with the Prime Network Events Client Prime Network Events Window Figure 8-1 Prime Network Events Window Prime Network Events displays events for the last two hours by default. To modify the default number of hours for which events are displayed, see Adjusting the Prime Network Events GUI Client Settings, page 8-8. Increasing the number of hours can affect how long it takes for the events to be displayed. Also, if you want to find specific events and you are not interested in browsing all the available events, you can set Prime Network Events to operate in Find mode. To enable and use Find mode, see Adjusting the Prime Network Events GUI Client Settings, page 8-8. You can display the events table with or without the properties pane, and select the specific type of information to display, such as provisioning events or SNMPv3 traps. For details on the information that is displayed in each tab, see Viewing Events and Tickets in Cisco Prime Network Events, page 9-2. 1 Menu bar 4 Details or properties pane 2 Toolbar 5 Status bar 3 Table pane 6 Prime Network Events tabs 8-4 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 8 Working with the Prime Network Events Client Prime Network Events Window You can also use the Prime Network Events window and menu options to: • Filter results so that events meeting your criteria are displayed. See Filtering Events, page 9-22. • View selected event properties in a separate window. See Viewing Event Properties, page 9-14. Event Status Indicators The Severity column contains color-coded icons that reflect the severity of the event. An icon appears for each ticket or event in the Prime Network Events tabs (based on its severity) as shown in Table 8-2. Event Types and Categories Every event that occurs in the Prime Network system and the Prime Network gateway is logged. This includes events that are performed as part of the normal operation of the Prime Network system, as well as events that might need further attention. Events are categorized, and any of the log entries can be viewed in the Prime Network Events tabs as described in Table 8-3. Table 8-2 Severity Indicators Icon Color Severity Icon Color Severity Red Critical Light Blue Warning Orange Major Medium Blue Information Yellow Minor Dark blue Indeterminate Green Cleared, Normal, or OK Table 8-3 Event Categories in Prime Network Events Tab Description Audit Events related to commands running in the Prime Network gateway. Provisioning Events related to configuration and provisioning activities, including activations from Prime Network Activation. Security Events related to client login and user activity when managing the system and the environment. Service Events related to the alarms that are generated by the Prime Network system. Syslog Events related to the predefined set of syslogs received from the devices by the VNEs, which are used to generate the syslog events. System Events related to the everyday working of the internal system and its components. These events may be related to Prime Network and Prime Network gateway resources, representing the system log. Ticket Tickets that were opened in Prime Network. 8-5 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 8 Working with the Prime Network Events Client Prime Network Events Window Prime Network Events Toolbar Table 8-4 describes the tools that are displayed in the Prime Network Events toolbar. V1 Trap SNMPv1 traps that are generated by a network element and received by Prime Network; Prime Network uses these traps to generate the trap events. V2 Trap SNMPv2 traps that are generated by a network element and received by Prime Network; Prime Network uses these traps to generate the trap events. V3 Trap SNMPv3 traps that are generated by a network element and received by Prime Network; Prime Network uses these traps to generate the trap events. All A flat list of all events and tickets, sorted by time. Displayed when you choose File > Open All Tab. 3.6.x Type Five tabs where Type represents one of the following: • Ticket • Service • Syslog • V1 Trap • V2-V3 Trap These tabs are: • Available only if Prime Network was upgraded from Cisco ANA 3.6.x to the current Prime Network version. • Displayed when you choose File > Open 3.6.x Tabs. Table 8-3 Event Categories in Prime Network Events (continued) Tab Description Table 8-4 Prime Network Events Toolbar Tools Button Function Displays the previous page of events in the Prime Network Events window. Displays the next page of events in the Prime Network Events window. Refreshes the events displayed in the log by querying the database. If a filter is active, the refresh is done according to the filter. The log returns to the beginning of the list, displaying the events in ascending or descending order depending on the order of the current list. Descending order means that the last event is displayed first. For more information, see Refreshing Cisco Prime Network Events Information, page 9-21. Displays the Filter Events dialog box, which enables you to define a filter for the events displayed in the Prime Network Events log. For more information, see Filtering Events, page 9-22. 8-6 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 8 Working with the Prime Network Events Client Prime Network Events Window Prime Network Events Menu Bar Table 8-5 describes the options available in the Prime Network Events main menus. In addition to these options, Prime Network Events displays a Properties option when you right-click an event or ticket (see Viewing Event Properties, page 9-14). Clears the existing filter. Displays the Find Events dialog box so that you can view events matching specific criteria. When finished selecting your criteria, click OK. The Prime Network Events window updates and displays the matching events. Note the following: • You can select multiple criteria here, as needed. • The Find Events dialog box returns every matching event in the database unless you specify a specific timeframe. This differs from the Filter Events dialog box, which returns events from the past 2 days (by default). For a description of the items in the Find Events dialog box, see Table 9-23 on page 9-23. Toggles automatic refresh of event data on and off. You define the refresh-time period (in seconds) in the Prime Network Events Options dialog box. The default is 60 seconds. If a filter is active, the refresh is done according to the filter. For more information, see Adjusting the Prime Network Events GUI Client Settings, page 8-8. Displays the properties of the selected event or ticket in the Properties pane. Table 8-4 Prime Network Events Toolbar Tools (continued) Button Function Table 8-5 Prime Network Events Menu Options Menu Option Description File Menu Export Exports the log event information displayed in the Prime Network Events window according to the criteria defined in the Prime Network Events Options dialog box. Open 3.6.x Tabs Displays the following tabs: • 3.6.x Ticket • 3.6.x Service • 3.6.x Syslog • 3.6.x V1 Trap • 3.6.x V2-V3 Trap This option is available only if Prime Network was upgraded from Cisco ANA 3.6.x to the current version of Prime Network. Open All Tab Displays the All tab so you can view a flat list of all events and tickets sorted only by time. Exit Exits Prime Network Events. 8-7 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 8 Working with the Prime Network Events Client Prime Network Events Right-Click Options Prime Network Events Right-Click Options Prime Network Events offers the following right-click options in its tabs. Not all options are available in all tabs. • Show Only Selected Rows—Displays only the rows that you choose. • Show All Rows—Displays all rows that meet the current filter criteria. Edit Menu Filter Defines a filter for the events displayed in the Prime Network Events window according to the tab selected. See Filtering Events, page 9-22. Purge This option is unavailable. View Menu Refresh Refreshes the information displayed in the Prime Network Events window. Go To Navigates through the pages of the Prime Network Events window. Properties Displays the properties of the selected event, such as the root cause and source, in a separate window. For more information, see Viewing Event Properties, page 9-14. Details Pane Displays or hides the Details pane. If an event is selected, the properties of the selected event are displayed in the Details pane. Tools Menu Change User Password Allows you to change the password used when logging into the Prime Network Events client application suite. The change takes effect the next time you log into the application. Options Defines the display options for the Prime Network Events window. For more information, see Adjusting the Prime Network Events GUI Client Settings, page 8-8 Reports Menu Report Manager Opens the Reports Manager dialog box so you can create, run, and manage reports. Run Report Enables you to run standard event, inventory, and network service reports on demand. Help Menu Cisco Prime Network Events Help Opens the online help for Prime Network Events and Prime Network Vision. Cisco.com This option is unavailable. About Cisco Prime Network Events Displays application information, such as the version number. Table 8-5 Prime Network Events Menu Options (continued) Menu Option Description 8-8 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 8 Working with the Prime Network Events Client Adjusting the Prime Network Events GUI Client Settings • Launch external applications or tools—Enables you to launch any external application or tool for any event in Prime Network Events. For more information, see the Cisco Prime Network 3.10 Customization Guide. • Properties—Displays the properties window for the selected event or ticket. Adjusting the Prime Network Events GUI Client Settings The Prime Network Events Options dialog box enables you to define the options for displaying events in the Prime Network Events window. To view these settings, choose Tools > Options from the main menu. The options are displayed in Table 8-6. Table 8-6 Options for Changing Prime Network Events GUI Client Option Description Save last filter Saves the filter criteria defined per event type in the Filter Events dialog box. The filter criteria are available the next time you log into Prime Network Events. Note Events are not filtered automatically when you next log into Prime Network Events unless the Open Events with saved filter option is also selected. Open Prime Network Events with saved filter When enabled, applies the previously defined filter to the events as soon as you log into Prime Network Events. The events are continuously filtered according to the defined settings, even after you close the application. Display n records per page Specifies the number of events to be displayed per page. Export n records in total Sets the maximum number of events to be exported to a file. Run auto refresh every n secs Automatically refreshes the Prime Network Events display after the specified number of seconds. Note This option uses rapid refresh from the database, which can affect the performance of other vital database options. Display data for the last n hours Displays past events from the specified number of hours. Values range from 1 to 336 hours (14 days), with a default of 2 hours. If you increase the number of hours, it can take longer for the events to be displayed. Find mode (No automatic data retrieval) Operates the Prime Network Events window in Find mode. In this mode, no events will be retrieved from the database when you open the application or switch between tabs. You can click the Find button in the toolbar to search for the events you need. When in Find mode, the status bar in the Prime Network Events window shows “Find Mode (no automatic data retrieval).” CHAPTER 9-1 Cisco Prime Network 3.10 User Guide OL-26486-01 9 Tracking Faults Using Prime Network Events The following topics describe how to use Cisco Prime Network Events (Prime Network Events) to track faults: • User Roles Required to Work with Prime Network Events, page 9-1 • Viewing Events and Tickets in Cisco Prime Network Events, page 9-2 • Viewing 3.6.x Tabs, page 9-12 • Working with Cisco Prime Network Events, page 9-14 User Roles Required to Work with Prime Network Events This topic identifies the roles that are required to work with Prime Network Events. Prime Network determines whether you are authorized to perform a task as follows: • For GUI-based tasks (tasks that do not affect elements), authorization is based on the default permission that is assigned to your user account. • For element-based tasks (tasks that do affect elements), authorization is based on the default permission that is assigned to your account. That is, whether the element is in one of your assigned scopes and whether you meet the minimum security level for that scope. For more information on user authorization, see the topic on device scopes in the Cisco Prime Network 3.10 Administrator Guide. Only users with the Administrator role can log into Cisco Prime Network Events, as shown in Table 9-1. Table 9-1 Default Permission/Security Level Required for Cisco Prime Network Events Task Viewer Operator OperatorPlus Configurator Administrator Viewing events and tickets ——— — X Viewing events and ticket properties ——— — X Refreshing information displayed in tables ——— — X 9-2 Cisco Prime Network 3.10 User Guide OL-26486-01 Chapter 9 Tracking Faults Using Prime Network Events Viewing Events and Tickets in Cisco Prime Network Events Viewing Events and Tickets in Cisco Prime Network Events Events are displayed according to event categories, which are represented by tabs in the Cisco Prime Network Events window. Each tab displays an events list log that provides event information for the specific event category. Events can be of system type or network type. Note Cisco Prime Network Events shows events only from the fault database and not from the event archive. Use Report Manager to view events from the event archive. For more information, see Chapter 11, “Working with Reports.” The Ticket tab displays the tickets that have been generated for correlated events. Events and tickets are sorted by date, with the latest item displayed first and the oldest item displayed last. Note Prime Network stores events in the database in Greenwich Mean Time (GMT) format. The Prime Network client converts events to the time zone that is configured on the client workstation. The times displayed in the Cisco Prime Network Events GUI reflect the time according to the client workstation. By using the Cisco Prime Network Events Options dialog box, you can define a filter to be used or the number of items to be displayed in the list. Each tab displays the specified number of entries per page as defined in the Cisco Prime Network Events Options dialog box. For more information, see Adjusting the Prime Network Events GUI Client Settings, page 8-8. Because the lists of events and tickets can be lengthy, you can use the left and right arrows on the navigation to move through the records. You can also use the submenus that are available from View > Go To in the main menu. Filtering events and tickets ——— — X Exporting displayed data ——— — X Table 9-1 Default Permission/Security Level Required for Cisco Prime Network Events (continued) Task Viewer Operator OperatorPlus Configurator Administrator 9-3 Cisco Prime Network 3.10 User Guide OL-26486-01 Chapter 9 Tracking Faults Using Prime Network Events Viewing Events and Tickets in Cisco Prime Network Events All Tab The All tab displays information about all events. Additional information specific to the event category can be viewed in the Event Properties window or individual category tabs. When you launch Cisco Prime Network Events, the All tab is not displayed. You can view this tab by choosing File > Open All Tab. Note When you open the All tab, it might take some time to retrieve information from the Prime Network database for all category events. You can disable the All tab by following the instructions provided in the Cisco Prime Network 3.10 Installation Guide. Table 9-2 describes the information that is displayed in the All tab. System Event Tabs The following tabs in the Cisco Prime Network Events window display the system events: • Audit Tab, page 9-3 • Provisioning Tab, page 9-5 • Security Tab, page 9-6 • System Tab, page 9-6 Audit Tab The Audit tab displays all events generated for each command or request in Prime Network; for example, opening Cisco Prime Network Events displays the Get command as shown in Figure 9-1. Table 9-2 All Tab Column Description Severity Icon indicating the severity of the alarm on the event (the color and type of alarm are displayed in the Properties window Severity field). See Event Status Indicators, page 8-4. Event ID Event identifier, assigned sequentially. Time Date and time when the event occurred and was logged and recorded. Description Description of the event. Location Entity that triggered the event. Event Type Type of event: Audit, Provisioning, Security, Service, Syslog, System, V1 Trap, V2 Trap, or V3 Trap. 9-4 Cisco Prime Network 3.10 User Guide OL-26486-01 Chapter 9 Tracking Faults Using Prime Network Events Viewing Events and Tickets in Cisco Prime Network Events Figure 9-1 Audit Tab Table 9-3 describes the information that is displayed in the Audit tab. The audit service enables you to audit all the commands executed in the system; for example, the Get command can be audited. The Audit tab then displays this information. Table 9-3 Audit Tab Column Description Severity Icon indicating the severity of the alarm on the event (the color and type of alarm are displayed in the Properties window Severity field). See Event Status Indicators, page 8-4. Event ID Identifier of the event, assign sequentially. Time Date and time when the event happened and was logged and recorded. Description Aggregation of portions of the same fields in the Audit Command fields. Command Name Audit-specific command name, prefaced by, for example, Get, Update, or Find. Command Signature Actual command run by Prime Network, such as GetEventViewerProperties. Command Parameters Command parameters issued with the command identified in the Command Name column. Originating IP IP address of the client that issued the command User Name Name of the user who initiated the command. 9-5 Cisco Prime Network 3.10 User Guide OL-26486-01 Chapter 9 Tracking Faults Using Prime Network Events Viewing Events and Tickets in Cisco Prime Network Events Provisioning Tab Events displayed in the Provisioning tab are events triggered during the configuration of a device. Prime Network sends an event explaining the configuration operation, such as configuring the cross-connect table in a device. The Provisioning tab displays detailed information specific to this event category. It contains events from Prime Network Command Builder, Prime Network Activation, and Prime Network Workflow Editor1 . Additional information specific to this event category can be viewed in the Event Properties window. If a provisioning event is the result of an activation script, the provisioning event can include an extremely long description. This description is displayed in the Event Properties window in the Details field. If the description exceeds the size of the Details field, Prime Network truncates the description in the database and Details field, and displays the following line to indicate that the description has been truncated: =====CONTENT TRUNCATED BY CISCO PRIME NETWORK===== Table 9-4 describes the information that is displayed in the Provisioning tab. 1. The Workflow Editor is based on LiquidBPM by Autonomy, Inc. Table 9-4 Provisioning Tab Column Description Severity Icon indicating the severity of the alarm on the event (the color and type of alarm are displayed in the Properties window Severity field). See Event Status Indicators, page 8-4. Event ID Identifier of the event, assigned sequentially. Time Date and time when the event happened and was logged and recorded. Description Description of the event, such as “Script Show has failed.” Location Entity that triggered the event. Prime Login Username Username of the logged in user. VNE Login Username Username, which was used to access the device. This field is updated only for events generated by command scripts in Prime Network. For all other commands, this field shows ‘From VNE Login.’ Status Status, such as Success or Fail. 9-6 Cisco Prime Network 3.10 User Guide OL-26486-01 Chapter 9 Tracking Faults Using Prime Network Events Viewing Events and Tickets in Cisco Prime Network Events Security Tab The Security tab displays detailed information specific to this event category. Security events are related to client login and user activity when managing the system and the environment. Additional information specific to this event category can be viewed in the Event Properties window. Table 9-5 describes the information that is displayed in the Security tab. For more information about the system security events displayed in this tab, see Cisco Prime Network 3.10 Supported Service Events. System Tab The System tab displays all the system events related to the everyday working of the internal system and its components. These events can be related to Prime Network and Prime Network gateway resources, representing the system log. Additional information specific to this event category can be viewed in the Event Properties window. Table 9-6 describes the information that is displayed in the System tab. For more information about the system error and event messages displayed in this tab, see Cisco Prime Network 3.10 Supported Service Events. Table 9-5 Security Tab Column Description Severity Icon indicating the severity of the alarm on the event (the color and type of alarm are displayed in the Properties window Severity field). See Event Status Indicators, page 8-4. Event ID Identifier of the event, assigned sequentially. Time Date and time when the event happened and was logged and recorded. Description Description of the event, such as “Invalid password. Couldn’t authenticate user root.” Location Entity that triggered the event. Username Name of the user who triggered the event. Originating IP IP address of the client where the event was triggered. Table 9-6 System Tab Column Description Severity Icon indicating the severity of the alarm on the event (the color and type of alarm are displayed in the Properties window Severity field). See Event Status Indicators, page 8-4. Event ID Identifier of the event, assigned sequentially. Time Date and time when the event happened and was logged and recorded. Description Description of the event, such as “AVM 77 is shutting down. Unit = 11.22.33.444.” Location Entity that triggered the event. 9-7 Cisco Prime Network 3.10 User Guide OL-26486-01 Chapter 9 Tracking Faults Using Prime Network Events Viewing Events and Tickets in Cisco Prime Network Events Network Event Tabs The following topics describe the information displayed in Prime Network Events for network events: • Service Tab, page 9-7 • Syslog Tab, page 9-8 • Ticket Tab, page 9-8 • V1 Trap Tab, page 9-10 • V2 Trap Tab, page 9-10 • V3 Trap Tab, page 9-11 Service Tab The Service tab displays all the events generated by Prime Network, such as Link Down. Service events are related to the alarms that are generated by the Prime Network system. Additional information specific to this event category can be viewed in the Event Properties window. Table 9-7 describes the information that is displayed in the Service tab. For more information about the service alarms that are displayed in this tab, see Cisco Prime Network 3.10 Supported Service Alarms. Table 9-7 Service Tab Column Description Severity Icon indicating the severity of the alarm on the event (the color and type of alarm are displayed in the Properties window Severity field). See Event Status Indicators, page 8-4. Event ID Calculated correlation identifier. Time Date and time when the event happened and was logged and recorded. Description Description of the event, such as “Port down due to oper.” Location Hyperlink to the entity that triggered the event. Alarm ID Hyperlinked identifier of the alarm associated with the event. Click the link to view the Ticket Properties window. Ticket ID Hyperlinked identifier of the ticket associated with the event. Click the link to view the Ticket Properties window. Causing Event ID Identifier of the causing event. Duplication Count For network events, the duplication count is calculated by the VNE and pertains only to flapping events. The duplication count represents the number of noncleared events aggregated by the flapping event. Reduction Count For network events, the reduction count is calculated by the VNE and pertains only to flapping events. The reduction count represents the number of events that are aggregated by the flapping event. 9-8 Cisco Prime Network 3.10 User Guide OL-26486-01 Chapter 9 Tracking Faults Using Prime Network Events Viewing Events and Tickets in Cisco Prime Network Events Syslog Tab The Syslog tab displays all the syslog events. These events are related to the predefined set of syslogs received from the devices by the VNEs, which are used to generate the syslog events. Additional information specific to this event category can be viewed in the Event Properties window. Table 9-8 describes the information that is displayed in the Syslog tab. Ticket Tab The Ticket tab displays detailed information specific to tickets. A ticket contains a single root alarm (the root cause alarm can be of any alarm type, such as syslog or service), and all its subsequent correlated alarms. Additional information specific to tickets can be viewed in the Ticket Properties window. A Tickets capacity overflow, red threshold reached system alarm is generated when the maximum number of tickets is exceeded. The alarm severity is defined as critical. Table 9-8 Syslog Tab Column Description Severity Icon indicating the severity of the alarm on the event (the color and type of alarm are displayed in the Properties window Severity field). See Event Status Indicators, page 8-4. Event ID Calculated correlation identifier. Time Date and time when the event happened and was logged and recorded. Description Description of the event, such as “Device configuration changed.” Location Hyperlink to the entity that triggered the event. Alarm ID Identifier of the alarm associated with the event. Ticket ID Identifier of the ticket associated with the event. Causing Event ID Identifier of the causing event. Duplication Count For network events, the duplication count is calculated by the VNE and pertains only to flapping events. The duplication count represents the number of noncleared events aggregated by the flapping event. Reduction Count For network events, the reduction count is calculated by the VNE and pertains only to flapping events. The reduction count represents the number of events that are aggregated by the flapping event. 9-9 Cisco Prime Network 3.10 User Guide OL-26486-01 Chapter 9 Tracking Faults Using Prime Network Events Viewing Events and Tickets in Cisco Prime Network Events Table 9-9 describes the information that is displayed in the Ticket tab. For information about viewing ticket properties, see Viewing Ticket Properties, page 9-18. Table 9-9 Ticket Tab Column Description Severity Icon indicating the severity of the alarm on the ticket (the color and type of alarm are displayed in the Ticket Properties window Severity field). See Event Status Indicators, page 8-4. Ticket ID Sequentially assigned identifier of the ticket, hyperlinked to the Ticket Properties window. Notes An icon in this column indicates that a note has been added for the ticket. Click on the icon to read the note and add your own note, if necessary. Last Modification Time Date and time (per the database) that the ticket was last updated. Updates can result from either manual or automatic operations. Root Event Time Date and time that the event that created the root cause alarm of the ticket was detected. Description Description of the event, such as “Layer 2 tunnel down.” Location Hyperlink to the entity that triggered the event. Acknowledged Whether the ticket is acknowledged or has been modified: Yes, No, or Modified. Creation Time Date and time that the ticket was created. Event Count Number of events associated with the ticket. Affected Devices Count Number of devices affected by the ticket (the sources of the alarm and their subsequent alarms). Duplication Count For tickets, the duplication count is the sum of the duplication counts of all events that are associated with the root alarm. Reduction Count Ticket reduction count is the sum of reduction counts of all the events that are associated to the ticket. The History tab in the Ticket Properties window displays one reduction count for each event listed. For more information, see Chapter 10, “Working with Tickets in Cisco Prime Network Vision.” Alarm Count Total number of alarms associated with the ticket, including the root alarm. 9-10 Cisco Prime Network 3.10 User Guide OL-26486-01 Chapter 9 Tracking Faults Using Prime Network Events Viewing Events and Tickets in Cisco Prime Network Events V1 Trap Tab This event is triggered when the network element sends a trap message to Prime Network because of a network event, such as Link Down. The V1 Trap tab displays detailed information specific to this category. Additional information specific to each event category can be viewed in the Event Properties window. Table 9-10 describes the information that is displayed in the V1 Trap tab. For more information about the Cisco IOS and Cisco IOX traps displayed in one of these tabs, see Cisco Prime Network 3.10 Supported Traps. V2 Trap Tab This event is triggered when the network element sends a trap message to Prime Network because of a network event. The V2 Trap tab displays detailed information specific to this category. Additional information specific to each event category can be viewed in the Event Properties window. Table 9-10 V1 Trap Tab Column Description Severity Icon indicating the severity of the alarm on the event (the color and type of alarm are displayed in the Properties window Severity field). See Event Status Indicators, page 8-4. Event ID Calculated correlation identifier. Time Date and time when the event happened and was logged and recorded. Description Description of the event, such as “Enterprise generic trap.” Location Hyperlink to the entity that triggered the trap. Alarm ID Identifier of the alarm associated with the event, hyperlinked to the Alarm Properties window. Ticket ID Hyperlinked sequential identifier of the ticket. Click the link to view the Ticket Properties window. Causing Event ID Identifier of the causing event, hyperlinked to the Network Event Properties window. Duplication Count For network events, the duplication count is calculated by the VNE and pertains only to flapping events. The duplication count represents the number of noncleared events aggregated by the flapping event. Reduction Count For network events, the reduction count is calculated by the VNE and pertains only to flapping events. The reduction count represents the number of events that are aggregated by the flapping event. 9-11 Cisco Prime Network 3.10 User Guide OL-26486-01 Chapter 9 Tracking Faults Using Prime Network Events Viewing Events and Tickets in Cisco Prime Network Events Table 9-11 describes the information that is displayed in the V2 Trap tab. For more information about the Cisco IOS and Cisco IOX traps displayed in this tab, see Cisco Prime Network 3.10 Supported Traps. V3 Trap Tab This event is triggered when the network element sends a trap message to Prime Network because of a network event. The V3 Trap tab displays detailed information specific to this category. Additional information specific to each event category can be viewed in the Event Properties window. Table 9-11 V2 Trap Tab Column Description Severity Icon indicating the severity of the alarm on the event (the color and type of alarm are displayed in the Properties window Severity field). See Event Status Indicators, page 8-4. Event ID Calculated correlation identifier. Time Date and time when the event happened and was logged and recorded. Description Description of the event, such as “SNMP authentication failure.” Location Hyperlink to the entity that triggered the trap. Alarm ID Identifier of the alarm associated with the event, hyperlinked to the Alarm Properties window. Ticket ID Sequential identifier of the ticket, hyperlinked to the Ticket Properties window. Causing Event ID Identifier of the causing event, hyperlinked to the Network Event Properties window. Duplication Count For network events, the duplication count is calculated by the VNE and pertains only to flapping events. The duplication count represents the number of noncleared events aggregated by the flapping event. Reduction Count For network events, the reduction count is calculated by the VNE and pertains only to flapping events. The reduction count represents the number of events that are aggregated by the flapping event. Trap Type OID Trap object identifier. Translated Enterprise Translation of the OID using the MIB. For example, an enterprise OID of .1.3.6.1.2.1.88.2 is displayed in this column as .iso.org.dod.internet.mgmt.mib-2.dismanEventMIB.dismanEventMIB NotificationPrefix. Enterprise Enterprise OID for the trap, representing the company or organization that is associated with the trap. 9-12 Cisco Prime Network 3.10 User Guide OL-26486-01 Chapter 9 Tracking Faults Using Prime Network Events Viewing 3.6.x Tabs Table 9-12 describes the information that is displayed in the V3 Trap tab. For more information about the Cisco IOS and Cisco IOX traps displayed in this tab, see Cisco Prime Network 3.10 Supported Traps. Viewing 3.6.x Tabs If you upgrade to Prime Network 3.10 from Cisco ANA 3.6.x, you can view the following tabs by choosing File > Open 3.6.x Tabs: • 3.6.x Ticket • 3.6.x Service • 3.6.x Syslog • 3.6.x V1 Trap • 3.6.x V2-V3 Trap Table 9-12 V3 Trap Tab Column Description Severity Icon indicating the severity of the alarm on the event (the color and type of alarm are displayed in the Properties window Severity field). See Event Status Indicators, page 8-4. Event ID Calculated correlation identifier. Time Date and time when the event happened and was logged and recorded. Description Description of the event, such as “Enterprise generic trap.” Location Hyperlink to the entity that triggered the trap. Alarm ID Identifier of the alarm associated with the event, hyperlinked to the Alarm Properties window. Ticket ID Sequential identifier of the ticket, hyperlinked to the Ticket Properties window. Causing Event ID Identifier of the causing event, hyperlinked to the Network Event Properties window. Duplication Count For network events, the duplication count is calculated by the VNE and pertains only to flapping events. The duplication count represents the number of noncleared events aggregated by the flapping event. Reduction Count For network events, the reduction count is calculated by the VNE and pertains only to flapping events. The reduction count represents the number of events that are aggregated by the flapping event. Trap Type OID Trap object identifier. Translated Enterprise Translation of the OID using the MIB. For example, an enterprise OID of .1.3.6.1.2.1.88.2 is displayed in this column as .iso.org.dod.internet.mgmt.mib-2.dismanEventMIB.dismanEventMIB NotificationPrefix. Enterprise Enterprise OID for the trap, representing the company or organization that is associated with the trap. 9-13 Cisco Prime Network 3.10 User Guide OL-26486-01 Chapter 9 Tracking Faults Using Prime Network Events Viewing 3.6.x Tabs Table 9-13 describes the information that is displayed in each of the 3.6.x tabs. Table 9-13 3.6.x Tab Contents in Events Field Description 3.6.x Ticket Tab Severity Icon of a bell, colored according to the severity of the alarm on the ticket. For more information, see Event Status Indicators, page 8-4. Ticket ID Sequentially assigned identifier of the ticket. Short Description Description of the event. Location Hyperlink to the entity that triggered the event. Last Modification Time Date and time (per the database) that the ticket was last updated. Updates can result from either manual or automatic operations. Time Date and time recorded when the first event happened. Acknowledged Status of the ticket: Acknowledged, Not Acknowledged, or Modified. Affected Devices Count Number of devices affected by the ticket (the sources of the alarm and their subsequent alarms). Correlation Count Number of correlated alarms included in the ticket. Reduction Count Ticket reduction count is the sum of reduction counts of all the events that are associated to the ticket. The History tab in the Ticket Properties window displays one reduction count for each event listed. For more information, see Chapter 10, “Working with Tickets in Cisco Prime Network Vision.” Duplication Count For tickets, the duplication count is the sum of the duplication counts of all events that are associated with the root alarm. 3.6.x Service Tab Severity Icon of a bell, colored according to the severity of the alarm. For more information, see Event Status Indicators, page 8-4. Alarm ID Sequentially assigned identifier of the alarm. Short Description Description of the event. Location Hyperlink to the entity that triggered the event. Time Date and time recorded when the first event happened. 3.6.x Syslog Tab Severity Icon of a bell, colored according to the severity of the alarm. For more information, see Event Status Indicators, page 8-4. Alarm ID Sequentially assigned identifier of the alarm. Short Description Description of the event. Location Hyperlink to the entity that triggered the event. Time Date and time recorded when the first event happened. 9-14 Cisco Prime Network 3.10 User Guide OL-26486-01 Chapter 9 Tracking Faults Using Prime Network Events Working with Cisco Prime Network Events Working with Cisco Prime Network Events The following topics describe how to view, filter, and display the properties of specific events and tickets, and how to refresh and export events: • Viewing Event Properties, page 9-14 • Viewing Ticket Properties, page 9-18 • Refreshing Cisco Prime Network Events Information, page 9-21 • Filtering Events, page 9-22 • Exporting Displayed Data, page 9-25 Viewing Event Properties Cisco Prime Network Events enables you to view the properties of a specific event type. The Event Properties window displays detailed information about the event; for example, the severity and the number of affected parties. Tip Clicking the Details tab on the Event Properties window displays the properties of the selected ticket or event in the Properties pane. 3.6.x V1 Trap Tab Severity Icon of a bell, colored according to the severity of the alarm. For more information, see Event Status Indicators, page 8-4. Alarm ID Sequentially assigned identifier of the alarm. Short Description Description of the event. Location Hyperlink to the entity that triggered the event. Time Date and time recorded when the first event happened. Suppress Display Whether or not the display of the alarm is suppressed. 3.6.x V2-V3 Trap Tab Severity Icon of a bell, colored according to the severity of the alarm. For more information, see Event Status Indicators, page 8-4. Alarm ID Sequentially assigned identifier of the alarm. Short Description Description of the event. Location Hyperlink to the entity that triggered the event. Time Date and time recorded when the first event happened. Suppress Display Whether or not the display of the alarm is suppressed. Table 9-13 3.6.x Tab Contents in Events (continued) Field Description 9-15 Cisco Prime Network 3.10 User Guide OL-26486-01 Chapter 9 Tracking Faults Using Prime Network Events Working with Cisco Prime Network Events To view event properties: Step 1 Select the required tab for the specific event type. Step 2 Select an event and choose View > Properties from the main menu. The event properties are displayed for the selected event, either in the lower portion of the Cisco Prime Network Events window or in a separate window as shown in Figure 9-2. The Details tab is displayed by default. Figure 9-2 Network Event Properties Window - Details Tab Table 9-14 describes the information that is displayed in the Details tab in the Event Properties window. Table 9-14 Details Tab for Events Field Description Event ID Unique identifier for the selected event. Severity Severity of the event, indicated by color and text label. Description Description of the event. Type Type of event, such as Security or Service. Location Entity that triggered the event, hyperlinked to its entry in inventory. Ticket ID This field is displayed only for network events. Sequential identifier of the ticket, hyperlinked to the Ticket Properties window. Detection Time Date and time when the event happened and was logged and recorded. 9-16 Cisco Prime Network 3.10 User Guide OL-26486-01 Chapter 9 Tracking Faults Using Prime Network Events Working with Cisco Prime Network Events Step 3 You can view additional properties in the following tabs: • Advanced tab—See Table 9-15 on page 9-17. • Affected Parties tab—See Table 10-12 on page 10-15. • Audit tab—See Table 9-16 on page 9-17. • Provisioning tab—See Table 9-17 on page 9-17. Device Time The time zone of the device. Note This information is available only for Cisco ASR5000 devices. Category The category of the fault, which can be any one of the following: • Communications—Associated with procedures and/or processes required to convey information from one point to another. • Quality of Service—Associated with a degradation in the quality of service. • Processing error—Associated with a software or processing fault equipment. • Environmental—Associated with a condition relating to an enclosure in which the equipment resides. • Equipment—Associated with an equipment fault. • Undetermined—Not categorized. Nature The nature of the fault, which can be one of the following: • ADAC (Automatically Detected Automatically Cleared)—When the clearing is automatically detected and cleared by Element Management System (EMS). For example, Link Down. • ADMC (Automatically Detected Manually Cleared)—When clearing requires manual intervention. For example, DWDM Fatal Error syslog. Alarm ID This field is displayed only for network events. Alarm identifier, hyperlinked to the Ticket Properties window or the Alarm Properties window. Causing Event This field is displayed only for network events. The identifier of the causing event. Details Detailed description of the event. Troubleshooting The probable cause of the event, action to be taken to rectify the problem, and the clearing condition. Note This information is available only for Cisco ASR5000 traps. Table 9-14 Details Tab for Events (continued) Field Description 9-17 Cisco Prime Network 3.10 User Guide OL-26486-01 Chapter 9 Tracking Faults Using Prime Network Events Working with Cisco Prime Network Events • Security tab—See Table 9-18 on page 9-17. • Trap tab—See Table 9-19 on page 9-18. The tabs that are displayed depend on the type of event, such as a Service event or a Provisioning event. Table 9-15 Advanced Tab Field Description Duplication Count For network events, the duplication count is calculated by the VNE and pertains only to flapping events. The duplication count represents the number of noncleared events aggregated by the flapping event. Reduction Count For network events, the reduction count is calculated by the VNE and pertains only to flapping events. The reduction count represents the number of events that are aggregated by the flapping event. Affected Devices The number of devices affected by the ticket. Alarm Count The total number of alarms associated with the ticket, including the root alarm. Table 9-16 Audit Tab Field Description User Name Name of user who initiated the command. Result Command result, if available. Originating IP IP address of the client that issued the command. Command Signature Actual command run by Prime Network, such as GetEventViewerProperties. Command Parameters Parameters applied to the command. Table 9-17 Provisioning Tab Field Description User Name Name of the user who performed the provisioning operation. Status Status of the operation: Success or Fail. Table 9-18 Security Tab Field Description User Name Name of the user who triggered the event. Client Type Client that triggered the event: Cisco Prime Network Vision, Cisco Prime Network Administration, Cisco Prime Network Events, or Unknown. Originating IP IP address of the client where the event was triggered. 9-18 Cisco Prime Network 3.10 User Guide OL-26486-01 Chapter 9 Tracking Faults Using Prime Network Events Working with Cisco Prime Network Events The properties of a selected ticket can be viewed in the Ticket Properties window. For a detailed description of the Ticket tab properties, see Viewing Ticket Properties, page 9-18. Viewing Ticket Properties You can view the properties of a selected ticket in Cisco Prime Network Events by displaying the Ticket Properties window. To view ticket properties in Cisco Prime Network Events: Step 1 In the Ticket tab in the Cisco Prime Network Events window, select the required ticket. Step 2 Choose View > Properties from the main menu. The properties are displayed for the selected ticket, either in the lower portion of the Cisco Prime Network Events window or in a separate window as shown in Figure 9-3. Table 9-19 Trap Tab Field Description Version SNMP version: version-1, version-2c, or version-3. Community String Community that the device sends in the Protocol Data Unit (PDU). Error Status Error status: No Error, Too Big, No Such Name, Bad Value, Read Only, and Gen Err. Values Table Translated OID String representation of the OID. For example, 1.3.6 is translated into iso.org.dod where: • 1 represents iso. • 3 represents org. • 6 represents dod. Translated Value String representation of the OID value. For example, 1.3 is translated to iso(1).org.10, or a specific value, such as “down” or “4 days, 20 hours, 32 minutes, 11 seconds.” OID OID that is not translated. It is a dot notation representation of the OID, such as 1.3.6.1.4.1.9. Value Value that is not translated. 9-19 Cisco Prime Network 3.10 User Guide OL-26486-01 Chapter 9 Tracking Faults Using Prime Network Events Working with Cisco Prime Network Events Figure 9-3 Ticket Properties Window - Details Tab Table 9-20 describes the information that is displayed in the Details tab in the Ticket Properties window. Table 9-20 Ticket Properties Window - Details Tab Field Description Buttons Acknowledge Acknowledges that the ticket is being handled. The status of the ticket is displayed as true in the ticket pane and in the Ticket Properties dialog box. For more information, see Acknowledged Ticket, page 10-7. If a ticket is acknowledged, and events are correlated to it after correlation, the ticket is considered to have not been acknowledged. This button is enabled only if the ticket is not acknowledged. Clear Requests the Prime Network system to remove the faulty network element from the Prime Network networking inventory. In addition, it sets the ticket to Cleared severity or status and automatically changes the acknowledged status of the ticket to Yes. For more information, see Cleared Ticket, page 10-7. This button is enabled only if the severity of the alarm is higher than Cleared or Normal. Details Tab Ticket ID Sequentially assigned identifier of the ticket. Severity Severity of the ticket, indicated by color and text label. 9-20 Cisco Prime Network 3.10 User Guide OL-26486-01 Chapter 9 Tracking Faults Using Prime Network Events Working with Cisco Prime Network Events Description Description of the ticket. Last Modification Time Date and time (per the database) that the ticket was last updated. Updates can result from either manual or automatic operations. Location Hyperlink to the entity that triggered the event. Note If the entity that triggered the event is outside your scope, a message is displayed that states you do not have permission to access the selected item. Open Alarms Number of open alarms out of all alarms, such as 3/4. Root Event Time Date and time that the event that created the root cause alarm of the ticket was detected. Acknowledged Whether or not the ticket has been acknowledged: Yes or No. Creation Time Date and time when the ticket was created. Device Time The time zone of the device. Note This information is available only for Cisco ASR5000 devices. Category The category of the fault, which can be any one of the following: • Communications—Associated with procedures and/or processes required to convey information from one point to another. • Quality of Service—Associated with a degradation in the quality of service. • Processing error—Associated with a software or processing fault equipment. • Environmental—Associated with a condition relating to an enclosure in which the equipment resides. • Equipment—Associated with an equipment fault. • Undetermined—Not categorized. Nature The nature of the fault, which can be one of the following: • ADAC (Automatically Detected Automatically Cleared)—When the clearing is automatically detected and cleared by Element Management System (EMS). For example, Link Down. • ADMC (Automatically Detected Manually Cleared)—When clearing requires manual intervention. For example, DWDM Fatal Error syslog. Details Detailed description of the ticket. Troubleshooting The probable cause of the event, action to be taken to rectify the problem and the clearing condition. Note This information is available only for Cisco ASR5000 traps. Table 9-20 Ticket Properties Window - Details Tab (continued) Field Description 9-21 Cisco Prime Network 3.10 User Guide OL-26486-01 Chapter 9 Tracking Faults Using Prime Network Events Working with Cisco Prime Network Events Step 3 As required, review additional properties for the ticket. Table 9-21 identifies the additional tabs that are displayed in the Ticket Properties window and links to the relevant information. Refreshing Cisco Prime Network Events Information Cisco Prime Network Events displays current information in lists in each tab. While you view a list, the information is not updated unless you manually refresh the list or activate autorefresh. The default autorefresh setting is 60 seconds and can be adjusted (see Adjusting the Prime Network Events GUI Client Settings, page 8-8). Your filter settings remain intact. Table 9-21 Ticket Properties Window - Additional Tabs Tab Description History Contains the history of the ticket, including all the events. For more information, see History Tab, page 10-13. Affected Parties The services (affected pairs) that are potentially affected (potential impact analysis) by the ticket. For more information, see Affected Parties Tab, page 10-14. Correlation Displays all alarms that are correlated to the selected ticket. For more information, see Correlation Tab, page 10-17. Advanced The number of affected devices, correlations, duplications, and reductions for the selected ticket. In addition, it provides any other additional information available about the ticket. For more information, see Advanced Tab, page 10-18. Notes Enables you to add and save notes for the selected ticket. The Notes tab is not available for tickets that have been archived. For more information, see Notes Tab, page 10-18. User Audit Enables you to see which ticket-related actions were carried out by which users, and when the action took place. For more information, see User Audit Tab, page 10-19. 9-22 Cisco Prime Network 3.10 User Guide OL-26486-01 Chapter 9 Tracking Faults Using Prime Network Events Working with Cisco Prime Network Events Table 9-22 shows the refresh buttons. To manually refresh a list, choose View > Refresh from the main menu. To automatically refresh a list, click Auto Refresh in the toolbar. Filtering Events The Filter Events dialog box allows you to filter events according to a number of criteria including severity, identifier, time stamp, description, location, and category-specific information. You may also use the filter to search for information in the database. The Filter icon toggles to indicate that a filter has been applied. The following settings in the Cisco Prime Network Events Options dialog box also affect your filters: • If you check the Keep Last Filter check box, the currently defined filter settings are saved in the registry and are displayed the next time you log in, but are not applied. • If you check the Open Using Filter check box, the events are continuously filtered according to the defined settings, even when you log out of and back into the application. For more information, see Adjusting the Prime Network Events GUI Client Settings, page 8-8. See the following topics for more information about filtering events: • Defining Filters, page 9-23 • Removing Filters, page 9-24 For information about filtering tickets, see Filtering Tickets by Criteria, page 10-8. Table 9-22 Cisco Prime Network Events Refresh Buttons Button Name Function Refresh Now Manually refreshes the events list. Auto Refresh Automatically refreshes the events list. The Auto Refresh icon toggles to indicate whether auto refresh is on or off. This icon indicates auto refresh is on. 9-23 Cisco Prime Network 3.10 User Guide OL-26486-01 Chapter 9 Tracking Faults Using Prime Network Events Working with Cisco Prime Network Events Defining Filters To define a filter: Step 1 Choose Edit > Filter from the main menu. The criteria that you can use for filtering differs for events and tickets. For example, Figure 9-4 shows the Filter Events dialog box for service events. For an example of the Ticket Filter dialog box, see Figure 10-2 on page 10-9. Figure 9-4 Filter Events Dialog Box - Service Events Step 2 Specify the filter criteria by using the following steps and the information in Table 9-23: a. Check the check box for each criterion to use for filtering. b. As needed, choose the operator for the filter, such as Contains or Does Not Contain. c. Supply the specific information to apply to the filter, such as the time, a string, or one or more IP addresses. Table 9-23 Cisco Prime Network Events Filter Events Options Field Description Severity Severities to be included in the filter. General Event ID Event identifier to apply to the filter. Description String to include or exclude. 9-24 Cisco Prime Network 3.10 User Guide OL-26486-01 Chapter 9 Tracking Faults Using Prime Network Events Working with Cisco Prime Network Events Step 3 Click OK to save your filter settings and apply the filter. The filtered entries are displayed in the list according to the defined criteria. Removing Filters To remove a filter: Step 1 Click Filter in the main toolbar. Step 2 In the Filter Events dialog box, click Clear. The selected options in the Filter Events dialog box are cleared. Step 3 Click OK. All events are displayed in the list. Location Network elements to include. This field is not displayed for Audit events. Time Beginning and ending dates and times to apply to the filter. Network Events Advanced Options Alarm ID Alarm identifier to apply to the filter. Causing Event ID Identifier of the causing event to apply to the filter. Ticket ID Ticket identifier to apply to the filter. Duplication Count Duplication count value to use for filtering. Reduction Count Reduction count value to use for filtering. Archived Archive status to use for filtering: True or False. System Events Advanced Options Command Name String in the command name to use for filtering. Command Signature String in the command signature to use for filtering. Command Parameters String in a command parameter to use for filtering. Originating IP Originating IP address to include or exclude from filtering. Status Status to use for filtering: Configuring, Fail, Success, or Unknown. User Name String in the username to use for filtering. Table 9-23 Cisco Prime Network Events Filter Events Options (continued) Field Description 9-25 Cisco Prime Network 3.10 User Guide OL-26486-01 Chapter 9 Tracking Faults Using Prime Network Events Working with Cisco Prime Network Events Exporting Displayed Data Cisco Prime Network Events enables you to export the currently displayed data from the Cisco Prime Network Events table according to the criteria defined in the Cisco Prime Network Events Options dialog box. You can then import and view at a later time. To export a table to a file: Step 1 Choose File > Export. Step 2 In the Export Table to File dialog box, browse to the directory where you want to save the list. Step 3 In the File name field, enter a name for the list. Step 4 Click Save. The displayed events list or rows are saved in the selected directory. 9-26 Cisco Prime Network 3.10 User Guide OL-26486-01 Chapter 9 Tracking Faults Using Prime Network Events Working with Cisco Prime Network Events CHAPTER 10-1 Cisco Prime Network 3.10 User Guide OL-28065-01 10 Working with Tickets in Cisco Prime Network Vision These topics describe how to work with tickets in Prime Network Vision: • What are Tickets?, page 10-1 • User Roles Required to Work with Tickets in Prime Network Vision, page 10-1 • Viewing Tickets and Network Events for Elements in a Map, page 10-3 • Viewing Ticket Properties, page 10-10 • Managing Tickets, page 10-19 • Impact Analysis in Prime Network, page 10-22 What are Tickets? A ticket represents the complete hierarchy of correlated alarms representing a single specific fault scenario. A ticket points to the root cause alarm that is the top-most alarm in the correlation hierarchy. Examples of alarms are Link Down, Device Unreachable, or Module Out. Some event types are capable of creating tickets. When an event is generated, it is correlated to an existing event, which is correlated to a ticket. If there is no existing ticket, a new ticket is created. Prime Network identifies the relationship between a root cause alarm and its consequent alarms. It automatically correlates the consequent alarms as children of the root alarm. The ticket pane displays the ticket (the root cause alarm), the aggregated severity of the ticket, and the severity of the root cause alarm. The root cause alarm severity is the top-most severity of its contained alarms. In addition, the ticket pane displays the time at which the original event was detected, the ticket creation time, and a description of the event that caused the ticket creation. User Roles Required to Work with Tickets in Prime Network Vision This topic identifies the roles that are required to work with tickets in Prime Network Vision. Prime Network determines whether you are authorized to perform a task as follows: • For GUI-based tasks (tasks that do not affect elements), authorization is based on the default permission that is assigned to your user account. 10-2 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 10 Working with Tickets in Cisco Prime Network Vision User Roles Required to Work with Tickets in Prime Network Vision • For element-based tasks (tasks that do affect elements), authorization is based on the default permission that is assigned to your account. That is, whether the element is in one of your assigned scopes and whether you meet the minimum security level for that scope. For more information on user authorization, see the topic on device scopes in the Cisco Prime Network 3.10 Administrator Guide. The following conditions apply when working with tickets in Prime Network Vision: • If an element that is outside of your scope is the root cause of a ticket that affects an element in your scope, you can view the ticket in Prime Network Vision, but you will not be able to: – View inventory by clicking the Location hyperlink. – Acknowledge, clear, or remove the ticket. • You can acknowledge, clear, remove, or add notes for a ticket only if you have OperatorPlus or higher permission for the element that holds the root alarm for that ticket. • If the source or contained sources of the ticket are not in your scope, you cannot view the ticket in the ticket table, view ticket properties, or perform actions on the ticket. • If the ticket contains a source that is in your scope, but the source is not the root cause, you can view the ticket in the ticket table and view ticket properties, but you cannot perform actions on the ticket. • If the source of the ticket is in your scope, you can view the ticket in the ticket table, view ticket properties, filter tickets, and perform actions on the ticket. • By default, users with the Administrator role have access to all managed elements and can perform any action on tickets. To change the Administrator user scope, see the topic on device scopes in the Cisco Prime Network 3.10 Administrator Guide. Table 10-1 identifies the roles required to perform the high level tasks: Table 10-1 Default Roles/Permissions Required for Working with Tickets in Prime Network Vision Task Viewer Operator OperatorPlus Configurator Administrator Acknowledge tickets — — X1 1. In addition, the security level for the device scope must be OperatorPlus or higher for the device that holds the root alarm for a ticket. X X Add notes to a ticket — — X1 X X Clear and remove tickets ——X1 X X Clear tickets — — X1 X X Filter tickets X X X X X Find affected elements X X X X X Remove tickets — — X1 X X View ticket properties X X X X X View tickets X X X X X 10-3 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 10 Working with Tickets in Cisco Prime Network Vision Viewing Tickets and Network Events for Elements in a Map Viewing Tickets and Network Events for Elements in a Map The ticket pane, located below the navigation and content panes in the Prime Network Vision window, displays tickets and network events specific to the elements in the currently displayed map (see Figure 10-1). You can view or hide the ticket pane by clicking the arrows displayed below the navigation pane. The ticket pane contains two tabs: • Tickets tab—Lists all the tickets relevant to the elements in the map and allows you to manage them. See Managing Tickets in the Tickets Tab, page 10-4 for details of the information displayed and the actions available from the Tickets tab. • Latest Events tab: – Lists network events that were created for the elements in the map from the time the map was opened. – Shows network events that Prime Network recognizes and is able to process (actionable events). Some of these events might be correlated into tickets. – An hourglass in the Status column indicates that processing of the event is in progress. A check mark indicates that the event has been processed. – If an event has been correlated into a ticket, the ticket ID will appear in the table and you can click the link to access the ticket properties. – Events are removed from the Latest Events tab after 6 hours or when a maximum of 15000 events is reached, in which case the oldest events are removed first. 10-4 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 10 Working with Tickets in Cisco Prime Network Vision Viewing Tickets and Network Events for Elements in a Map Figure 10-1 Prime Network Vision Window Managing Tickets in the Tickets Tab Table 10-2 describes the functions that are available from the Tickets tab in the ticket pane. 1 Menu bar 5 Status bar 2 Toolbar 6 Ticket pane 3 Inventory and map tabs 7 Hide/Display ticket pane 4 Content pane 8 Navigation pane Table 10-2 Ticket Pane Available Functions Function Related Documentation Acknowledge a ticket. Acknowledging a Ticket, page 10-19 Clear a ticket. Clearing a Ticket, page 10-20 Clear and remove a ticket. Clearing and Removing Tickets, page 10-21 Filter and view all tickets that meet specific criteria. Filtering Tickets by Criteria, page 10-8 10-5 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 10 Working with Tickets in Cisco Prime Network Vision Viewing Tickets and Network Events for Elements in a Map Table 10-3 describes the information displayed in the ticket pane. Locate the elements or links affected by the ticket in the map or links view. Finding Affected Elements, page 10-19 Remove a ticket. Removing a Ticket, page 10-20 View all tickets or only the filtered tickets of a selected element. Filtering Tickets by Network Element, page 10-8 View tickets. Viewing Tickets and Network Events for Elements in a Map, page 10-3 View ticket properties, including the history, correlated alarms, severity of the root cause alarm, and affected parties. Viewing Ticket Properties, page 10-10 Table 10-2 Ticket Pane Available Functions (continued) Function Related Documentation Table 10-3 Ticket Information Displayed in the Ticket Pane Field Name Description Severity Severity of alarm, represented by an icon. The icon and its color indicate the alarm severity and thereby the impact of the alarm on the network. For more information about severity, see Map View, page 2-7. • Red—Critical • Orange—Major • Yellow—Minor • Light Blue—Warning • Green—Cleared, Normal, or OK • Medium Blue—Informational • Dark Blue—Indeterminate Ticket ID Ticket identifier, assigned sequentially. Click the hyperlinked entry to view ticket properties, and to acknowledge, clear, or refresh the ticket. For more information, see Chapter 10, “Working with Tickets in Cisco Prime Network Vision.” Notes An icon in this column indicates that a note has been added for the ticket. Click on the icon to read the note and add your own note, if necessary. Last Modification Time Date and time (per the database) that the ticket was last updated. Updates can result from either manual or automatic operations. Root Cause Severity of the root cause alarm, represented by a bell icon. The color indicates the severity of the root cause alarm, as described in the Severity field. Root Event Time Date and time that the event that created the root cause alarm of the ticket was detected. Description Description of the event that caused the ticket creation. Location Entity that triggered the ticket, as a hyperlink that displays the relevant location in the inventory. 10-6 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 10 Working with Tickets in Cisco Prime Network Vision Viewing Tickets and Network Events for Elements in a Map The ticket details in the ticket pane change automatically as new information arrives. For example, Port Down is updated to Port Up. By default, the tickets in the ticket pane are sorted according to the last modification time. The Find field enables you to search for information in the ticket pane table according to the selected column. For more information about the buttons displayed in Prime Network Vision tables and table functionality, see Filtering and Sorting Tabular Content, page 2-40. Understanding Ticket Status The appearance of a ticket displayed in the ticket pane depends on the severity of the ticket and the operations that have been performed on the ticket. Tickets detailed in the ticket pane change when: • A ticket is generated. • A ticket is cleared. • A ticket is acknowledged. • An Up ticket is generated. • A ticket is cleared and removed. • A ticket is removed. • Other properties are updated, such as severity, description, or counters. Acknowledged Whether the ticket is acknowledged or has been modified: Yes, No, or Modified. If the ticket is acknowledged, this field also displays the user who acknowledged the ticket; for example, Yes(root). Creation Time Date and time (per the database) that the ticket was created. Event Count Number of events associated with the ticket. Affected Devices Count Number of devices affected by the ticket, including the sources of the alarm and their subsequent alarms. Duplication Count For network events, the duplication count is calculated by the VNE and pertains only to flapping events. The duplication count represents the number of noncleared events aggregated by the flapping event. For tickets, the duplication count is the sum of the duplication counts of all events that are associated with the root alarm. Reduction Count For network events, the reduction count is calculated by the VNE and pertains only to flapping events. The reduction count represents the number of events that are aggregated by the flapping event. Ticket reduction count is the sum of reduction counts of all the events that are associated to the ticket. The History tab in the Windows Properties window displays one reduction count for each event listed. Alarm Count Total number of alarms associated with the ticket, including the root alarm. Table 10-3 Ticket Information Displayed in the Ticket Pane (continued) Field Name Description 10-7 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 10 Working with Tickets in Cisco Prime Network Vision Viewing Tickets and Network Events for Elements in a Map Generated Ticket Table 10-4 shows an example of the appearance of the ticket pane when a ticket is generated. Cleared Ticket Table 10-5 shows an example of the appearance of the ticket pane when a ticket is cleared. A ticket that has been cleared can be removed from the ticket pane. When a ticket is cleared, its definition automatically changes to acknowledged in the ticket pane and its definition in the Acknowledged column is Acknowledged. Acknowledged Ticket Table 10-6 shows an example of the appearance of the ticket pane when a ticket is acknowledged. When a ticket is acknowledged it can then be cleared and the severity changes to Normal. Note When a ticket with an Information severity is acknowledged, the ticket is automatically removed from the Prime Network gateway and from the ticket pane. Table 10-4 Generated Ticket Icon Severity Ticket ID Short Description Acknowledged Major 27 Port down Yes Table 10-5 Cleared Ticket Icon Severity Ticket ID Short Description Acknowledged Normal 27 Cleared due to Force Clear Yes Table 10-6 Acknowledged Ticket Icon Severity Ticket ID Short Description Acknowledged Major 27 Port up Yes 10-8 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 10 Working with Tickets in Cisco Prime Network Vision Viewing Tickets and Network Events for Elements in a Map Generated Up Ticket The cause of the alarm is fixed; therefore an Up ticket is automatically generated with a Normal severity. Table 10-7 shows an example of the appearance of the ticket pane when an Up ticket is generated. Filtering Tickets by Network Element Prime Network Vision enables you to filter the tickets that are shown in the ticket pane so that you see only the tickets that have the selected network element as the root cause. If the selected network element is alarmed due to an operation that occurred on a different VNE, element, or link, no tickets are displayed. To view tickets that have a specific network element as the root cause, do either of the following: • If the network element icon is at the largest size, click the Filter Tickets button. • Right-click the required network element in the navigation pane or a map and choose Filter Tickets. In response: • The ticket pane displays only the tickets that have the selected network element as the root cause. • The Filter button in the ticket pane toggles to indicate that a filter has been applied. Click Clear Filter in the ticket pane to view all tickets. Filtering Tickets by Criteria Prime Network Vision enables you to define a filter for the tickets displayed in the ticket pane according to various criteria. For example, tickets can be filtered according to the number of affected parties or acknowledged tickets. To define a ticket filter: Step 1 Click Ticket Filter in the ticket pane toolbar. The Ticket Filter dialog box is displayed (Figure 10-2). Table 10-7 Generated Up Ticket Icon Severity Ticket ID Short Description Acknowledged Normal 27 Port up Yes 10-9 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 10 Working with Tickets in Cisco Prime Network Vision Viewing Tickets and Network Events for Elements in a Map Figure 10-2 Ticket Filter Dialog Box Step 2 Specify the filter criteria by using the following steps and the information in Table 10-8: a. Check the check box for each criterion to use for filtering. b. As needed, choose the operator for the filter, such as Contains or Does Not Contain. c. Supply the specific information to apply to the filter, such as the time, a string, or one or more IP addresses. Table 10-8 Prime Network Ticket Filter Options Field Description Severity Severity to be included in the filter. General Ticket ID Ticket identifier to be included or excluded when filtering. Description String in the ticket description to include or exclude. Location Network elements to include. 10-10 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 10 Working with Tickets in Cisco Prime Network Vision Viewing Ticket Properties Step 3 Click OK. The tickets are displayed in the ticket pane according to the defined criteria. Note The Ticket Filter button in the ticket pane toggles to indicate that a filter has been applied. To remove a ticket filter: Step 1 Click Ticket Filter in the ticket pane toolbar. The Ticket Filter dialog box is displayed. Step 2 Click Clear. The selected options in the Ticket Filter dialog box are cleared. Step 3 Click OK. All the tickets are displayed in the ticket pane. Viewing Ticket Properties The properties of a selected ticket can be viewed by displaying the Ticket Properties window. For example, you can view alarm severity, correlated alarms, active alarms, alarm history, or the source of the alarm. In Prime Network Vision, open the Ticket Properties window in one of the following ways: • Open the required map and then double-click the required ticket identifier in the ticket pane. • Open the required map, right-click a ticket in the ticket pane, and choose Properties. Root Event Time Beginning and ending dates and times of the range for the root event time to apply to the filter. Last Modification Time Beginning and ending dates and times of the range for the ticket last modification time to apply to the filter. Creation Time Beginning and ending dates and times of the range for the ticket creation time to apply to the filter. Advanced Acknowledged Ticket acknowledgement status to include in the filter: Acknowledged, Not Acknowledged, or Modified. Event Count Event count value to use for filtering. Affected Devices Count Number of affected devices to use for filtering. Duplication Count Duplication count value to use for filtering. Reduction Count Reduction count value to use for filtering. Alarm Count Alarm count value to use for filtering. Archived Archive status to use for filtering: True or False. Acknowledged By Username of the person who acknowledged the ticket. Cleared By Username of the person who cleared the ticket. Table 10-8 Prime Network Ticket Filter Options (continued) Field Description 10-11 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 10 Working with Tickets in Cisco Prime Network Vision Viewing Ticket Properties Figure 10-3 shows the Ticket Properties window. Figure 10-3 Ticket Properties Window The information displayed in the Ticket Properties window corresponds with the information displayed in the Prime Network Vision ticket pane or the Prime Network Vision window. The ID number displayed in the header corresponds to the ID number of the ticket selected in the ticket pane. The Ticket Properties window contains the following components: • Ticket Properties Toolbar, page 10-12 • Details Tab, page 10-12 • History Tab, page 10-13 • Affected Parties Tab, page 10-14 • Correlation Tab, page 10-17 • Advanced Tab, page 10-18 • Notes Tab, page 10-18 • User Audit Tab, page 10-19 10-12 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 10 Working with Tickets in Cisco Prime Network Vision Viewing Ticket Properties Ticket Properties Toolbar The Ticket Properties window contains the tools described in Table 10-9. Details Tab Table 10-10 describes the information that is displayed in the Details tab about the compiled alarm. Table 10-9 Ticket Properties Window Toolbar Icon Description Acknowledges that the ticket is being handled. The status of the ticket is displayed as true in the ticket pane and in the Ticket Properties dialog box. For more information, see Acknowledged Ticket, page 10-7. If a ticket was acknowledged, and some events were correlated to it afterward, then the ticket is considered to have not been acknowledged. This button is enabled only if the ticket is not acknowledged. Requests the relevant Prime Network system to remove the faulty network element from the Prime Network networking inventory. In addition, it sets the ticket to Cleared severity or status (the icon is displayed in green) and automatically changes the acknowledged status of the ticket to true. For more information, see Cleared Ticket, page 10-7. This button is enabled only if the severity of the alarm is higher than Cleared or Normal. Saves the notes for the selected ticket. This button is enabled only when text is entered in the Notes field of the Notes tab. Table 10-10 Event Properties Window - Details Tab Field Description Ticket ID Ticket identifier. Severity Severity propagated from all the correlated alarms. Description Description of the ticket. Last Modification Time Date and time (per the database) that the ticket was last updated. Updates can result from either manual or automatic operations. Location Entity that triggered the root-cause alarm, as a hyperlink that opens the relevant location. Note If the entity that triggered the alarm is outside your scope, a message is displayed that states you do not have permission to access the selected item. Open Alarms Number of correlated alarms for the ticket that are open, such as 3/4. In this example, four indicates the total number of correlated alarms for the ticket, and three indicates the number of alarms that have not been cleared. Therefore, one alarm has been cleared. 10-13 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 10 Working with Tickets in Cisco Prime Network Vision Viewing Ticket Properties History Tab The History tab enables you to display the history of the ticket, including all the events. Figure 10-4 shows the History tab. Figure 10-4 History Tab Root Event Time Date and time that the event that created the root cause alarm of the ticket was detected. Acknowledged Whether the alarm has been acknowledged: Yes or No. If the alarm is acknowledged, this field also displays the user who acknowledged the alarm; for example, Yes(root). Creation Time Date and time the ticket was created. Details Detailed description of the alarm. Table 10-10 Event Properties Window - Details Tab (continued) Field Description 10-14 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 10 Working with Tickets in Cisco Prime Network Vision Viewing Ticket Properties Table 10-11 describes the information that is displayed in the History tab. Affected Parties Tab The Affected Parties tab displays the service resources (pairs) that are affected by an event, an alarm, or a ticket. When a fault occurs, Prime Network automatically calculates the affected parties and embeds this information in the ticket along with all the correlated faults. You can view a list of all the endpoints that are affected. The Affected Parties tab displays the service resources (affected pairs) that are affected by the ticket. Table 10-11 Ticket Properties Window - History Tab Field Description Severity Severity bell icon, colored according to the severity of the alarm. Event ID Event identifier of the specific alarm. Time Date and time the event was received by the Event Collector. Description Description of the event. Location Entity that triggered the alarm, as a hyperlink that opens the relevant location. Note If the entity that triggered the alarm is outside your scope, a message is displayed that states you do not have permission to access the selected item. Alarm ID Alarm identifier. Ticket ID Ticket identifier. This field appears in the History tab only in Prime Network Events. Causing Event ID Identifier of the causing event for the ticket. Duplication Count For network events, the duplication count is calculated by the VNE and pertains only to flapping events. The duplication count represents the number of noncleared events aggregated by the flapping event. Reduction Count For network events, the reduction count is calculated by the VNE and pertains only to flapping events. The reduction count represents the number of events that are aggregated by the flapping event. Detail panel Long description of the selected event. 10-15 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 10 Working with Tickets in Cisco Prime Network Vision Viewing Ticket Properties Figure 10-5 Affected Parties Tab The Affected Parties tab contains two tables: Source and Destination. Table 10-12 describes the information that is displayed in the Affected Properties tab. Table 10-12 Ticket Properties Window - Affected Parties Tab Field Description Source Table Location Hyperlinked entry to the port with the affected parties. Key Unique value taken from the affected element’s business tag key, if it exists. Name Subinterface (site) name or business tag name of the affected element, if it exists. Type Business tag type. IP Address If the affected element is an IP interface, the IP address of the subinterface site. 10-16 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 10 Working with Tickets in Cisco Prime Network Vision Viewing Ticket Properties When an affected side is selected in the Source table, the Destination table lists all endpoints with services that have been affected between them and the entry selected in the Source table. Note The Affected Parties dialog box occasionally displays entries that start with the word Misconfigured. Entries that start with Misconfigured indicate that the flow has stopped unexpectedly between the source and destination points. An unexpected termination point can be a routing entity, bridge, or VC switching entity. The significant aspects of Misconfigured entries are: - Because the link does not terminate as expected, the link is not actually impacted. - An error might exist in the configuration or status of the termination points. We recommend that you check the configuration and status of the affected termination points. Affected Status (Agg) Status for the affected pair (destination). The same source can be part of multiple pairs, and therefore each pair can have a different affected status. The highest affected status reflects the highest among these. The affected status can be one of the following: • Potential • Real • Recovered • N/A—From the links view, this indicates Not Applicable. Destination Table Location Hyperlinked entry to the port with the affected parties. Key Unique value taken from the affected element’s business tag key, if it exists. Name Subinterface name or business tag name of the affected element, if it exists. Type Business tag type. IP Address If the affected element is an IP interface, the IP address of the subinterface site. Affected Status Status of the affected pair as calculated by the client according to the rules defined in Status Values for Affected Parties, page 10-22. Alarm Clear State For each pair, an indication of the clear state of the alarm: • Cleared—All related alarms for this pair have been cleared. • Not Cleared—One or more alarms for this pair have not been cleared. Table 10-12 Ticket Properties Window - Affected Parties Tab (continued) Field Description 10-17 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 10 Working with Tickets in Cisco Prime Network Vision Viewing Ticket Properties Correlation Tab The Correlation tab displays all the alarms that are correlated to the selected ticket. Figure 10-6 Correlation Tab Table 10-13 describes the information that is displayed in the Correlation tab. Table 10-13 Ticket Properties Window - Correlation Tab Field Description Alarm Correlation Alarms correlated with the ticket. Expand or collapse the branch to display or hide information as needed. The severity displayed is the severity of the root alarm. Short Description Description of the alarm. Location Hyperlinked entry that opens an window displaying the selected node along with the affected parties. Note If the entity that triggered the alarm is outside your scope, a message is displayed that states you do not have permission to access the selected item. 10-18 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 10 Working with Tickets in Cisco Prime Network Vision Viewing Ticket Properties Advanced Tab The Advanced tab displays the following values for the selected ticket: • Duplication Count: – For network events, the duplication count is calculated by the VNE and pertains only to flapping events. The duplication count represents the number of noncleared events aggregated by the flapping event. – For tickets, the duplication count is the sum of the duplication counts of all events that are associated with the root alarm. • Reduction Count: – For network events, the reduction count is calculated by the VNE and pertains only to flapping events. The reduction count represents the number of events that are aggregated by the flapping event. – For tickets, reduction count is the sum of reduction counts of all the events that are associated to the ticket. The History tab in the Ticket Properties window displays one reduction count for each event listed. • Affected Devices—The number of devices affected by the ticket. • Alarm Count—The total number of alarms associated with the ticket, including the root alarm. Notes Tab The Notes tab enables you to add and save notes for the selected ticket. To add text, enter text in the Notes field and click Save Notes. The new text is added to any previously existing text. After you save a note, it appears in the Previous Notes section of the Notes tab, with the name of the user who added the note and the time it was added. If the user is an external user (for example, a Netcool user), the username will be displayed in the following format: “Added by prime-networkUserName (as externalUserName)” The following restrictions apply to the Notes tab: • You can add notes for a ticket only if both of the following conditions are true: – The default permission for your account is OperatorPlus or higher. – The security level for the device scope is OperatorPlus or higher for the device that holds the root alarm for that ticket. • The Notes tab is not available for archived tickets. • The Save Notes button is enabled only when text is entered in the Notes field. • The text cannot be edited or removed once you have saved the notes. Acknowledged Whether or not the root alarm has been acknowledged: Yes or No. Last Event Time Date and time the alarm was last modified. Detail panel Long description of the selected entry. Table 10-13 Ticket Properties Window - Correlation Tab (continued) Field Description 10-19 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 10 Working with Tickets in Cisco Prime Network Vision Managing Tickets User Audit Tab The User Audit tab enables you to see which ticket-related actions were carried out by which users, and when the action took place. If the user is an external user (for example, a Netcool user), the username will be displayed in the following format in the User Name column: “Added by prime-networkUserName (as externalUserName)” The following actions are reported in the User Audit tab: • Acknowledge ticket • Remove ticket (archive) • Clear ticket Managing Tickets The following topics describe how to manage tickets: • Finding Affected Elements, page 10-19 • Acknowledging a Ticket, page 10-19 • Clearing a Ticket, page 10-20 • Removing a Ticket, page 10-20 • Clearing and Removing Tickets, page 10-21 You can acknowledge, clear, remove, or clear and remove a ticket only if both of the following conditions are true: • The default permission for your account is OperatorPlus or higher. • The security level for the device scope is OperatorPlus or higher for the device that holds the root alarm for that ticket. Prime Network automatically clears and removes (archives) tickets with more than 150 associated events, and generates a system notification event regarding the actions taken. For more information about this feature, see the Cisco Prime Network 3.10 Administrator Guide. Finding Affected Elements To locate elements affected by a ticket in Prime Network Vision, right-click the desired ticket in the ticket pane and then choose Find Affected Elements. Depending on the number of affected elements, the results are displayed in one of the following ways: • If only one element is affected, it is highlighted in the navigation pane and the content area. • If multiple elements are affected, they are displayed in the Affected Events window. Acknowledging a Ticket When an alarm occurs, a warning or ticket is displayed in the ticket pane. Prime Network Vision enables you to handle the status of a ticket by acknowledging it. This acknowledges the fault. 10-20 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 10 Working with Tickets in Cisco Prime Network Vision Managing Tickets The change is reported to the Prime Network gateway and all open Prime Network applications. You can acknowledge multiple tickets at the same time. An acknowledged ticket returns to a status of Not Acknowledged when a new event is correlated to it. Note You cannot undo this operation. To acknowledge one or more tickets, select one or more tickets in the ticket pane, and then right-click and choose Acknowledge. For more information, see Understanding Ticket Status, page 10-6. Clearing a Ticket When an alarm occurs, a warning or ticket is displayed in the ticket pane. Prime Network Vision enables you to handle the reported ticket by verifying the report of what is faulty and clearing the faulty network element. The change is reported to the Prime Network gateway and all open Prime Network applications. This operation cannot be reversed. You can clear multiple tickets at the same time. Note Before using Clear and Remove (which might also be available when you right-click a ticket), be sure you understand the results of removing a ticket. Like clearing a ticket, removing a ticket cannot be reversed. See Removing a Ticket, page 10-20. Clearing an open ticket performs the following operations: • For certain network elements, such as cards and links, sends a request to the Prime Network system to remove the faulty network element from the Prime Network networking inventory. • Sets the alarm to Cleared or Normal severity or status by issuing a corresponding Clear alarm. • Automatically sets the alarm severity or status to acknowledged (true). To clear one or more tickets, do one of the following: • Select one or more tickets in the ticket pane, and then right-click and choose Clear. • Double-click a ticket in the ticket pane and click Clear in the Ticket Properties window. For more information, see Understanding Ticket Status, page 10-6. Removing a Ticket When an alarm occurs, a warning or ticket is displayed in the ticket pane. Prime Network Vision enables you to completely remove the ticket and all of its active alarms and business tags. The change is reported to the Prime Network gateway and all instances of Prime Network that are open. In addition, several tickets can be removed at the same time. After a ticket is cleared or an Up alarm occurs, the ticket can be removed. You can remove multiple tickets at the same time. Note This operation cannot be reversed. A ticket that has been removed can be viewed only by using Prime Network Events. 10-21 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 10 Working with Tickets in Cisco Prime Network Vision Managing Tickets Removing a ticket performs the following operations: • For certain network elements, such as cards or links, sends a request to the Prime Network system to remove the faulty network element from the Prime Network networking inventory. • Archives the ticket and active alarms. • Notifies all open instances of Prime Network clients (Prime Network Vision or BQL) that are registered on the ticket that the ticket has been removed and deletes the ticket from the ticket pane. Removing a ticket within seven minutes of its creation results in the following behavior: • New alarms that might be related to the ticket, and should therefore be correlated to it, are not correlated to the original ticket because the ticket has been removed from Prime Network Vision. • Flagging events that are ticketable open new tickets. These new tickets might be delayed and might not be visible in Prime Network Vision for up to seven minutes after the event was created. • Flagging events that are not ticketable are archived. • Clearing events are archived. Note Only tickets with a severity of Cleared, Normal, or Information can be removed. To remove one or more tickets, select the required tickets in the ticket pane, and then right-click and choose Remove. For more information, see Understanding Ticket Status, page 10-6. In addition, an uncleared ticket (which has a severity higher than Cleared or Normal) can be cleared and removed by right-clicking in the ticket pane and choosing Clear and Remove. For more information about the Ticket right-click menu, see Ticket Right-Click Menu, page 2-38. Clearing and Removing Tickets Clearing and removing a ticket: • Approves the reported faulty ticket. • Clears the faulty networking entity from Prime Network Vision. • Archives the ticket. You can clear and remove multiple tickets at the same time. This operation will attempt to modify any ticket which is not being used by other processes, such as a ticket that is being updated with new network events. In order to clear and remove a highly active ticket, you should select only that ticket. That way, the system will wait until it becomes available for an update before removing it. To clear and remove one or more tickets, select the required tickets in the ticket pane, and then right-click and choose Clear and Remove. 10-22 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 10 Working with Tickets in Cisco Prime Network Vision Impact Analysis in Prime Network Impact Analysis in Prime Network Impact analysis enables you to identify the network elements and services that are impacted by a network fault or outage. Prime Network offers two modes of impact analysis: • Automatic impact analysis—When a fault occurs that has been identified as potentially service affecting, Prime Network automatically generates the list of potential and actual service resources that were affected by the fault, and embeds this information in the ticket along with all the correlated faults. Note This applies only to specific alarms. Not every alarm initiates automatic impact analysis. • Proactive impact analysis—Prime Network provides what-if scenarios for determining the possible effect of network failures. This enables on-demand calculation of affected service resources for every link in the network, thus enabling an immediate service availability check and analysis for potential impact and identification of critical network links. Upon execution of the what-if scenario, Prime Network initiates an end-to-end flow that determines all the potentially affected edges. Note Each fault that has been identified as potentially service affecting triggers an impact analysis calculation, even if the fault recurs in the network. Status Values for Affected Parties In automatic mode, the affected parties can be marked with one of the following status values: • Potential—The service might be affected but its actual state is not yet known. • Real—The service is affected. • Recovered—The service has recovered. This state applies only to entries that were marked previously as potentially affected. It indicates only the fact that there is an alternate route to the service, regardless of the service quality level. Initially, Prime Network might identify the services as either potentially or real affected. As time progresses and more information is accumulated from the network, Prime Network updates the information to indicate which of the potentially affected parties are real or recovered. The indications for these states are available through both the API and in the GUI. Note There is no clear state for the affected services when the alarm is cleared. Accumulating Affected Parties During automatic impact analysis, Prime Network automatically calculates the accumulation of affected parties. This information is embedded in the ticket along with all of the correlated faults. In the following example, these alarm types exist in the correlation tree: • Ticket root-cause alarm (Card Out). 10-23 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 10 Working with Tickets in Cisco Prime Network Vision Impact Analysis in Prime Network • An alarm which is correlated to the root cause and has other alarms correlated to it (Link A Down). • An alarm with no other alarms correlated to it (Link B Down and BGP Neighbor Loss). An event sequence is correlated to each of these alarms. Figure 10-7 Correlation Tree Example Prime Network identifies the affected parties for each type of alarm and accumulates the following information: • The affected parties reported on all the events in the alarm event sequence, including flapping alarms. • The affected parties reported on the alarms that are correlated to it. The gathered information includes the accumulation of the affected report of all the events in its own correlation tree. For example, in Figure 10-7: • BGP neighbor loss includes the affected parties of all events in its own event sequence. • Link A Down includes the affected parties of its own event sequence and the accumulated information of the BGP Neighbor Loss event. Accumulating the Affected Parties in an Alarm If two events form part of the same event sequence in a specific alarm, the recurring affected pairs are displayed only once in the Affected Parties tab. If different affected severities are reported for the same pair, the pair is marked with the severity that was reported by the latest event, according to the time stamp. Accumulating the Affected Parties in the Correlation Tree If two or more alarms that are part of the same correlation tree report on the same affected pair of edgepoints and have different affected severities, the recurring affected pairs are displayed only once in the Affected Parties tab. If different affected severities are reported for the same pair, the pair is marked with the highest severity. For example, assume that X and Y are the OIDs of edgepoints in the network, and a service is running between them. Both alarms, Link B Down and BGP Neighbor Loss, report on the pair X < > Y as affected: • Link B Down reports on X < > Y as potentially affected. • BGP Neighbor Loss reports on X < > Y as real affected. Card out | ----- Link A down | | | ------BGP neighbor loss | ----- Link B down Card out | ----- Link A down | | | ------BGP neighbor loss | ----- Link B down 180110 10-24 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 10 Working with Tickets in Cisco Prime Network Vision Impact Analysis in Prime Network The affected severity priorities are: • Real—Priority 1 • Recovered—Priority 2 • Potential—Priority 3 Card Out reports on X < > Y as real, affected only once. Updating Affected Severity over Time In some cases, Prime Network updates the affected severity of the same alarm over time because the effect of the fault on the network cannot be determined until the network has converged. For example, a Link Down alarm creates a series of affected severity updates over time. These updates are added to the previous updates in the system database. In this case, the system provides the following reports: • The first report of a link down reports on X < > Y as potentially affected. • Over time, the VNE identifies that this service is real affected or recovered, and generates an updated report. • The Affected Parties tab of the Ticket Properties dialog box displays the latest severity as real affected. • The Affected Parties Destination Properties dialog box displays both reported severities. This functionality is available only in the link-down scenario in MPLS networks. CHAPTER 11-1 Cisco Prime Network 3.10 User Guide OL-28065-01 11 Working with Reports Cisco Prime Network (Prime Network) provides a Report Manager that enables you to schedule, generate, view, and export reports of the information managed by Prime Network. You can save the generated reports in any of the following formats: PDF, CSV, HTML, XLS, and XML. In addition to a variety of standard reports for events and inventory, you can define reports as required for your environment. The following topics discuss the Report Manager and reports in more detail: • User Roles Required to Manage Reports, page 11-1 • Using the Report Manager, page 11-4 • Report Categories, page 11-11 • Generating Reports, page 11-23 • Scheduling Reports, page 11-39 • Managing Reports, page 11-40 • Defining Report Types, page 11-46 • Managing Report Folders, page 11-46 User Roles Required to Manage Reports This topic identifies the roles that are required to manage reports. Prime Network determines whether you are authorized to perform a task as follows: • For GUI-based tasks (tasks that do not affect elements), authorization is based on the default permission that is assigned to your user account. • For element-based tasks (tasks that do affect elements), authorization is based on the default permission that is assigned to your account. That is, whether the element is in one of your assigned scopes and whether you meet the minimum security level for that scope. For more information on user authorization, see the Cisco Prime Network 3.10 Administrator Guide. 11-2 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 11 Working with Reports User Roles Required to Manage Reports The following tables identify the tasks that you can perform: • Table 11-1 identifies whether you can generate a report if a selected element is not in one of your assigned scopes. • Table 11-2 identifies whether you can generate a report if a selected element is in one of your assigned scopes. • Table 11-3 identifies the tasks you can perform on the reports that you generate. • Table 11-4 identifies the tasks you can perform on the reports that someone else generates. • Table 11-5 identifies the tasks you can perform on report folders. By default, users with the Administrator role have access to all managed elements. To change the Administrator user scope, see the topic on device scopes in the Cisco Prime Network 3.10 Administrator Guide. Table 11-1 Default Permission/Security Level Required for Generating Reports - Element Not in User’s Scope Task Viewer Operator OperatorPlus Configurator Administrator Generate Events Reports • Detailed Network Events Reports — — — — X • Detailed Non-Network Events Reports — — — Partial1 1. A user with the Configurator role can generate Detailed Provisioning Events reports for elements that are in and outside their scope. X • All other events reports — — — — X Generate Inventory Reports — — — — X Generate Network Service Reports — — — — X Table 11-2 Default Permission/Security Level Required for Generating Reports - Element in User’s Scope Task Viewer Operator OperatorPlus Configurator Administrator Generate Events Reports • Detailed Network Events Reports1 1. Detailed Ticket reports include only those tickets that have a root cause alarm associated with an element in the user’s scope. XX X X X • Detailed Non-Network Events Reports — — — Partial2 2. A user with the Configurator role can generate Detailed Provisioning Events reports for elements that are in and outside their scope. X • All other events reports X X X X X Generate Inventory Reports X X X X X Generate Network Service Reports X X X X X 11-3 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 11 Working with Reports User Roles Required to Manage Reports Table 11-3 Default Permission/Security Level Required for Working with Reports You Generate Task Viewer Operator OperatorPlus Configurator Administrator Report Tasks Schedule reports X X X X X Cancel reports X X X X X Delete reports X X X X X Export reports X X X X X Rename reports X X X X X Save reports X X X X X Set report preferences for purging and sharing — — — — X Share/unshare reports X1 1. You can share or unshare reports only if sharing is enabled in Prime Network Administration. X1 X1 X1 X View report properties X X X X X View reports X X X X X Table 11-4 Default Permission/Security Level Required for Working with Reports Another User Generates Task Viewer Operator OperatorPlus Configurator Administrator Report Tasks Schedule reports — — — — X Cancel reports — — — — X Delete reports — — — — X Export reports — — — — X Rename reports — — — — X Save reports — — — — X Set report preferences for purging and sharing — — — — X Share/unshare reports — — — — X View report properties — — — — X View reports — — — — X Table 11-5 Default Permission/Security Level Required for Working with Report Folders Task Viewer Operator OperatorPlus Configurator Administrator Report Folder Tasks Create folders X X X X X Delete folders1 XX X X X Move folders1 XX X X X Rename folders1 XX X X X 11-4 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 11 Working with Reports Using the Report Manager Using the Report Manager The Report Manager is available from Prime Network Vision, Prime Network Events, and Prime Network Administration by choosing Reports > Report Manager. The Report Manager (shown in Figure 11-1) enables you to run standard reports, such as the number of syslogs by device. The Report Manager also enables you to create reports and folders, view previously generated reports, define report types for your use, and organize reports in a manner suited to your environment and needs. Figure 11-1 Report Manager Window View report folder properties X X X X X View report type properties X X X X X 1. You cannot perform this action on system-generated folders, such as the Events Reports folder. Table 11-5 Default Permission/Security Level Required for Working with Report Folders (continued) Task Viewer Operator OperatorPlus Configurator Administrator 1 Menu bar 3 Navigation tree with report types and folders 2 Toolbar 4 Content pane 11-5 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 11 Working with Reports Using the Report Manager Figure 11-2 shows an example of a generated report with a pie chart. Figure 11-2 Sample Report Generated reports contain the following information in the report heading: • Report name • Date, time, and time zone in which the report was generated • Name of user who generated the report Depending on the type of report, the following additional information can appear in the report heading: • Source of the data, such as the fault or alarm database • Time period covered by the report • Number of items included in the report • Any filters or maps applied to the report A report might also include a pie chart. If you hover your mouse cursor over a section in the pie chart, a tooltip displays the information associated with that section, such as IP address, number of events, type of event, or percentage of total events. Note Not all reports include pie charts. In addition, reports that normally include a pie chart do not display a pie chart if the chart exceeds 25 slices. 11-6 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 11 Working with Reports Using the Report Manager Menu Options Table 11-6 describes the menu options available in the Report Manager window. Report Manager Toolbar Table 11-7 identifies the buttons that appear in the Report Manager toolbar. Table 11-6 Report Manager Menu Options Option Description File Menu Exit Exits the Report Manager window. Tools Menu Change User Password Enables you to change the password used when logging into the Prime Network client application suite. The change takes effect the next time you log into the application. Note The administrator can also change a user password in Prime Network Administration. Help Menu Cisco Prime Network Report Manager Help Opens the online help for Prime Network Vision and Prime Network Events. Cisco.com Unavailable. About Cisco Report Manager Displays application information about Prime Network Vision and Prime Network Events. Table 11-7 Report Manager Toolbar Buttons Icon Name Description Run Generates the selected report. Define Report of This Type Enables you to define a report of this type that is suited specifically to your environment. New Folder Creates a new folder. Move Moves one or more folders or reports that you created. 11-7 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 11 Working with Reports Using the Report Manager Navigation Tree The navigation pane displays a tree-and-branch representation of report folders and types of reports. The highest level in the tree displays report folders. The following standard report folders are provided in Report Manager: • Events Reports • Inventory Reports • Network Service Reports Each folder contains the types of reports that are provided with Prime Network and any user-defined reports. For more information on the standard report types, see Table 11-12. When you select an item in the tree, the content pane displays the generated reports as follows: • If you select a folder, the content pane lists all reports that have been generated using any of the report types in that folder. • If you select a report type, the content pane lists all reports that have been generated of that report type. Content Pane The content pane lists all reports generated for the folder or report type selected in the navigation tree. You can double-click a report to view the report in HTML format. Figure 11-3 shows an example of the content pane. Rename Renames a folder that you created. Delete Deletes one or more folders that you created. Delete Report Deletes one or more selected reports. View Displays the selected report in HTML format. Table 11-7 Report Manager Toolbar Buttons (continued) Icon Name Description 11-8 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 11 Working with Reports Using the Report Manager Figure 11-3 Reports Manager Content Pane Table 11-8 describes the information displayed in the content pane for each report. Table 11-8 Reports Manager Content Pane Information Attribute Description Name Name of the report. Double-click the report to view the report in HTML format. Description Brief description of the report. Creation Time Date and time when the report was generated. Type Report type. State State of the report: Running, Done, Canceled, or Failed. For more information about the Failed state, see Generating Reports, page 11-23. Created By User who created the report. Running Time Amount of time it takes for the report to be complete. Size Report size. 11-9 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 11 Working with Reports Using the Report Manager Note Reports are purged from Prime Network after 90 days by default. This setting can be modified by changing the setting in Prime Network Administration. For more information, see the Cisco Prime Network 3.10 Administrator Guide. Right-Click Options Right-click options are available for: • Navigation Pane Folders, page 11-9 • Navigation Pane Reports, page 11-10 • Content Pane Reports, page 11-10 Navigation Pane Folders Table 11-9 describes the options available when you right-click a folder in the navigation pane. Public Availability of the report to other users: • True—The report is available to all users. • False—The report is available to only the user who generated the report and the administrator. Data Source Source of the information for the report: Fault Database, Event Archive, or Network Elements. Table 11-8 Reports Manager Content Pane Information (continued) Attribute Description Table 11-9 Report Manager Navigation Pane Folder Right-Click Options Option Description New Folder Creates a new folder. Delete Deletes a user-defined folder. Rename Renames a user-defined folder. Move Moves a user-defined folder. Properties Displays the Folder Properties window which lists the folder contents. For more information on the Reports Category Properties window, see Viewing Folder and Report Type Properties, page 11-48. 11-10 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 11 Working with Reports Using the Report Manager Navigation Pane Reports Table 11-10 describes the options available when you right-click a report in the navigation pane. Content Pane Reports Table 11-11 describes the options available when you right-click a report in the content pane. Table 11-10 Report Manager Navigation Pane Report Right-Click Options Option Description Run Displays the Run Report dialog box so you can run a report of this type specifically for your environment and adds the generated report to the table in the content pane. Define Report of This Type This option is available only for Cisco-supplied report types. Displays the Define Report dialog box so you can create a report of this type specifically for your environment, and adds the newly defined report to the navigation tree. Delete Deletes a user-defined report. Move Moves a user-defined report. Properties For a standard report type, displays the Reports Type Properties window which includes a brief description of the report and enables you to generate the report. For more information on the Reports Type Properties window, see Viewing Report Properties, page 11-45. For a user-defined report, displays the Edit report dialog box so that you can modify the currently defined settings and generate the report. Table 11-11 Report Manager Content Pane Report Right-Click Options Option Description View As Displays the report in the selected format: • HTML • PDF • CSV • XLS • XML The default option, HTML, is displayed in bold font. For more information on viewing reports, see Viewing and Saving Reports, page 11-41. Rename Renames the selected report. 11-11 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 11 Working with Reports Report Categories Report Categories Prime Network Vision provides reports related to: • Events—See Events Reports, page 11-11. • Inventory—See Inventory Reports, page 11-19. • Network services—See Network Service Reports, page 11-21. Events Reports Prime Network Vision provides the following standard event report types: • General report types, as described in Table 11-12. • Detailed network event reports, as described in Table 11-13. • Detailed non-network event reports, as described in Table 11-14. Share or Unshare Shares the selected reports or limits them to your viewing only. The option toggles between Share and Unshare, as appropriate for the selected reports. By default, the Share and Unshare options are available only to users with administrator access. These options are available to other users only if an administrator has enabled sharing in Prime Network Administration. For more information, see the Cisco Prime Network 3.10 Administrator Guide. Delete Report Deletes the selected reports. Cancel This option is displayed only while the selected report is being generated or queued. Cancels the report that is being generated or is queued. Show Only Selected Rows Displays only the rows that you select. Show All Rows Displays all table rows that meet the current filtering criteria. Properties Displays the Reports Type Properties window, which includes a brief description of the report and enables you to edit its name and description. Table 11-11 Report Manager Content Pane Report Right-Click Options (continued) Option Description 11-12 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 11 Working with Reports Report Categories Table 11-12 Standard Events Report Types Report Name Description Data Source Daily Average and Peak For each day of the specified time period, the peak number and average rate of syslogs and traps for each of the following time periods: • Second • Ten seconds • Minute • Hour • Day Fault database Database Monitoring For regular time intervals: • Number of active tickets • Number of active alarms • Number of active events • Number of unconnected events • Number of auto-archive candidates • Number of notifications • Biggest Ticket ID • Number of event count in the biggest ticket • Actionable Event rate per second • Number of dangling events handled by the integrity process • Number of tickets created by the integrity process Fault Database Devices with the Most Events (By Severity) For the specified number of devices with the most events, the following information for each device for the specified time period: • Severity of the events associated with the device, sorted by severity • Number of events for each severity A pie chart presents the information by device and percentage in a graphical format. Fault database Devices with the Most Events (By Type) For the specified number of devices with the most events, the following information for each device for the specified time period: • Type of events associated with the device • Number of events received for each event type A pie chart presents the information by device and percentage in a graphical format. Fault database 11-13 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 11 Working with Reports Report Categories Devices with the Most Syslogs For the specified number of devices with the most syslogs, the number of syslog messages for each device for the specified time period. You can run this report on the Prime Network fault database or the event archive. A pie chart presents the information by device and percentage in a graphical format. User choice: • Fault database • Event archive Devices with the Most Traps For the specified number of devices with the most traps, the number of traps associated with each device for the specified time period. You can run this report on the fault database or the event archive. A pie chart presents the information by device and percentage in a graphical format. User choice: • Fault database • Event archive Event Reduction Statistics For the specified devices and time period: • Names of those tickets with: – The root cause in the device list – The ticket creation time within the specified period • For each ticket type identified: – Number of tickets of that type – Fewest number of correlated events – Highest number of correlated events – Average number of correlated events Fault database Events Troubleshooting Info Provides the following information: • State—The event condition. • Troubleshooting—The probable cause, action to be taken, and the clearing condition. Fault database Fault DB vs. Event Archive Statistics For each day in the specified time period, the number of each of the following items in the fault database and the event archive: • Syslogs • Traps • Tickets • Correlated events • Uncorrelated events • Nonnetwork events • Network-originated events • Network-originated and service events Fault database and event archive Table 11-12 Standard Events Report Types (continued) Report Name Description Data Source 11-14 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 11 Working with Reports Report Categories Mean Time to Repair For the specified devices and time period: • Names of those tickets with: – The root cause in the device list – The ticket creation time within the specified period • For each ticket type identified: – Whether the tickets were cleared by the user or network – Number of tickets – Minimum time (in seconds) to repair – Maximum time (in seconds) to repair – Average time (in seconds) to repair Note The time to repair is based on the ticket creation time and the time the ticket was last modified. For example, if you acknowledge a ticket after it has been cleared. the acknowledgement time affects the time to repair for that ticket. Fault database Most Common Daily Events For each day in the specified time period: • Specified number of most common tickets, service events, syslogs, and traps • Number of each type of ticket, service event, syslog, and trap • If selected, a pie chart presenting the events by percentage in a graphical format Fault database Most Common Syslogs Most common syslog messages and the number of each for the specified time period and devices. A pie chart presents the information by syslog message and percentage in a graphical format. Fault database Syslog Count Number of syslog messages by type for the specified time period with the times of the first and last occurrences. A pie chart presents the information by syslog message and percentage in a graphical format. Fault database Syslog Count (By Device) For each device, the type and number of each syslog message and the times of the first and last occurrences for each type. A pie chart presents the information by device and percentage in a graphical format. Fault database Syslog Trend (By Severity) For the specified devices, the trend of specified syslog messages in graph format: • By priority • For the specified time period • At the specified intervals Fault database Table 11-12 Standard Events Report Types (continued) Report Name Description Data Source 11-15 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 11 Working with Reports Report Categories Table 11-13 Detailed Network Events Report Types Report Name Description Data Source Detailed Event Count (By Device) For each device, the following information for the specified time period: • For syslogs: – Syslog severities – Number of syslogs per severity – Syslog type – Number of each syslog type • For traps: – Trap severities – Number of traps per severity – Trap type – Number of each trap type • For tickets: – Ticket severities – Number of tickets per severity – Ticket type – Number of each ticket type You can select a maximum of 1000 devices for this report. Fault database Detailed Service Events For each service event of the specified severities, time period, and devices: • Event severity • Event identifier • Timestamp • Brief and detailed descriptions • Device on which the event occurred • Alarm identifier • Ticket identifier • Causing event identifier • Duplication count • Reduction count Fault database 11-16 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 11 Working with Reports Report Categories Detailed Syslogs For each device that is selected, the following information from the event archive for the specified time period: • IP address • Date and time of each syslog, in ascending order • Syslog raw data or description, depending on the data source The maximum number of syslogs retrieved for this report is 250,000. User selection: Event archive or fault database Detailed Tickets For each ticket of the specified severities, time period, and device: • Ticket severity • Ticket identifier • Last modification time • Root event time • Description • Entity that caused the alarm • Whether or not the ticket is acknowledged • Ticket creation time • Event count • Affected devices count • Duplication count • Reduction count • Alarm count Fault database Detailed Traps For each managed device that is selected, the following information for the specified time period: • IP address • Time of trap • SNMP version • Trap description • Generic or device-specific trap OID, if the source is the event archive • Long description, if the data source is the fault database The maximum number of traps retrieved for this report depends on whether the Long Description check box is selected. When checked, a maximum of 30,000 traps are retrieved. When this check box is not checked, a maximum of 100,000 traps are retrieved for this report. User Selection: Event archive or fault database Table 11-13 Detailed Network Events Report Types (continued) Report Name Description Data Source 11-17 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 11 Working with Reports Report Categories Table 11-14 Detailed Non-Network Events Report Types Report Name Description Data Source Detailed Audit Events For each audit event included in the report for the specified time period, severities, and search criteria: • Event severity • Event identifier • Timestamp • Description • Command name • Command signature • Command parameters • Originating IP address • Username Fault database Detailed Provisioning Events For each provisioning event included in the report for the specified time period, severities, and search criteria: • Event severity • Event identifier • Timestamp • Description • Location • Username • Device username • Status Fault database 11-18 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 11 Working with Reports Report Categories Detailed Security Events For each security event included in the report for the specified time period, severities, and search criteria: • Event severity • Event identifier • Timestamp • Description • Location • Username • Originating IP address Fault database Detailed System Events For each system event included in the report for the specified time period, severities, and search criteria: • Event severity • Event identifier • Timestamp • Description • Location Fault database Table 11-14 Detailed Non-Network Events Report Types (continued) Report Name Description Data Source 11-19 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 11 Working with Reports Report Categories Inventory Reports Table 11-15 describes the standard inventory report types provided by Prime Network Vision and the data source. Table 11-15 Standard Inventory Report Types Report Name Description Data Source Hardware Detailed For each device included in the report: • IP address • Device series • Element type You can view other hardware information for each device by selecting the required items from the available list as given below: • Chassis—chassis description, chassis serial number, shelf description, shelf serial number, and shelf status • Module—module name, sub module name, module status, hardware type, and hardware version • Port—port location, port type, porting sending alarm, port alias, port status, port managed, PID, and pluggable type serial number. Network elements Hardware Summary For each device included in the report: • IP address • System name • Serial number • Element type • Device series • Vendor • Product • Chassis You can group the report contents by vendor, product, device series, element type, system name, or chassis and specify part or whole of the selected entity, if required. Network elements 11-20 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 11 Working with Reports Report Categories IOS-XR Software Package Summary For each device included in the report: • Device name • Element type • IP address • Serial number • Cisco IOS XR software version • For each software package installed on the device: – Storage location – Software package name – Module name – Software package state: Active or Inactive Network elements Modules Summary (By Type) For each device filtered by module type: • IP address • Module serial number • Module hardware version • Module software version You can filter the report contents by specifying part or whole of the module type. Network elements Software Summary (By Device) For each device included in the report: • Device name • Element type • IP address • Serial number • Software version on the device • Name of image file Network elements Software Summary (By Version) For each software version included in the report: • Number of devices running the version • Device names • Element types • Device IP address • Device serial number • Name of image file Network elements Table 11-15 Standard Inventory Report Types (continued) Report Name Description Data Source 11-21 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 11 Working with Reports Report Categories Network Service Reports Table 11-16 describes the standard network service report types provided by Prime Network Vision and the data source. Table 11-16 Standard Network Service Report Types Report Name Description Data Source Ethernet Service Detailed For each Ethernet service in the report: • Ethernet service or Layer 2 VPN name • Business tag assigned to the Ethernet service or Layer 2 VPN instance • EVC name • Business tag assigned to the EVC • Maps containing the Ethernet service or Layer 2 VPN • Edge EFPs associated with the EVC or Layer 2 VPN • EFD fragment names • EFD fragment type You can filter report content by specifying part or all of the: • Ethernet service name • EVC name • Ethernet service business tag • EVC business tag • Map name Fault database Ethernet Service Summary For each Ethernet service in the report: • Ethernet service or Layer 2 VPN name • Business tag assigned to the Ethernet service or Layer 2 VPN instance • EVC name • Business tag assigned to the EVC • Maps containing the Ethernet service or Layer 2 VPN You can filter report content by specifying part or all of the: • Ethernet service name • EVC name • Ethernet service business tag • EVC business tag • Map name Fault database 11-22 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 11 Working with Reports Report Categories Network Pseudowire Detailed For each network pseudowire in the report: • Pseudowire name • Pseudowire type • Business tag assigned to the pseudowire • Maps containing the pseudowire • Pseudowire details • Type of pseudowire, such as pseudowire edge, Ethernet flow point, or switching entity You can filter report content by specifying part or all of the: • Pseudowire name • Pseudowire type • Business tag • Map name Fault database Network Pseudowire Summary For each network pseudowire in the report: • Pseudowire name • Pseudowire type • Business tag assigned to the pseudowire • Maps containing the pseudowire You can filter the report content by specifying part or all of the: • Pseudowire name • Pseudowire type • Business tag • Map name Fault database Table 11-16 Standard Network Service Report Types (continued) Report Name Description Data Source 11-23 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 11 Working with Reports Generating Reports Generating Reports You can generate reports in any of the following ways: • Generating Reports from Report Manager, page 11-24 • Generating Reports from the Reports Menu, page 11-38 • Generating Reports from Prime Network Vision, page 11-39 You can generate reports only for devices that are within your scope. Note Report Manager generates reports up to 150 MB in size. If you generate a report that exceeds this limit: • Report Manager window displays Failed in the State column. • An error message is entered in the log stating that the report failed because the resulting output is too large. To run the report successfully, enter more specific report criteria or limit the time period covered by the report. VPLS Detailed For each VPLS or H-VPLS instance in the report: • VPLS or H-VPLS name • Business tag associated with the VPLS or H-VPLS instance • Maps containing the VPLS or H-VPLS instance • VPLS details • Type of VPLS service, such as VPLS forward, access EFP, or core pseudowire You can filter report content by specifying part or all of the: • VPLS or H-VPLS name • Business tag • Map name Fault database VPLS Summary For each VPLS or H-VPLS instance in the report: • VPLS or H-VPLS name • Business tag assigned to the VPLS or H-VPLS instance • Maps containing the VPLS or H-VPLS instance You can filter report content by specifying part or all of the: • VPLS or H-VPLS name • Business tag • Map name Fault database Table 11-16 Standard Network Service Report Types (continued) Report Name Description Data Source 11-24 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 11 Working with Reports Generating Reports Database Load and Report Generation If you generate reports while Prime Network Vision is working under a database load, the reports move to a Load mode which is indicated by a system event. While Prime Network Vision is in Load mode, the reports currently running are cancelled and new reports are queued. After Prime Network Vision returns to normal operation and is no longer operating under a load, a new system event is generated and the queued reports start running. Report Generation Failure If a report fails to generate successfully, the State column contains the word Failed. Click Failed to view the reason for the failure. A window is displayed with the cause of the failure, such as The disk space allocated for report storage is full or AVM 84 was restarted while the report was running. Report Generation Canceled If a report is canceled before it completes, the State column contains the word Canceled. Click Canceled to view the reason for the cancellation. A window is displayed with the cause of the cancellation, such as The report was canceled by user or The report was canceled by the system to prevent system overload. Generating Reports from Report Manager Prime Network Vision provides three report categories as described in Report Categories, page 11-11. The information that you need to provide when generating a report depends on the report type. The following topics describe the information required to generate each report type: • Generating Events Reports, page 11-24 • Generating Inventory Reports, page 11-32 • Generating Network Service Reports, page 11-35 Note You can generate reports only for devices that are within your scope. Generating Events Reports To generate an events report using Report Manager: Step 1 In Prime Network Vision, Prime Network Events, or Prime Network Administration, choose Reports > Report Manager. Step 2 In the Report Manager window, choose Events Reports > report-type. For information on the reports available for events, see Table 11-12. Step 3 Generate the report by right-clicking the report type, then choosing Run. The Run Report dialog box is displayed. An example is shown in Figure 11-4. The fields displayed in the Run Report dialog box vary depending on the type of report. 11-25 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 11 Working with Reports Generating Reports Figure 11-4 Events Report - Run Report Dialog Box Step 4 In the Run Report dialog box, specify the report settings as follows: • For standard events reports, use the information in Table 11-17. • For detailed network reports, use the information in Table 11-18. • For detailed non-network reports, use the information in Table 11-19. 11-26 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 11 Working with Reports Generating Reports Table 11-17 Events Report - Run Report Dialog Box Fields Option Description Report Settings Report Name Enter a unique name for the report, from 1 to 150 characters in length. Report names cannot include the following characters: ;?<>/:\"#*|. Description Enter a brief description of the report. Report Security This field is displayed only if report sharing is enabled in Prime Network Administration. Indicate the level of security for the report by clicking the appropriate option: • Private—The report can be viewed and used only by the report creator and the administrator. • Public—The report can be viewed and used by all other users, regardless of whether the devices are listed in the report are in the user’s scope. Note You can share reports with others only if sharing is enabled in Prime Network Administration. For more information, see the Cisco Prime Network 3.10 Administrator Guide. Display n This field does not appear for all reports. Enter the number of items to be displayed in the generated report. Data Source This field does not appear for all reports. Select the source of information to use for the report: Fault Database or Event Archive. Include pie charts in report output This field does not appear for all reports. Check the check box to view pie charts in the report with the standard numerical output. Date Selection Last Specify the length of time before the current date and time, and the unit of measure: seconds, minutes, hours, days, weeks, or months. From Date To Date Specify the date range for the report: 1. Click From Date. 2. In the From date field, enter the start date for the time period, or click the drop-down arrow to select the start date from a calendar. 3. Enter a time for the start date, using the format HH MM SS. 4. In the To Date field, enter the end date for the time period, or click the drop-down arrow to select the end date from a calendar. 5. Enter a time for the end date, using the format HH MM SS. 11-27 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 11 Working with Reports Generating Reports Device Selection Select Devices Note • You can add only those devices that are within your scope. • A user with the Administrator role can select unmanaged devices (by IP address) for reports that run on the Event Archive. Select devices to include in the report: 1. Click Select Devices. 2. Click Add. 3. In the Add Network Element dialog box, select devices using either of the following methods: – To select devices that meet specific criteria, click Search and enter the required criteria. – To select from all network elements, click Show All. 4. In the list of displayed elements, select the network elements that you want to include in the report. You can select multiple network elements at a time. 5. Click OK. All Devices This field does not appear for all reports. Click All Devices to include all devices in your scope in the report. Syslog Trend (by Severity) Report—Additional Report Specifications Intervals In the Grouped by drop-down list, choose the unit of time to use for tracking the trend: Seconds, Minutes, Hours, or Days. Severity Check the check boxes of the syslog message severities to be included in the report: All, Critical, Major, Minor, Warning, Cleared, Information, and Indeterminate. Syslog Messages Specify the syslog messages to be included in the report: • To include selected syslog messages in the report, in the list of syslog messages on the left, select the required syslog messages, and then click Add Selected to move them to the list of syslog messages on the right. • To include all syslog messages in the report, click Add All. To find syslog messages that match a string, enter the string in the Find field. The list of syslog messages is automatically updated to include only those messages that contain the string you enter. Click the Sort Order button to sort the syslog messages in alphabetic or reverse alphabetic order. Table 11-17 Events Report - Run Report Dialog Box Fields (continued) Option Description 11-28 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 11 Working with Reports Generating Reports Table 11-18 Detailed Network Events Reports - Run Report Dialog Box Fields Option Description Report Settings Report Name Enter a unique name for the report, from 1 to 150 characters in length. Report names cannot include the following characters: ;?<>/:\"#*|. Description Enter a brief description of the report. Report Security This field is displayed only if report sharing is enabled in Prime Network Administration. Indicate the level of security for the report by clicking the appropriate option: • Private—The report can be viewed and used only by the report creator and the administrator. • Public—The report can be viewed and used by all other users, regardless of whether the devices are listed in the report are in the user’s scope. Note You can share reports with others only if sharing is enabled in Prime Network Administration. For more information, see the Cisco Prime Network 3.10 Administrator Guide. Data Source This field does not appear for all reports. Select the source of information to use for the report: Fault Database or Event Archive. Date Selection Last Specify the length of time before the current date and time, and the unit of measure: seconds, minutes, hours, days, weeks, or months. From Date To Date Specify the date range for the report: 1. Click From Date. 2. In the From date field, enter the start date for the time period, or click the drop-down arrow to select the start date from a calendar. 3. Enter a time for the start date, using the format HH MM SS. 4. In the To Date field, enter the end date for the time period, or click the drop-down arrow to select the end date from a calendar. 5. Enter a time for the end date, using the format HH MM SS. 11-29 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 11 Working with Reports Generating Reports Device Selection Select Devices Note • You can add only those devices that are within your scope. • A user with the Administrator role can select unmanaged devices (by IP address) for reports that run on the Event Archive. • The Detailed Event Count (by device) report accepts a maximum of 1000 devices. Select devices to include in the report: 1. Click Select Devices. 2. Click Add. 3. In the Add Network Element dialog box, select devices using either of the following methods: – To select devices that meet specific criteria, click Search and enter the required criteria. – To select from all network elements, click Show All. 4. In the list of displayed elements, select the network elements that you want to include in the report. You can select multiple network elements at a time. 5. Click OK. All Devices This field does not appear for all reports. Click All Devices to include all devices in your scope in the report. Severity Severity This field does not appear for all reports. Check the check boxes of the syslog message severities to be included in the report: All, Critical, Major, Minor, Warning, Cleared, Information, and Indeterminate. Detailed Service Events Report—Additional Report Specifications Description Contains Enter the string that the service event must contain to be included in the report. Detailed Syslogs Report—Additional Report Specifications Syslogs Description This field is displayed if you choose Fault DB for the data source. In the Description Contains field, enter the string that the syslog must contain to be included in the report. Syslogs Raw Data This field is displayed if you choose Event Archive for the data source. In the Raw Data Contains field, enter the string that the syslog raw data must contain to be included in the report. Table 11-18 Detailed Network Events Reports - Run Report Dialog Box Fields (continued) Option Description 11-30 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 11 Working with Reports Generating Reports Detailed Traps Report—Additional Report Specifications Traps Detailed Description In the Description Contains field, enter the string that the trap must contain to be included in the report. Long Description This option is enabled if you choose Fault DB for the data source. 1. Check the Show Long Description check box to include the long description in the report. 2. In the Long Description Contains field, enter the string that the long description must contain to be included in the report. SNMP Version Specify the SNMP versions to include in the report: All, 1, 2, or 3. Generic This option is enabled if you choose Event Archive for the data source. Specify the generic traps to include in the report: 1. Select the generic traps to include in the report: – All—Include all generic traps – 0—coldStart – 1—warmStart – 2—linkDown – 3—linkUp – 4—authenticationFailure – 5—egpNeighborLoss – 6—enterpriseSpecific 2. If you select generic type 6, enter the OIDs (comma separated) in the Vendor Specific field. The Vendor Specific field accepts a maximum of 125 digits. Table 11-18 Detailed Network Events Reports - Run Report Dialog Box Fields (continued) Option Description 11-31 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 11 Working with Reports Generating Reports Table 11-19 Detailed Non-Network Events Reports - Run Report Dialog Box Fields Option Description Report Settings Report Name Enter a unique name for the report, from 1 to 150 characters in length. Report names cannot include the following characters: ;?<>/:\"#*|. Description Enter a brief description of the report. Report Security This field is displayed only if report sharing is enabled in Prime Network Administration. Indicate the level of security for the report by clicking the appropriate option: • Private—The report can be viewed and used only by the report creator and the administrator. • Public—The report can be viewed and used by all other users, regardless of whether the devices are listed in the report are in the user’s scope. Note You can share reports with others only if sharing is enabled in Prime Network Administration. For more information, see the Cisco Prime Network 3.10 Administrator Guide. Date Selection Last Specify the length of time before the current date and time, and the unit of measure: seconds, minutes, hours, days, weeks, or months. From Date To Date Specify the date range for the report: 1. Click From Date. 2. In the From date field, enter the start date for the time period, or click the drop-down arrow to select the start date from a calendar. 3. Enter a time for the start date, using the format HH MM SS. 4. In the To Date field, enter the end date for the time period, or click the drop-down arrow to select the end date from a calendar. 5. Enter a time for the end date, using the format HH MM SS. Severity Severity Check the check boxes of the syslog message severities to be included in the report: All, Critical, Major, Minor, Warning, Cleared, Information, and Indeterminate. Detailed Audit Events Report—Additional Report Specifications Description Contains Enter the string that the event must contain to be included in the report. Command Name Contains Enter the string that the command name must contain to be included in the report. Originator IP Contains Enter the string that the originating IP address must contain to be included in the report. User Name Contains Enter the string that the username must contain to be included in the report. 11-32 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 11 Working with Reports Generating Reports Step 5 To schedule a report to run immediately or at a later point in time, click the Scheduling tab. For more information, see Scheduling Reports, page 11-39. Step 6 Click OK. The report appears in the table in the content pane with a state of Running, if the report is scheduled to run immediately, or Scheduled, if the report is scheduled to run at a later point in time. When the report is complete, the state changes to Done. You can view the reports when the state is Done. Occasionally, some report formats require additional time for generation. If so, a progress bar is displayed, indicating that the report is being created and will be available soon. If the report exceeds 150 MB, the state changes to Failed and an error message is written to the log. We recommend running the report with more specific criteria or a shorter time period to avoid this situation. If no data is found for the report, the report states that no results were found. Generating Inventory Reports To generate an inventory report using Report Manager: Step 1 In Prime Network Vision, Prime Network Events, or Prime Network Administration, choose Reports > Report Manager. Step 2 In the Report Manager window, choose Inventory Reports > report-type. For information on the standard reports available for inventory, see Table 11-15. Step 3 Right-click the report type, then choose Run. The Run Report dialog box is displayed as shown in Figure 11-5. Detailed Provisioning Events Report—Additional Report Specifications Description Contains Enter the string that the trap must contain to be included in the report. User Name Contains Enter the string that the username must contain to be included in the report. Status Choose the statuses to be included in the report: All, Unknown, Configuring, Success, and Fail. Detailed Security Events Report—Additional Report Specifications Description Contains Enter the string that the event must contain to be included in the report. Originator IP Contains Enter the string that the originating IP address must contain to be included in the report. User Name Contains Enter the string that the username must contain to be included in the report. Detailed System Events Report—Additional Report Specifications Description Contains Enter the string that the event must contain to be included in the report. Table 11-19 Detailed Non-Network Events Reports - Run Report Dialog Box Fields (continued) Option Description 11-33 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 11 Working with Reports Generating Reports Figure 11-5 Inventory Report - Run Report Dialog Box Step 4 Enter the required information in the Run Report dialog box as described in Table 11-20. Table 11-20 Inventory Report - Run Report Dialog Box Fields Field Description Report Settings Report Name Enter a unique name for the report, from 1 to 150 characters in length. Report names cannot include the following characters: ;?<>/:\"#*|. Description Enter a brief description of the report. 11-34 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 11 Working with Reports Generating Reports Step 5 To schedule a report to run immediately or at a later point in time, click the Scheduling tab. For more information, see Scheduling Reports, page 11-39. Step 6 Click OK. The report appears in the table in the content pane with a state of Running, if the report is scheduled to run immediately, or Scheduled, if the report is scheduled to run at a later point in time. When the report is complete, the state changes to Done. You can view the reports when the state is Done. Occasionally, some report formats require additional time for generation. If so, a progress bar is displayed, indicating that the report is being created and will be available soon. If the report exceeds 150 MB, the state changes to Failed and an error message is written to the log. We recommend running the report with more specific criteria or a shorter time period to avoid this situation. If no data is found for the report, the report states that no results were found. Report Security This field is displayed only if report sharing is enabled in Prime Network Administration. Indicate the level of security for the report by clicking the appropriate option: • Private—The report can be viewed and used only by the report creator and the administrator. • Public—The report can be viewed and used by all other users, regardless of whether the devices are listed in the report are in the user’s scope. Note You can share reports with others only if sharing is enabled in Prime Network Administration. For more information, see the Cisco Prime Network 3.10 Administrator Guide. Device Selection Select Devices Note You can add only those devices that are within your scope. Select devices to include in the report: 1. Click Select Devices. 2. Click Add. 3. In the Add Network Element dialog box, select devices using either of the following methods: – To select devices that meet specific criteria, click Search and enter the required criteria. – To select from all network elements, click Show All. 4. In the list of displayed elements, select the network elements that you want to include in the report. You can select multiple network elements at a time. 5. Click OK. All devices Click All Devices to include all devices in your scope in the report. Table 11-20 Inventory Report - Run Report Dialog Box Fields (continued) Field Description 11-35 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 11 Working with Reports Generating Reports Generating Network Service Reports If you generate a detailed network service report on a large-scale setup, a message is displayed in the Run Report dialog box recommending that you apply a filter to limit the size of the report. To generate a network service report using Report Manager: Step 1 In Prime Network Vision, Prime Network Events, or Prime Network Administration, choose Reports > Report Manager. Step 2 In the Report Manager window, choose Network Service Reports > report-type. For information on the standard reports available for network services, see Table 11-16. Step 3 Right-click the report type, then choose Run. The Run Report dialog box is displayed as shown in Figure 11-6. Figure 11-6 Network Service Report - Run Report Dialog Box 11-36 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 11 Working with Reports Generating Reports Step 4 Enter the required information the Run Report dialog box as described in Table 11-21. Table 11-21 Network Service Report - Run Report Dialog Box Fields Field Description Report Settings Report Name Enter a unique name for the report, from 1 to 150 characters in length. Report names cannot include the following characters: ;?<>/:\"#*|. Description Enter a brief description of the report. Report Security This field is displayed only if report sharing is enabled in Prime Network Administration. Indicate the level of security for the report by clicking the appropriate option: • Private—The report can be viewed and used only by the report creator and the administrator. • Public—The report can be viewed and used by all other users, regardless of whether the devices are listed in the report are in the user’s scope. Note You can share reports with others only if sharing is enabled in Prime Network Administration. For more information, see the Cisco Prime Network 3.10 Administrator Guide. Ethernet Service Reports—Report Contents Define Filter Check the Define Filter check box to enter criteria that must be matched for inclusion in the report. You can specify match criteria in any or all of the following fields. Ethernet Service Name Contains Enter a string that must appear in the Ethernet service name for the Ethernet service to be included in the report. EVC Name Contains Enter a string that must appear in the EVC name for the EVC to be included in the report. Ethernet Service Business Tag Contains Enter a string that must appear in the Ethernet service business tag for the Ethernet service to be included in the report. EVC Business Tag Contains Enter a string that must appear in the EVC business tag for the EVC to be included in the report. Maps Specify the maps to include in the report: • To include specific maps in the report, in the list of maps on the left, select the required maps, and then click Add Selected to move them to the list of maps on the right. • To include all maps in the report, click Add All. To find maps that match a string, enter the string in the Find field. The list of maps is automatically updated to include only those maps that contain the string you enter. Click the Sort Order button to sort the maps alphabetically or in reverse alphabetic order. 11-37 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 11 Working with Reports Generating Reports Step 5 To schedule a report to run immediately or at a later point in time, click the Scheduling tab. For more information, see Scheduling Reports, page 11-39. Network Pseudowire Reports—Report Contents Define Filter Check the Define Filter check box to enter criteria that must be matched for inclusion in the report. You can specify match criteria in any or all of the following fields. Network Pseudowire Name Contains Enter a string that must appear in the network pseudowire name for the pseudowire to be included in the report. Network Pseudowire Type In the drop-down list, choose the type of network pseudowire to be included in the report. Network Pseudowire Business Tag Contains Enter a string that must appear in the network pseudowire business tag for the pseudowire to be included in the report. Maps Specify the maps to include in the report: • To include specific maps in the report, in the list of maps on the left, select the required maps, and then click Add Selected to move them to the list of maps on the right. • To include all maps in the report, click Add All. To find maps that match a string, enter the string in the Find field. The list of maps is automatically updated to include only those maps that contain the string you enter. Click the Sort Order button to sort the maps alphabetically or in reverse alphabetic order. VPLS Reports—Report Contents Define Filter Check the Define Filter check box to enter criteria that must be matched for inclusion in the report. You can specify match criteria in any or all of the following fields. VPLS Name Contains Enter a string that must appear in the VPLS name for the VPLS or H-VPLS to be included in the report. VPLS Business Tag Contains Enter a string that must appear in the VPLS business tag for the VPLS or H-VPLS to be included in the report. Maps Specify the maps to be included in the report: • To include specific maps in the report, in the list of maps on the left, select the required maps, and then click Add Selected to move them to the list of maps on the right. • To include all maps in the report, click Add All. To find maps that match a string, enter the string in the Find field. The list of maps is automatically updated to include only those maps that contain the string you enter. Click the Sort Order button to sort the maps alphabetically or in reverse alphabetic order. Table 11-21 Network Service Report - Run Report Dialog Box Fields (continued) Field Description 11-38 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 11 Working with Reports Generating Reports Step 6 Click OK. The report appears in the table in the content pane with a state of Running, if the report is scheduled to run immediately, or Scheduled, if the report is scheduled to run at a later point in time. When the report is complete, the state changes to Done. You can view the reports when the state is Done. Occasionally, some report formats require additional time for generation. If so, a progress bar is displayed, indicating that the report is being created and will be available soon. If the report exceeds 150 MB, the state changes to Failed and an error message is written to the log. We recommend running the report with more specific criteria or a shorter time period to avoid this situation. If no data is found for the report, the report states that no results were found. Generating Reports from the Reports Menu To generate reports quickly and without opening the Reports Manager window, choose Reports > Run Report > folder > report-type. The menus include all standard folders and reports, and any folders or reports that you have created. After entering the required information, you can view the report as soon as it is generated or at a later time. Note You can generate reports only for devices that are within your scope. To generate a report from the Reports menu: Step 1 Choose Reports > Run Report > folder > report-type where: • folder is the required folder. • report-type is the required type of report. Step 2 In the Run Report dialog box, enter the required information. For more information on the options in the Run Report dialog box, see Generating Reports, page 11-23. Step 3 To schedule a report to run immediately or at a later point in time, click the Scheduling tab. For more information, see Scheduling Reports, page 11-39. Step 4 Click OK. Step 5 In the Running Report dialog box, select the required viewing options: a. Check the Open Report Manager to monitor status check box to open the Report Manager window so that you can view the report generation process. Uncheck the check box to proceed without opening the Report Manager window. b. Check the View report immediately upon completion check box to view the report as soon as it is generated. If you enable this option, the report is displayed in HTML format as soon as it is complete. Uncheck the check box to view the report at a later time by using Report Manager. Step 6 Click OK. Depending on your selections in Step 5, the Report Manager window is displayed, the report is displayed, or the report is available for viewing at a later time. 11-39 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 11 Working with Reports Scheduling Reports Generating Reports from Prime Network Vision Prime Network Vision enables you to run reports on selected devices from the map and list views. Note You can generate reports only for devices that are within your scope. To generate a report from Prime Network Vision: Step 1 In Prime Network Vision, select the required devices in the map or list view. Step 2 In the navigation tree or content pane, right-click the selected devices, then choose Run Report > folder > report-type. Step 3 In the Run Report dialog box, enter the required information as described in Generating Reports, page 11-23. The devices that you select in the navigation pane or content pane are automatically included in the report. Step 4 To schedule a report to run immediately or at a later point in time, click the Scheduling tab. For more information, see Scheduling Reports, page 11-39. Step 5 Click OK. Step 6 In the Running Report dialog box, specify the desired viewing options: a. Check the Open Report Manager to monitor status check box to open the Report Manager window so that you can view the report generation process. Uncheck the check box to proceed without opening the Report Manager window. b. Check the View report immediately upon completion check box to view the report as soon as it is generated. If you enable this option, the report is displayed in HTML format as soon as it is complete. Uncheck the check box to view the report at a later time by using Report Manager. Depending on your selections in Step 6, the Report Manager window is displayed, the report is displayed, or the report is available for viewing at a later time. Scheduling Reports Prime Network allows you to schedule a report to run immediately or at a later point in time. To schedule a report: Step 1 In Prime Network Vision, Prime Network Events, or Prime Network Administration, choose Reports > Report Manager. Step 2 In the Report Manager window, choose report-category > report-type. For information on the various report categories and report types, see Report Categories, page 11-11. Step 3 Right-click the report type, then choose Run. The Run Report dialog box is displayed. Step 4 In the Settings tab, specify the required report criteria. For more information on the options in the Run Report dialog box, see Generating Reports, page 11-23. 11-40 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 11 Working with Reports Managing Reports Step 5 Click the Scheduling tab. By default, the Run Now option is selected and the report is scheduled to run immediately. Step 6 To schedule the report for a later date/time: a. Select the Schedule Job radio button. The scheduling options Once and Recurring are enabled. b. To generate the report once, select the Once radio button and specify the date and time when you want the report to be generated. c. To generate the report on a recurring basis, select the Recurring radio button and specify the following: – The date and time range for the recurrence. – How often you want to generate the report within that time range - every X minutes, daily, weekly, or monthly. Step 7 Specify comments, if required and click Schedule. Prime Network creates a report job and executes it according to your scheduling specifications. Go to the Scheduled Jobs page (Tools > Scheduled Jobs), to check that your report job has been created. You can use the Scheduled Jobs page to monitor the job status and to reschedule a job if necessary. You can also clone a scheduled job and edit the report criteria, if required. Managing Reports Prime Network provides the following options for working with reports: • Managing the Maximum Number of Concurrent Reports, page 11-40 • Viewing and Saving Reports, page 11-41 • Renaming Reports, page 11-42 • Sharing Reports, page 11-43 • Moving Reports Between Folders, page 11-44 • Deleting Reports, page 11-44 • Viewing Report Properties, page 11-45 Managing the Maximum Number of Concurrent Reports Prime Network enables you to run multiple reports at the same time. When the maximum number of concurrent reports is running, new report requests are queued for generation and have the status Queued (n) where n is the number in the report queue. When a running report moves to a Completed, Failed, or Cancelled state, the first report in the queue starts running. The maximum number of concurrent reports is set at 5 by default. As the event rate approaches the maximum committed event rate, we recommend that you decrease the maximum number of concurrent reports. The maximum number of concurrent reports is defined in the registry, in reports.xml, under site/reports/reports-setting/reports-running-settings/maxRunningReports. Note Changes to the registry should only be carried out with the support of Cisco. For details, contact your Cisco account representative. 11-41 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 11 Working with Reports Managing Reports To change the maximum number of concurrent reports, use the runRegTool command (located in ANAHOME/Main) as follows: ./runRegTool.sh -gs 127.0.0.1 set 0.0.0.0 site/reports/reports-setting/reports-running-settings/maxRunningReports value where value is the new maximum number of concurrent reports. You do not need to restart any AVMs after entering this command. For more information on the runRegTool command, see the Cisco Prime Network 3.10 Administrator Guide. Viewing and Saving Reports You can view any reports that appear in the Report Manager content pane with the state Done. After viewing a report, you can save it in any of the available formats. Note Reports are purged from Prime Network after 90 days by default. This setting can be modified by changing the setting in Prime Network Administration. For more information, see the Cisco Prime Network 3.10 Administrator Guide. To view and save a report: Step 1 Choose Reports > Report Manager. Step 2 In the navigation pane, locate the required report. Step 3 In the content pane, right-click the report, then choose View As > format where format is one of the following: • HTML—Displays the report in a browser window. Clicking a column heading in the report sorts the report by that value; clicking the column heading again sorts the data in the reverse order. HTML is the default format. • PDF—Displays a PDF version of the report. • CSV—Creates a CSV version of the report that you can either save to a specific location or view using another application. The CSV version contains only the report data; it does not contain the header information, layout, or formatting information that is available in other formats. • XLS—Creates an XLS version of the report that you can either save to a specific location or view using another application, such as Microsoft Excel. • XML—Creates an XML version of the report that you can either save to a specific location or view using an XML editor or viewer. Figure 11-7 is an example of the Most Common Daily Events report in HTML format. The data is sorted by the Count column, in descending order. 11-42 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 11 Working with Reports Managing Reports Figure 11-7 Most Common Daily Events Report Example Step 4 Save the report as required. Renaming Reports You can rename: • Any report type that you defined. • Any generated report that you have access to. You cannot rename any of the Prime Network standard report types. Renaming a User-Defined Report Type Note When you rename a report type, the new name applies to only those reports that you run after changing the name; it does not change the names of reports that were run prior to changing the name. To rename a user-defined report type: Step 1 In the navigation tree, select the user-defined report type. Step 2 Right-click the report type, then choose Properties. 11-43 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 11 Working with Reports Managing Reports Step 3 In the Edit dialog box, enter a new name for the report type in the Report Name field, using the following conventions: • The name can contain 1 to 150 characters. • The name cannot include the following characters: ;?<>/:\"#*|. Step 4 Click OK. The navigation pane is refreshed and the report type is displayed with the new name. Renaming a Generated Report To rename a report: Step 1 Choose Reports > Report Manager. Step 2 In the content pane, right-click the report that you want to rename, then choose Rename or Properties. Step 3 In the Name field, enter the new name for the report, using the following conventions: • The name can contain 1 to 150 characters. • The name cannot include the following characters: ;?<>/:\"#*|. Step 4 Click OK. The content pane is refreshed and the report is displayed with the new name. Sharing Reports Prime Network enables you to share reports that you generate with other users, or limit access to a report to only you and the administrator. Note You can share reports with others only if sharing is enabled in Prime Network Administration. For more information, see the Cisco Prime Network 3.10 Administrator Guide. Sharing a Report To share access to a report that you generated: Step 1 Choose Reports > Report Manager. Step 2 Locate the required report. Step 3 In the content pane, right-click the report that you want to share, then choose Share. The report is available to all system users for viewing and using. 11-44 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 11 Working with Reports Managing Reports Limiting Access to a Report To limit access to a report that you generated and subsequently shared: Step 1 Choose Reports > Report Manager. Step 2 Locate the required report. Step 3 In the content pane, right-click the report that you want to limit access to, then choose Unshare. The report can be viewed and used by only you and the administrator. Moving Reports Between Folders You can move a report type that you have defined from the current folder to another folder in the navigation tree. Note You cannot move a standard report type from one folder to another. To move a report type to a new folder: Step 1 Choose Reports > Report Manager. Step 2 In the navigation tree, select the required report that you have defined. Step 3 Right-click the report, then choose Move. Step 4 In the Move To dialog box, select the folder to which you want to move the report. Step 5 Click OK. The Report Manager window is refreshed and the report appears in the specified folder. Deleting Reports You can delete reports to which you have access. To delete a report: Step 1 Choose Reports > Report Manager. Step 2 Locate the required report. Step 3 In the content pane, select the required report. Step 4 Right-click the report, then choose Delete Report. Step 5 In the Delete Report confirmation window, click Yes to confirm deletion. The Report Manager window is refreshed and the deleted report no longer appears. 11-45 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 11 Working with Reports Managing Reports Viewing Report Properties The Report Properties dialog box enables you to view the report settings and to modify some of them. To view report properties, and optionally change the name, description, or access: Step 1 Choose Reports > Report Manager. Step 2 Locate the required report. Step 3 In the content pane, right-click the selected report, then choose Properties. The Report Properties dialog box is displayed, as shown in Figure 11-8. Figure 11-8 Report Properties Dialog Box Step 4 Change the information in the following fields as required: • Name • Description • Report Security Step 5 Click OK. 11-46 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 11 Working with Reports Defining Report Types Defining Report Types You can modify any of the report types provided by Prime Network so that it better suits your needs and environment. This is extremely beneficial if you generate a particular type of report for specific devices or events on a regular basis. To define a report type: Step 1 Choose Reports > Report Manager. Step 2 In the navigation pane, right-click the existing report type, then choose Define Report of This Type. Step 3 In the Define report of type dialog box, specify the options using the information in Generating Reports, page 11-23. Step 4 In the Location field, use the specified reports folder or click Browse to select a different folder. Step 5 Click OK. The newly defined report type appears in the navigation tree in the specified folder. Managing Report Folders Prime Network provides the following options for working with report folders: • Creating Folders, page 11-46 • Moving Folders, page 11-47 • Renaming Folders, page 11-47 • Deleting Folders, page 11-48 • Viewing Folder and Report Type Properties, page 11-48 Creating Folders Prime Network enables you to create additional report folders in Report Manager. To create a report folder: Step 1 Choose Reports > Report Manager. Step 2 Select a folder in which to place the new folder. Step 3 Right-click the folder, then choose New Folder. Step 4 In the New Folder dialog box, enter a name for the folder. Step 5 Click OK. The navigation pane is refreshed and the new folder is displayed. 11-47 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 11 Working with Reports Managing Report Folders Step 6 To move the new folder to another folder, or to the top level in the folder hierarchy: a. Right-click the folder, then choose Move. b. In the Move To dialog box, select the location where you want the folder to reside. c. Click OK. The folder is displayed in the new location. Moving Folders Prime Network enables you to move folders that you have created in Report Manager. You cannot move the Events Reports, Inventory Reports, or Network Service Reports folder. To move a report folder: Step 1 Choose Reports > Report Manager. Step 2 Right-click the folder, then choose Move. Step 3 In the Move To dialog box, select the location where you want the folder to reside. Step 4 Click OK. The navigation pane is refreshed and the folder is displayed in the new location. Renaming Folders Prime Network enables you to rename folders that you have created in Report Manager. You cannot: • Rename a folder that resides at the highest level in the hierarchy, such as the Events Reports, Inventory Reports, or Network Service Reports folder. • Use the same name for different folders that reside at the same level in the hierarchy. To rename a report folder: Step 1 Choose Reports > Report Manager. Step 2 Right-click the folder, then choose Rename. Step 3 In the Rename Folder dialog box, enter the new name for the folder. Step 4 Click OK. The navigation pane is refreshed and the folder is displayed with the new name. 11-48 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 11 Working with Reports Managing Report Folders Deleting Folders You can delete folders that you have created in Report Manager if they are empty. You cannot delete the following folders: • Events Reports • Detailed Network Events • Detailed Non-Network Events • Inventory Reports • Network Service Reports • User-created folders that contain other folders or report types To delete a report folder: Step 1 Choose Reports > Report Manager. Step 2 Right-click the folder, then choose Delete. Step 3 In the Confirm Folder Delete dialog box, click Yes to confirm the deletion. The navigation pane is refreshed and the folder no longer appears. Viewing Folder and Report Type Properties Viewing Report Folder Properties The Report Properties window enables you to view report properties and to add folders. To view report properties: Step 1 Choose Reports > Report Manager. Step 2 In the navigation pane, right-click the required folder, then choose Properties. The Folder Properties window is displayed, as shown in Figure 11-9. 11-49 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 11 Working with Reports Managing Report Folders Figure 11-9 Folder Properties Table 11-22 describes the information that is displayed in each tab, depending on the folder’s contents. Table 11-22 Folder Properties Window Field Description Report Folders Tab Name Name of the folder included in the selected folder. Report Types Tab Name Name of the report type included in the selected folder. Description Description of the report type included in the selected folder. Defined Reports Tab Name Name of the user-defined report in the selected folder. Description Description of the user-defined report in the selected folder. Type Report type on which the user-defined report is based. Public Status of public access to the report: True or False. 11-50 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 11 Working with Reports Managing Report Folders Viewing Report Type Properties To view report type properties: Step 1 In the navigation pane, right-click the required report type, then choose Properties. The information that is displayed depends on whether the report type is one that you defined or one provided by Prime Network: • Prime Network-provided report type—The Report Type Properties window is displayed with the report name and description. Click Run to generate the report. • User-defined report type—The Edit dialog box is displayed with all settings specified for the report type. You can modify the settings or leave them as they are. Step 2 Click Close or the upper right corner to close the window. CHAPTER 12-1 Cisco Prime Network 3.10 User Guide OL-28065-01 12 Using Cisco PathTracer to Diagnose Problems Cisco PathTracer enables you to view a network path between two network objects. The following topics describe Cisco PathTracer and how to use it: • User Roles Required to Work with Cisco PathTracer, page 12-1 • Cisco PathTracer Overview, page 12-2 • Launching Path Tracer, page 12-3 • Viewing Path Traces in Cisco PathTracer, page 12-14 • Viewing Path Trace Details, page 12-20 • Saving and Opening Cisco PathTracer Map Files, page 12-26 • Saving Cisco PathTracer Counter Values, page 12-26 • Rerunning a Path and Comparing Results, page 12-27 • Viewing Q-in-Q Path Information, page 12-27 • Viewing L2TP Path Information, page 12-28 • Using Cisco PathTracer in MPLS Networks, page 12-29 User Roles Required to Work with Cisco PathTracer This topic identifies the roles that are required to work with Cisco PathTracer. Cisco Prime Network (Prime Network) determines whether you are authorized to perform a task as follows: • For GUI-based tasks (tasks that do not affect elements), authorization is based on the default permission that is assigned to your user account. • For element-based tasks (tasks that do affect elements), authorization is based on the default permission that is assigned to your account. That is, whether the element is in one of your assigned scopes and whether you meet the minimum security level for that scope. For more information on user authorization, see the Cisco Prime Network 3.10 Administrator Guide. The following tables identify the tasks that you can perform: • Table 12-1 identifies the tasks that you can perform if a selected element is not in one of your assigned scopes. • Table 12-2 identifies the tasks that you can perform if a selected element is in one of your assigned scopes. 12-2 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 12 Using Cisco PathTracer to Diagnose Problems Cisco PathTracer Overview By default, users with the Administrator role have access to all managed elements. To change the Administrator user scope, see the topic on device scopes in the Cisco Prime Network 3.10 Administrator Guide. Cisco PathTracer Overview Cisco PathTracer enables you to launch end-to-end route traces and view related performance information for Layer 1, Layer 2, and Layer 3 traffic. Upon receiving a path's start and endpoint, Cisco PathTracer visually traces the route through the network. For example, in an ATM network environment, Cisco PathTracer identifies all information regarding the connection of a subscriber to a provider, including all ATM PVCs, ATM switching tables, ATM class of service (CoS) definitions, IP-related information, and so on. You can also use Cisco PathTracer to: • Trace paths using IPv4, IPv6, or both IPv4 and IPv6 addresses for the source and destination. • Trace a hypothetical Ethernet frame from a VLAN interface to a specified MAC address. • Trace a hypothetical Ethernet frame from an Ethernet interface to a specified MAC address within a specific VLAN identifier. Table 12-1 Default Permission/Security Level Required for Working with Cisco PathTracer - Element Not in User’s Scope Task Viewer Operator OperatorPlus Configurator Administrator Launch a path trace — — — — X View path information — — — — X Save Cisco PathTracer map files ——— — X Save Cisco PathTracer counter values ——— — X Rerun a path and compare results ——— — X Table 12-2 Default Permission/Security Level Required for Working with Cisco PathTracer - Element in User’s Scope Task Viewer Operator OperatorPlus Configurator Administrator Launch a path trace — X X X X View path information — X X X X Save Cisco PathTracer map files —X X X X Save Cisco PathTracer counter values —X X X X Rerun a path and compare results —X X X X 12-3 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 12 Using Cisco PathTracer to Diagnose Problems Launching Path Tracer In MPLS and Carrier Ethernet environments, Cisco PathTracer can trace paths across: • Carrier Supporting Carrier (CSC) configurations—A path trace along a CSC flow follows the path from the customer CE through the customer carrier VPN, across the customer backbone carrier VPN, back to the customer carrier VPN, and to the destination CE. • VLANs—A path trace across VLANs follows the path based on the forwarding table, which means that the trace follows ports in the Forwarding STP state. • Q-in-Q—A path trace across Q-in-Q creates a single path trace (if the MAC address is learned) or a multiple-path (multipath) trace if the MAC address is not in the forwarding table. If the VLAN bridge has not learned a given MAC address, the bridge floods the Ethernet frame to the confines of a given VLAN or switching entity and across those ports that allow the given VLAN identifier. A MAC/VLAN path trace can be conducted from a customer edge (CE) VLAN interface across a service provider (SP) VLAN; that is, across Q-in-Q configurations with the CE-VLAN identifier as the inner VLAN identifier and Cisco PathTracer detecting the outer SP-VLAN identifier that encapsulates the CE-VLAN. • Pseudowires (also known as EoMPLS)—A MAC/VLAN path trace can be conducted from a VLAN interface across a VLAN attachment to a pseudowire. • VLAN-VPLS-VLAN configurations—A multiple-point MAC/VLAN path trace can be conducted on CE-VLANs across a service provider VPLS transport from a VLAN interface that attaches to the VPLS. In addition, Cisco PathTracer can trace a path: • If the destination MAC address is not reachable—If Cisco PathTracer cannot complete a MAC/VLAN path trace to a specified destination MAC address across an MPLS core, VPLS, or H-VPLS, then Cisco PathTracer displays the portion of the path that Cisco PathTracer can trace toward the destination MAC address. • That contains a simulated Ethernet frame—Cisco PathTracer can trace a simulated Ethernet frame from a VLAN port, across a VLAN (VLAN-based flow domain fragment), VPLS (VPLS-based flow domain fragment), and VLAN, for an end-to-end MAC address trace. Prime Network derives the various paths on the network from its up-to-date knowledge of the network. After a user selects a source and destination, Cisco PathTracer finds and retrieves the path of a specified service, and displays the path in the Cisco PathTracer window. The retrieved information contains network elements in the path, including all properties at Layer 1, Layer 2, and Layer 3, plus alarm information, counters, and more, all of which is available via Cisco PathTracer. Launching Path Tracer Cisco PathTracer can be launched from a bridge, switching entity, Ethernet interface, Ethernet flow point, VLAN interface, ATM VC, DLCI, or IP interface entry point. Ethernet flow points can be starting points whether they are associated with an interface, bridge, or LAG. The virtual route is found according to the cross connect table of each ATM switch or Frame Relay device. The IP routing and path-finding process is enabled according to the VRF tables of each router, and the Ethernet-simulated path is found according to the various Layer 2 forwarding tables, such as bridges or VSIs. 12-4 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 12 Using Cisco PathTracer to Diagnose Problems Launching Path Tracer To view a specific path, you must specify an initial point and a destination, such as an IP or MAC address. If you specify VC or DLCI information, which ends in a router, Cisco PathTracer finds the next hop according to the destination IP address. If you do not specify a destination IP or MAC address, Cisco PathTracer uses the default gateway in the router. Any business tags that are associated with the physical or logical entities are also displayed. Note A path can also be launched if a business tag attached to an endpoint that can be used as the starting point. Path Traces and Blocked Ports The following conditions apply for blocked ports: • You can launch a path trace from a blocked port. This action is equivalent to launching a path trace from a bridge. • You can specify a blocked port as a destination. • If Cisco PathTracer encounters a blocked port in its path to the destination, the path trace stops. Path traces do not traverse blocked ports. Table 12-3 identifies the available path trace launching points and their locations within Cisco Prime Network Vision. Cisco PathTracer is available in each location as a right-click menu option. Cisco PathTracer Right-Click Menu Options Cisco PathTracer is launched by using right-click menu options. Table 12-3 identifies the launching points for the different types of elements. Table 12-3 Cisco PathTracer Right-Click Menu Options Element Location Affected Parties • Inventory window • Ticket Properties window (Affected Parties tab) Bridge Inventory window Business tag The path can be found using a business tag, which is attached to the VPI/VCI, or using an IP interface by entering its key. The path can then be opened from the Find Business Tag dialog box. Ethernet flow point • Map view or navigation pane • Inventory window IP interface • Inventory window • Affected entry Layer 2 MPLS tunnel Inventory window MPLS-TE tunnel Inventory window MPLS-TP tunnel endpoint • Map view or navigation pane • Inventory window Port Inventory window 12-5 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 12 Using Cisco PathTracer to Diagnose Problems Launching Path Tracer Starting a Path Trace You can start a path trace in the following ways: • From the Map View, page 12-5 • From Logical or Physical Inventory, page 12-7 From the Map View To start a path trace from the map view: Step 1 In a Cisco Prime Network Vision map, start the path trace in one of the following ways: • For a VLAN: a. In the navigation pane or map pane, select the required network VLAN. b. Double-click the VLAN to view the VLAN entities. c. Right-click the required item and choose PathTracer > From Here to Destination or PathTracer > Start Here. • For a VPN: a. In the navigation pane or map pane, select the required network VPN. b. Double-click the VPN to view the VPN entities. c. Right-click the site and choose PathTracer > From Here to Destination or PathTracer > Start Here. • For an Ethernet flow point: a. Choose Network Inventory > Ethernet Flow Domains. b. In the Ethernet Flow Domain List Properties window, double-click the required domain. c. In the Ethernet Flow Domain Properties window, right-click the required element and choose PathTracer > From Here to Destination or PathTracer > Start Here. Pseudowire endpoint • Map view or navigation pane • Inventory window Site Map view Switching entity Map view Virtual connection Inventory window: • Cross Connect window • VC Table window VLAN • Navigation pane • Map view Table 12-3 Cisco PathTracer Right-Click Menu Options (continued) Element Location 12-6 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 12 Using Cisco PathTracer to Diagnose Problems Launching Path Tracer The next step depends on your choice in Step 1: • If you choose PathTracer > From Here to Destination, the Path Information dialog box is displayed (Figure 12-1). Continue with Step 2. • If you choose PathTracer > Start Here, continue with Step 3. Figure 12-1 Path Information Dialog Box Step 2 To specify a destination: a. In the Path Information dialog box, enter the required information, as described in Table 12-4. Depending on the launch point, the Path Information dialog box might not contain all of the fields in Table 12-4. b. Click OK. Step 3 If you choose Start Here, navigate to the destination interface, port, or bridge, right-click it, and choose End Here. The Cisco PathTracer window is displayed showing the path or paths that were found. Step 4 To view additional details regarding the path traces, select one or more paths in the paths pane. Table 12-4 Cisco PathTracer Path Information Dialog Box Field Description Destination IP Select this option to specify an IP address as the destination. Enter either an IPv4 or IPv6 address. Destination MAC Select this option to specify a MAC address as the destination. Enter the MAC address. VLAN ID Enter the required VLAN identifier. You must enter an IP address or a MAC address to use this option. Inner VLAN ID Enter the required inner VLAN identifier. Stop trace after Check this check box to limit the number of hops that Cisco PathTracer makes in its attempt to reach the destination. Enter the maximum number of hops that you want to allow in the hops field. 12-7 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 12 Using Cisco PathTracer to Diagnose Problems Launching Path Tracer Step 5 In the toolbar, click Cisco PathTracer. • If you select one or more paths in the paths pane, each selected path is displayed in its own window with the Layer 1, Layer 2, Layer 3, and Business Tag tabs. • If you select nothing in the Paths pane, each path found is displayed in its own window with the Layer 1, Layer 2, Layer 3, and Business Tag tabs. For more information about the end-to-end path and networking layer details, see Viewing Path Trace Details, page 12-20. From Logical or Physical Inventory To start a path trace from logical or physical inventory: Step 1 Open the inventory window for the required device. Step 2 Select one of the following launch points in logical or physical inventory: • IP interface • MPLS-TP tunnel endpoint • Port • Pseudowire endpoint • VLAN bridge Step 3 Right-click the selected item and choose one of the following: • PathTracer > From Here to Destination—If you choose this option, continue with Step 2 in From the Map View, page 12-5. Note If you select an IP interface as the launch point, the right-click menu displays IPv4 and IPv6 options. These options are enabled or dimmed, depending on whether the IP interface has an IPv4 IP address, an IPv6 address, or both IPv4 and IPv6 addresses. For an example, see Figure 12-3. • PathTracer > Start Here—If you choose this option, continue with Step 3 in From the Map View, page 12-5. Examples of Launching Cisco PathTracer The following topics provide examples for launching Cisco PathTracer from different locations in Cisco Prime Network Vision: • Using an Ethernet Flow Point, page 12-8 • Using an IP Interface, page 12-9 • Using a VLAN Bridge, page 12-10 • Using an Ethernet Port, page 12-12 12-8 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 12 Using Cisco PathTracer to Diagnose Problems Launching Path Tracer • Using a Pseudowire, page 12-12 • Using an MPLS-TP Tunnel Endpoint, page 12-13 Using an Ethernet Flow Point A network VLAN is required for you to start a path trace using an Ethernet flow point. To launch a path trace from an Ethernet flow point: Step 1 In the Cisco Prime Network Vision navigation pane or map pane, expand the required network VLAN. Step 2 In the VLAN, right-click the required Ethernet flow point and choose PathTracer > From Here to Destination. The Path Information dialog box is displayed as shown in Figure 12-2. Figure 12-2 Ethernet Flow Point Path Trace Launch Point Step 3 Specify the destination using the information in Table 12-4. Step 4 To limit the number of hops for the path trace, check the Stop trace after check box, and enter the maximum number of hops for the path trace. Step 5 Click OK. The Cisco PathTracer window is displayed with the resulting path trace. 12-9 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 12 Using Cisco PathTracer to Diagnose Problems Launching Path Tracer Using an IP Interface Both IPv4 and IPv6 addresses are supported as valid path trace sources and destinations as illustrated in the following procedure. To launch a path trace from an IP interface: Step 1 In logical inventory, right-click the required IP interface (Logical Inventory > Routing Entities > Routing Entity > ip-interface). The right-click menu displays IPv4 and IPv6 options. These options are enabled or dimmed, depending on whether the IP interface has an IPv4 address, an IPv6 address, or both IPv4 and IPv6 addresses. See Figure 12-3. Figure 12-3 IP Interface Path Trace Launch Point - Right-Click Menu Step 2 Choose PathTracer > From Here to Destination. The Path Information dialog box is displayed as shown in Figure 12-4. 12-10 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 12 Using Cisco PathTracer to Diagnose Problems Launching Path Tracer Figure 12-4 IP Interface Path Trace Launch Point - Path Information Dialog Box Step 3 In the Destination IP field, enter the IPv4 or IPv6 address. Step 4 To limit the number of hops for the path trace, check the Stop trace after check box, and enter the maximum number of hops for the path trace. Step 5 Click OK. The Cisco PathTracer window appears, displaying the resulting path trace. Using a VLAN Bridge You can launch path traces from VLAN bridges. Additionally, MAC addresses in the VLAN bridge forwarding table can be path trace destinations. To launch a path trace from a VLAN bridge: Step 1 In logical inventory, right-click the required bridge (Logical Inventory > Bridges > bridge) and choose one of the following options as shown in Figure 12-5: • PathTracer > From Here to Destination • PathTracer > Start Here 12-11 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 12 Using Cisco PathTracer to Diagnose Problems Launching Path Tracer Figure 12-5 VLAN Bridge Path Trace Launch Point Step 2 If you choose From Here to Destination in Step 1, the Path Information dialog box is displayed. Specify the required destination using the information in Table 12-4. Step 3 If you choose Start Here, navigate to the destination, right-click it, and choose End Here. Destination options include: • IP interface—Logical Inventory > Routing Entities > Routing Entity > IP-interface • Bridge—Logical Inventory > Bridges > bridge • MAC address—Logical Inventory > Bridges > bridge > Bridge Table > MAC-address • Ethernet port—Physical Inventory > chassis > slot > port When a destination is selected, the system extracts the relevant IP address from this point and uses it as the destination. The Cisco PathTracer window is displayed with the resulting path trace. 12-12 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 12 Using Cisco PathTracer to Diagnose Problems Launching Path Tracer Using an Ethernet Port To launch a path trace from an Ethernet port: Step 1 In physical inventory, right-click the required port (Physical Inventory > Chassis > slot > subslot > port) and choose one of the following options as shown in Figure 12-6: • PathTracer > From Here to Destination • PathTracer > Start Here Figure 12-6 Ethernet Port Path Trace Launch Point Step 2 Depending on your choice in Step 1, specify the required destination information or select the path trace endpoint. The Cisco PathTracer window appears, displaying the resulting path trace. Using a Pseudowire To launch a path trace from a network pseudowire endpoint: Step 1 In the navigation pane or map pane, expand the required network pseudowire. Step 2 Right-click the required pseudowire endpoint and choose PathTracer > From Here to Destination. The Path Information dialog box is displayed as shown in Figure 12-7. 12-13 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 12 Using Cisco PathTracer to Diagnose Problems Launching Path Tracer Figure 12-7 Path Information Dialog Box for a Network Pseudowire Step 3 Specify the destination using the information in Table 12-4. Step 4 To limit the number of hops for the path trace, check the Stop trace after check box, and enter the maximum number of hops for the path trace. The Cisco PathTracer window appears, displaying the resulting path trace. Using an MPLS-TP Tunnel Endpoint To launch a path trace from an MPLS-TP tunnel endpoint: Step 1 In the navigation pane or map pane, expand the required MPLS-TP tunnel. Step 2 Right-click the required MPLS-TP tunnel endpoint and choose PathTracer > From Here to Destination. The Path Information dialog box is displayed as shown in Figure 12-8. 12-14 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 12 Using Cisco PathTracer to Diagnose Problems Viewing Path Traces in Cisco PathTracer Figure 12-8 MPLS-TP Tunnel Endpoint Path Trace Launch Step 3 Specify the destination using the information in Table 12-4. Step 4 To limit the number of hops for the path trace, check the Stop trace after check box, and enter the maximum number of hops for the path trace. The Cisco PathTracer window appears, displaying the resulting path trace. Viewing Path Traces in Cisco PathTracer The Cisco PathTracer window displays all discovered paths for the specified source and destination of the path trace, including the devices and physical links. In addition, the Cisco PathTracer window enables you to: • Zoom in and out on path traces by using your mouse scroll wheel. • Apply one of four icon sizes to icons. • View more or less information about the element by resizing the icon. • Access common functions from the icons, such as attaching business tags or viewing properties. You can also right-click elements in the Cisco PathTracer window and choose options from a right-click menu. The right-click menu is context sensitive depending on the view and the item selected. For more information about the right-click menu and the available options, see Right-Click Menu Options, page 12-19. 12-15 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 12 Using Cisco PathTracer to Diagnose Problems Viewing Path Traces in Cisco PathTracer The Cisco PathTracer window enables you to: • View multiple paths for a selected source and destination either sequentially or simultaneously. • View individual paths with networking layer details. • Save a map with multiple paths to a file. • Run Cisco PathTracer again, using the same trace or with a different limit number of hops. Figure 12-9 shows an example of the Cisco PathTracer window with a multiple-path trace. Figure 12-9 Cisco PathTracer Window - Multiple-Path Trace The Cisco PathTracer window contains the following components and options: • Menus, page 12-16 • Toolbar, page 12-17 • Trace Tabs, page 12-18 • Paths Pane, page 12-18 1 Menu bar 4 Paths pane 2 Toolbar 5 Status bar 3 Trace tabs 6 Path trace pane 12-16 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 12 Using Cisco PathTracer to Diagnose Problems Viewing Path Traces in Cisco PathTracer • Path Trace Pane, page 12-18 • Right-Click Menu Options, page 12-19 Menus Table 12-5 describes the options available in the Cisco PathTracer menus. Table 12-5 Cisco PathTracer Window Menu Options Option Description File Menu Run Again Offers the following options for running Cisco PathTracer again for the same source and destination: • Change Hop Count—Enables you to enter a new hop count. • Repeat Last Trace—Runs the previous trace with the same settings. • Run Full Path Trace—Runs the previous trace without a hop count limit. Save Opens the Save dialog box so that you can save the current path trace to your local system in XML format. Close Closes the Cisco PathTracer window. Edit Menu Select All Selects all paths in the selected path trace pane. View Menu Layout Specifies how the elements are arranged in the path trace pane: circular, hierarchical, orthogonal, or symmetric. Overview Opens a window displaying an overview of the path trace. Zoom In Zooms in on the current path trace. Zoom Out Zooms out on the current path trace. Fit in Window Fits the entire path trace in the path trace pane. Normal Select Activates the normal selection mode. Pan Activates the pan mode, which enables you to move around in the path trace by clicking and dragging. Zoom Selection Enables you to zoom in on a specific area in the path trace. 12-17 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 12 Using Cisco PathTracer to Diagnose Problems Viewing Path Traces in Cisco PathTracer Toolbar Table 12-6 describes the options available in the Cisco PathTracer toolbar. Table 12-6 Cisco PathTracer Toolbar Options Button Function Displays the previous path in the path trace pane. Displays the next path in the path trace pane. Clears the path selection made in the path trace pane. Opens the Cisco PathTracer details window. A map is displayed for the selected path, including network element details, links, and property information. For more information, see Viewing Path Trace Details, page 12-20. Saves the current multiple-path trace to an XML file on your local system. For more information, see Saving and Opening Cisco PathTracer Map Files, page 12-26. Offers the following options for running Cisco PathTracer again for the same source and destination: • Change Hop Count—Enables you to enter a new hop count. • Repeat Last Trace—Runs the previous trace with the same settings. • Run Full Path Trace—Runs the previous trace without a hop count limit. The new path trace map is displayed in the path trace pane. A new tab with the up-to-date (or refreshed) path map is created for each run, with each tab representing a run and the tab label indicating the snapshot time. Opens a window displaying a high level view of the path trace currently displayed in the path trace pane. Specifies how the elements are arranged in the path trace pane: circular, hierarchical, orthogonal, or symmetric. Fits the entire path trace in the path trace pane. Activates the normal selection mode. The button toggles when selected or deselected. Activates the zoom selection mode, which enables you to select a specific area in the path to zoom in on by clicking and dragging. The button toggles when selected or deselected. Activates the pan mode, which enables you to move around in the path trace by clicking and dragging. The button toggles when selected or deselected. 12-18 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 12 Using Cisco PathTracer to Diagnose Problems Viewing Path Traces in Cisco PathTracer Trace Tabs The discovered path trace is initially displayed in the path trace pane with a tab that displays the date and time when Prime Network started the path tracing process (snapshot time). If you load a saved path from a file or run the displayed path trace again, the opened or refreshed path is displayed in a new tab with a refreshed path map for each run or file. When using a saved path from a file, the source and destination must be the same as the current display for it to appear in the same path trace window. Each tab represents a run or file, and its header displays the snapshot time. Paths Pane The paths pane lists all the paths discovered in the current path trace. A new path is created for each source and destination pair. The paths are identified by number, such as 1, 2, and 3. If you launch a path trace with a specific hop count, the paths pane displays First n Hops where n is the number of hops specified. Selecting a path in the paths pane highlights the selected path in the path trace pane. The paths that are not selected are dimmed in the map. To view a different path, do either of the following: • Choose a different path in the paths pane. • Click Select Previous Path or Select Next Path in the toolbar. To remove a path selection, click Clear Path Selection in the toolbar. Path Trace Pane The path trace pane displays the devices, links, and topological paths that are part of the path trace. All links and nodes in the path trace pane are labeled with their relevant path numbers, corresponding to the numbers in the paths pane. The starting point is labeled with a Starting Point callout. All other edge points are displayed as clouds. The same coloring conventions that are used for links in the Prime Network content pane are used to display links in the Cisco PathTracer path trace pane. Cisco PathTracer uses icons to display the network objects and their status. The status of a network object can be indicated on the topological map in the following ways: • Severity • Management state • New alarms For more information, see: • Prime Network Vision Status Indicators, page 2-16 • Chapter 2, “Working with the Cisco Prime Network Vision Client” • Map View, page 2-7 12-19 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 12 Using Cisco PathTracer to Diagnose Problems Viewing Path Traces in Cisco PathTracer Right-Click Menu Options You can right-click network elements in the path trace window and choose items from a right-click menu. The right-click menu is context sensitive depending on the view and the element selected. Table 12-7 describes the right-click menu options that are available for elements selected in the Cisco PathTracer window. Table 12-7 Cisco PathTracer Element Right-Click Menu Options Option Description Inventory Opens the inventory window for the selected element. Aggregate Groups the selected devices into an aggregation. Disaggregate Ungroups the devices in the selected aggregation. Note This option is available only when an aggregation is selected. Poll Now Polls the selected element. Attach Business Tag Attaches a business tag to the selected network element Config Mgmnt Displays the Configuration Management page for the selected device in Prime Network Change and Configuration Management. For more information, see Chapter 4, “Device Configurations and Software Images.” Image Mgmnt Displays the Configuration Management page for the selected device in Prime Network Change and Configuration Management. For more information, see Chapter 4, “Device Configurations and Software Images.” Resize Enables you to resize an object on the map by percentage or size. Open Relevant Maps Displays the Open Map dialog box so that you can view and open maps that contain the selected element. Run Report Enables you to run standard or user-defined events, inventory, and network service reports on demand. Show Callouts/ Hide Callouts Displays or hides callouts associated with the selected element. Tools Contains the following choices: • CPU Usage—Displays memory and CPU usage information for a device or network element. • Ping—Pings the device from the client station. • Telnet—Communicates with the device using the Telnet window from the client station. Note If you use a Windows 7 system, you must enable the Windows Telnet Client before you can use the Prime Network Vision Telnet option. - For Windows 7 32-bit systems, enable the Windows Telnet Client to use the Prime Network Vision Telnet option. - For Windows 7 64-bit systems, a solution is available on the Cisco Developer Network at http://developer.cisco.com/web/prime-network/forums/-/message_b oards/message/2780108. 12-20 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 12 Using Cisco PathTracer to Diagnose Problems Viewing Path Trace Details Viewing Path Trace Details In addition to the information displayed in the Cisco PathTracer window, you can: • View the following information for each network element: – The relevant parameters for each interface on all layers along the path. – For each layer, an indication of a mismatch between the parameters of the interfaces on both sides of a link. – Traffic statistics along the path. • Monitor the status and traffic of all links along the path. • View In and Out port properties. To view this information, select the required path in the Cisco PathTracer window, and then click PathTracer in the toolbar. If you select multiple paths, a separate window is opened for each path. Figure 12-10 shows an example of the Cisco PathTracer details window. Topology Enables you to add: • A static link between two devices. • A static topology between a device and an unmanaged network. • A tunnel to a VPN. Launch external applications Starts an external application or tool that has been configured for access via the right-click menu. For more information, see the Cisco Prime Network 3.10 Customization Guide. Properties Displays the properties of the selected item, such as the IP address and system name. Commands Launches available activation and configuration scripts. This can include the commands documented in Configuring and Viewing NEs using Basic Management Commands, page 3-37, and those you create using Command Builder. For more information, see the Cisco Prime Network 3.10 Customization Guide. Management Contains the following submenu options: • Command Builder—Defines commands and scripts using the Prime Network Command Builder tool (Configurator security level required). • Soft Properties Management—Extends VNEs by adding SNMP MIB or Telnet/SHH/TL-1 properties to the device’s collected information model using the Prime Network Soft Properties Manager (Administrator security level required). VNE Tools Contains the following submenu options: • Poll Now—Updates the VNE information. • Stop VNE—Stops the VNE. • Start VNE—Starts the VNE. Table 12-7 Cisco PathTracer Element Right-Click Menu Options (continued) Option Description 12-21 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 12 Using Cisco PathTracer to Diagnose Problems Viewing Path Trace Details Figure 12-10 Cisco PathTracer Details Window The Cisco PathTracer details window contains the following components: • Menus, page 12-22 • Cisco PathTracer Details Window Toolbar, page 12-22 • Path Trace Pane, page 12-23 • Details Pane, page 12-25 1 Menu bar 5 Details pane 2 Toolbar 6 Layer and Business tabs 3 Path trace pane 7 Status bar 4 Hide/display path trace pane 12-22 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 12 Using Cisco PathTracer to Diagnose Problems Viewing Path Trace Details Menus Table 12-8 describes the Cisco PathTracer details window menu options. Cisco PathTracer Details Window Toolbar Table 12-9 describes the tools that are available in the Cisco PathTracer details window toolbar. Table 12-8 Cisco PathTracer Details Window Menus Option Description File Menu Close Closes the Cisco PathTracer window. View Menu Show All Displays all the information in the tabs. Hide All Hides all the information in the tabs. Tools Menu Export to File Exports the currently displayed data to a CSV file. Start Saving to File Starts exporting the counter values of the path displayed in the Cisco PathTracer window to a CSV file. Stop Saving to File Stops exporting the counter values of the path displayed in the Cisco PathTracer window to a CSV file. Help Menu Help Contents Opens the online help for Cisco Prime Network Vision and Cisco Prime Network Events. Help About Displays the Cisco Prime Network Vision version and any additionally installed applications. Table 12-9 Cisco PathTracer Details Window Toolbar Options Button Name Function Show All Displays all the information in the tabs. Hide All Hides all the information in the tabs. Export to File Exports the currently displayed data to a CSV file. Start Saving to File Starts exporting the counter values of the path displayed in the Cisco PathTracer window to a CSV file. Stop Saving to File Stops exporting the counter values of the path displayed in the Cisco PathTracer window to a CSV file. 12-23 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 12 Using Cisco PathTracer to Diagnose Problems Viewing Path Trace Details Path Trace Pane The path trace pane in the Cisco PathTracer details window displays information related to the tab selected in the details pane. For example, if you choose the Layer 2 tab in the details pane, Layer 2 information is displayed in the path trace pane. Similarly, if you choose an element or link in the path trace pane, the related parameters are highlighted in the details pane. By default, the path trace pane includes: • Edge points • Elements included in the path trace, including badges • Links included in the path trace Hovering your mouse over an element displays a tooltip that contains the element name, device type, and IP address. Hovering your mouse over the link to the right or left of the element displays the associated incoming or outgoing interface for that element and link. Table 12-10 describes the right-click menu options that are available for elements in the path trace pane. Table 12-10 Cisco PathTracer Element Right-Click Menu Options Option Description Inventory Opens the inventory window for the selected element. Attach Business Tag Attaches a business tag to the selected network element Poll Now Polls the selected element. Config Mgmnt Displays the Configuration Management page for the selected device in Prime Network Change and Configuration Management. For more information, see Chapter 4, “Device Configurations and Software Images.” Image Mgmnt Displays the Configuration Management page for the selected device in Prime Network Change and Configuration Management. For more information, see Chapter 4, “Device Configurations and Software Images.” Run Report Enables you to run standard or user-defined events, inventory, and network service reports on demand. 12-24 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 12 Using Cisco PathTracer to Diagnose Problems Viewing Path Trace Details Tools Contains the following choices: • CPU Usage—Displays memory and CPU usage information for a device or network element. • Ping—Pings the device from the client station. • Telnet—Communicates with the device using the Telnet window from the client station. Note If you use a Windows 7 system, you must enable the Windows Telnet Client before you can use the Prime Network Vision Telnet option. - For Windows 7 32-bit systems, enable the Windows Telnet Client to use the Prime Network Vision Telnet option. - For Windows 7 64-bit systems, a solution is available on the Cisco Developer Network at http://developer.cisco.com/web/prime-network/forums/-/m essage_boards/message/2780108. Topology Enables you to add: • A static link between two devices. • A static topology between a device and an unmanaged network. • A tunnel to a VPN. Launch external applications Starts an external application or tool that has been configured for access via the right-click menu. For more information, see the Cisco Prime Network 3.10 Customization Guide. Properties Displays the properties of the selected item, such as the IP address and system name. Commands Launches available activation and configuration scripts. This can include the commands documented in Configuring and Viewing NEs using Basic Management Commands, page 3-37, and those you create using Command Builder. For more information, see the Cisco Prime Network 3.10 Customization Guide. Table 12-10 Cisco PathTracer Element Right-Click Menu Options (continued) Option Description 12-25 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 12 Using Cisco PathTracer to Diagnose Problems Viewing Path Trace Details Details Pane Selecting a device or link in the path trace pane automatically highlights the related parameters in the details pane. The details pane, with its Layer and Business tabs, displays the supported parameters of the selected element in a table, with the ingress and egress ports along the top and the parameters on the left. Any inconsistencies between the two connected ports are colored to emphasize a discrepancy, such as different admin statuses. The information parameters are arranged as follows: • Layer n tabs—These tabs provide information about each network element, including ingress and egress port information. The information is either plain data that is extracted from the element or calculated data, such as rates or statistics. This information is displayed in the Layer 1, Layer 2, and Layer 3 tabs, as follows: – Layer 1—Displays the Layer 1 information in the selected path and enables you to view the link parameters. The name of each device is displayed, as well as the subslot, slot, and port details. – Layer 2—Displays the Layer 2 information in the selected path and enables you to view the link and connection parameters. For each device, the name and MAC address are displayed, as well as the VPI/VCI in an ATM link or the DLCI in a Frame Relay link. By default, the Cisco PathTracer details window is displayed with the Layer 2 tab active. – Layer 3—Displays the Layer 3 information in the selected path and enables you to view the link parameters. The name of each device is displayed. If a field has no value on any of the interfaces, the field is not displayed in the table. For example, if none of the interfaces is configured for MTU, the MTU row is not displayed in the table. If at least one of the interfaces is configured for MTU, the MTU row is displayed. • Business tab—This tab provides the name and key of business tags that are attached to the network entities displayed, including ports, devices (physical entities), VCIs, VPIs, DLCIs, contexts (logical entities), or MPLS. This information is displayed in the Business Tag area. Management Contains the following submenu options: • Command Builder—Defines commands and scripts using the Prime Network Command Builder tool (Configurator security level required). • Soft Properties Management—Extends VNEs by adding SNMP MIB or Telnet/SHH/TL-1 properties to the device's collected information model using the Prime Network Soft Properties Manager (Administrator security level required). VNE Tools Contains the following submenu options: • Poll Now—Updates the VNE information. • Stop VNE—Stops the VNE. • Start VNE—Starts the VNE. Table 12-10 Cisco PathTracer Element Right-Click Menu Options (continued) Option Description 12-26 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 12 Using Cisco PathTracer to Diagnose Problems Saving and Opening Cisco PathTracer Map Files Saving and Opening Cisco PathTracer Map Files Prime Network enables you to export multiple-path trace maps that are displayed in the Cisco PathTracer window to an XML file. You can view the data later to assess whether anything has changed. Saving Cisco PathTracer Map Files To save Cisco PathTracer map files: Step 1 Open the Cisco PathTracer window as described in Launching Path Tracer, page 12-3. Step 2 Click Save MultiPath in the toolbar. Step 3 In the Save dialog box, navigate to the directory where you want to save the file and enter a name for the map file. Step 4 Click Save. The map file is saved in the selected directory. Opening Cisco PathTracer Map Files Prime Network enables you to open saved XML-formatted path-tracing maps. The following conditions apply when working with multiple-path trace files: • When you load a multiple-path trace file, Prime Network queries the file (not the network), and loads the persisted information. • If you load a multiple-path trace file that does not contain the same start and end points, the map is automatically opened in a new Cisco PathTracer window. To open Cisco PathTracer map files: Step 1 In Cisco Prime Network Vision, choose File > Load MultiPath from the main menu. The Open dialog box is displayed. Step 2 Navigate to the directory of the saved file and select the file. Step 3 Click Open. The previously saved map is displayed in the Cisco PathTracer window. Saving Cisco PathTracer Counter Values Prime Network enables you to export, over a period of time, the counter values of the path displayed in the Cisco PathTracer window to a CSV file. The data can then be viewed later, as required. Note This topic applies to the Cisco PathTracer details window only. To save Cisco PathTracer counter values that are generated over a period of time: Step 1 Open the Cisco PathTracer details window as described in Viewing Path Trace Details, page 12-20. Step 2 Click Start Saving to File in the toolbar. 12-27 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 12 Using Cisco PathTracer to Diagnose Problems Rerunning a Path and Comparing Results Step 3 In the Export Table to File dialog box, navigate to the directory where you want to save the Cisco PathTracer counter values. Step 4 In the File name field, enter a name for the file in which to save the counter values. Step 5 Click Save. Cisco PathTracer starts saving the counter values to the specified file. Step 6 To stop exporting counter values to the file, click Stop Saving to File in the toolbar. Cisco PathTracer stops exporting the counter values to the file. Rerunning a Path and Comparing Results If you save a path to a file (see Saving and Opening Cisco PathTracer Map Files, page 12-26), you can use the file to rerun the same path automatically with the same source and destination. You can also compare the saved path to a newly run path to determine if the path has changed or to assess a problem. To rerun a saved path: Step 1 Load the required map file as described in Saving and Opening Cisco PathTracer Map Files, page 12-26. The Cisco PathTracer window is displayed with the previously saved map file. Step 2 Click Run Again in the toolbar. The path trace runs automatically using the same source and destination as the loaded map file, and a new tab is displayed in the Cisco PathTracer window with the updated map. The tab displays the date and time when the path was rerun. Step 3 Compare the previous map to the updated one by switching between the tabs in the Cisco PathTracer window. Note • If you load a Cisco PathTracer map file that does not contain the same source and destination information as the map that is currently displayed in the window, the map is automatically opened in a new Cisco PathTracer window. • If you load a Cisco PathTracer map file that contains the same source and destination information as a map that is currently displayed in the window, the map is loaded in a new tab in the same window. Viewing Q-in-Q Path Information The Q-in-Q (IEEE 802.1) tagging technology (also known as Dot1q tunneling) allows the nesting of another VLAN tag in a packet, in addition to an existing one. Either VLAN tag is considered an 802.1Q header. 12-28 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 12 Using Cisco PathTracer to Diagnose Problems Viewing L2TP Path Information Cisco PathTracer uses the VLAN tags of the Ethernet header and the port configuration to trace the path from one interface to another over the network. Among other things, you can: • View a Layer 2 path across a LAN domain with all the VLAN tag information. • For each network element, view the relevant parameters for each interface on all layers along the path. Q-in-Q and Dot1q information is displayed in the Cisco PathTracer window when a path is traced over Ethernet ports with Dot1q and a Q-in-Q configuration. As described in Launching Path Tracer, page 12-3, to view a specific path, you must specify an initial start point, such as an IP interface, and then an endpoint, such as a destination IP address. To trace a Q-in-Q path, you start the path from any: • Router or switch that is part of the Ethernet domain with Dot1q and Q-in-Q configurations. • IP destination that can be reached from that point of the network. After you select the endpoint, the Cisco PathTracer window is displayed. From this window, you can open the Cisco PathTracer details window, with the appropriate Q-in-Q information displayed in the Layer 2 tab. The Layer 2 tab can display the following information specific to Q-in-Q and VLAN port configurations: • VLAN Mode—The work mode for the interface: Unknown, Access, Trunk, or Dot1Q Tunnel. Trunk mode also refers to multiple tagging. • Native VLAN ID—The VLAN identifier that is used to tag untagged traffic received on a trunked interface: – If VLAN tagging is enabled, the default native VLAN identifier is 1. – If VLAN tagging is disabled, the native VLAN identifier is 0 (zero) or “no VLAN ID.” • CE VLAN ID—The customer edge device VLAN identifier. • SP VLAN ID—The service provider VLAN identifier. Viewing L2TP Path Information Cisco PathTracer uses VC ID encapsulation information to trace the path from one tunnel interface to another over the network. The Cisco PathTracer tool enables you to: • View a path for the defined Layer 2 Tunneling Protocol (L2TP) session across the network. • For each network element, view the relevant parameters for each interface on all layers along the path. The Layer 3 tab displays the peer name for L2TP tunnels. Table 12-11 describes the information that is displayed in the Layer 2 tab for L2TP tunnels. Table 12-11 Layer 2 Tab Information for L2TP Tunnels Field Description Encapsulation Type Encapsulation type, such as Point-to-Point Protocol over ATM (PPPoA). Binding Information Name of the subscriber. Binding Status Binding status: bound or unbound. Tunnel Session Count Number of current sessions. 12-29 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 12 Using Cisco PathTracer to Diagnose Problems Using Cisco PathTracer in MPLS Networks Using Cisco PathTracer in MPLS Networks You can open and view Cisco PathTracer information between service endpoints, such as an IP interface that is attached to the VRF over an MPLS network. The LSP in the MPLS network is found according to the cross-connect table of each router. Note An LSP can be traced and displayed by Cisco PathTracer as part of an end-to-end tracing of a service; for example, when viewing a path between one CE device and another. Cisco PathTracer traces the path that goes over circuits or VLANs in the access networks. It also traces the LSPs between the VRFs going through all intermediate devices such as CE devices, aggregation switches, PE routers, and core routers. To view a specific path, you must specify an initial starting point, such as an IP interface; specifying a destination IP address is optional. If the traced path (for example, a VC or VLAN) ends in a router, Cisco PathTracer finds the next hop according to the destination IP address. If you select an endpoint, Cisco PathTracer extracts the relevant IP address from this point and uses it as the destination. The following topics provide more information on using Cisco PathTracer in MPLS networks: • Cisco PathTracer MPLS Start and Endpoints, page 12-30 • Using Cisco PathTracer for CSC Configurations, page 12-31 • Using Cisco PathTracer for Layer 3 VPNs, page 12-32 • Using Cisco PathTracer for Layer 2 VPNs, page 12-32 • Using Cisco PathTracer for MPLS TE Tunnels, page 12-33 Tunnel Remote ID Remote tunnel identifier. Tunnel ID Local tunnel identifier. Tunnel Name Name of the subscriber and the tunnel identifier. Session ID Session identifier. Traffic > L2TPSession Counters Number of traffic packets passing through the L2TP tunnel. Traffic < L2TPSessionCounters Number of traffic packets passing through the L2TP tunnel. Tunnel Ctl Errors Number of control errors. Tunnel State Tunnel state: unknown, idle, connecting, established, or disconnecting. Session Type Session type: unknown, LAC, or LNS. Peer Name Peer name. Tunnel Remote IP Remote IP address of the tunnel. Last Error Code Value of the last error code that caused the tunnel disconnection. Session State Session state: unknown, idle, connecting, established, or disconnecting. Remote Session ID Remote session identifier. Table 12-11 Layer 2 Tab Information for L2TP Tunnels (continued) Field Description 12-30 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 12 Using Cisco PathTracer to Diagnose Problems Using Cisco PathTracer in MPLS Networks Cisco PathTracer MPLS Start and Endpoints You can open Cisco PathTracer by right-clicking a starting point and entering the required destination IP address. Table 12-12 lists the Cisco PathTracer starting points. If you choose the Start Here option, Table 12-13 lists the endpoints that can be selected as path destinations. The Cisco PathTracer window is displayed. From this window you can open the Cisco PathTracer details window with the VPN information displayed in the Layer 2 and Layer 3 tabs. Note If multiple paths are selected in the paths pane, or if nothing is selected in the paths pane, all available paths are opened automatically, and each is displayed in a separate Cisco PathTracer window. Table 12-12 Cisco PathTracer MPLS Starting Points Element Location Start Options IP interface • Inventory window • Affected entity (enabled only if the affected entity has an IP interface) • From Here to Destination • Start Here MPLS-TP tunnel endpoint • Navigation or map pane • Inventory window • From Here to Destination • Start Here Site Service view map • From Here to Destination • To Subnet Destination • Start Here Business tag attached to the VPI/VCI or IP interface The path can be found using a business tag, which is attached to the VPI/VCI or IP interface by entering its key. It can then be opened from the Find Business Tag window. From Here to Destination Layer 2 MPLS Tunnel Inventory window From Here to Destination Table 12-13 Cisco PathTracer MPLS Endpoints Element Location End Options IP interface • Inventory window • Affected entity (enabled only if the affected entity has an IP interface) End Here MPLS-TP tunnel endpoint Inventory window End Here Site Service view map End Here 12-31 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 12 Using Cisco PathTracer to Diagnose Problems Using Cisco PathTracer in MPLS Networks Using Cisco PathTracer for CSC Configurations Cisco PathTracer traces a CSC flow from the customer CE through the customer carrier VPN, across the customer backbone carrier VPN, back to the customer carrier VPN, and to the destination CE. To launch a path trace for a CSC configuration: Step 1 In a map, double-click the required CE device. Step 2 In the inventory window, choose Logical Inventory > Routing Entities > Routing Entity. Step 3 In the IP Interfaces table, right-click the required interface and choose PathTracer > Start Here > IPvn where IPvn represents IPv4 or IPv6. Step 4 Navigate to the destination CE device and double-click it. Step 5 In the inventory window, choose Logical Inventory > Routing Entities > Routing Entity. Step 6 In the IP Interfaces table, right-click the required interface and choose PathTracer > End Here. The path trace is displayed in the Cisco PathTracer window. Step 7 To view the detailed pane, click Cisco PathTracer in the toolbar. The Layer 2 tab displays a single outer label and two inner labels for each interface, reflecting the CSC configuration. (See Figure 12-11.) Figure 12-11 CSC Configuration Path Trace 12-32 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 12 Using Cisco PathTracer to Diagnose Problems Using Cisco PathTracer in MPLS Networks Using Cisco PathTracer for Layer 3 VPNs Cisco PathTracer uses VRF routing and label switching information to trace the path from one VRF interface to another. If you choose a launch point and destination from the right-click menu, you can open the Cisco PathTracer for Layer 3 VPNs. The Cisco PathTracer window shows the VPN topology map. From this window, you can open the Cisco PathTracer details window with the appropriate VPN information displayed in the Layer 2 and Layer 3 tabs. For Layer 3 path information, Prime Network uses VRF routing and label switching information to trace the path from one VRF interface to another. Layer 3 path trace information is displayed in the Cisco PathTracer window when the path goes over connections and ends in VRFs. If a VRF table includes more than one path toward a destination, Cisco PathTracer shows all paths. To view Layer 3 path information, choose the Layer 3 tab and choose Show All from the View menu. The path information is displayed in the active tab. The table displays the Layer 3 VPN information on the device that has a VRF. The following Layer 3 properties displayed in the Layer 3 tab relate specifically to VPNs: • Name—The name of the site. For example, ATM4/0.100(10.0.0.1) is a combination of the interface name and IP address used to reach the site. Each site belongs to a particular VPN, so the address must be unique within the VPN. • IP Address—The IP address of the interface. • Mask—The mask of the specific network. • State—The state of the interface (up or down). • VRF Name—The name of the VRF. Cisco PathTracer does not display or trace EXP bits for Layer 3 VPNs that use policy-based tunnel selection (PBTS). Using Cisco PathTracer for Layer 2 VPNs Cisco PathTracer uses VC ID and label switching information to trace the path from one tunnel interface to another over the MPLS network. Cisco PathTracer also covers end-to-end Layer 2 VPN service paths from one CE router to another. The path goes over circuits (such as a VC) or VLANs in access networks and over LSP between the Layer 2 tunnel edge. The Cisco PathTracer window shows the VPN topology map for the relevant devices and links. From this window, you can open the Cisco PathTracer details window with the appropriate VPN information displayed in the Layer 2 and Layer 3 tabs. For Layer 2 path information, Cisco PathTracer uses VC ID and label switching information to trace the path from one tunnel interface to another. Layer 2 path trace information is displayed in the Cisco PathTracer window when the path goes over pseudowire tunnels. To view Layer 2 path information, choose the Layer 2 tab and then View > Show All. The path information is displayed in the active tab. 12-33 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 12 Using Cisco PathTracer to Diagnose Problems Using Cisco PathTracer in MPLS Networks Table 12-14 describes the Layer 2 properties that can be displayed in the Layer 2 tab specifically for VPNs. Using Cisco PathTracer for MPLS TE Tunnels Cisco PathTracer uses label switching information to trace the end-to-end path of a TE tunnel path from one PE router to another. Using MPLS TE technology, Cisco PathTracer enables you to: • View a path or list of devices. • View the following information for each network element: – The relevant parameters for each interface on all layers along the path. – The path for the defined MPLS TE-LSP across the network. The Cisco PathTracer window is displayed showing the MPLS TE tunnel topology map. From this window, you can open the Cisco PathTracer details window with the appropriate MPLS TE tunnel information displayed in the Layer 2 tab. Note Cisco PathTracer does not display or trace EXP bits for Layer 3 VPNs that use PBTS. Table 12-14 Cisco PathTracer Layer 2 Properties for VPNs Field Description Top Label Details of the outer MPLS label. Label Stack Details of the inner MPLS label. MAC Address MAC address. Tunnel ID Tunnel identifier. The identifier and the router IP address of the two tunnel edges identify the pseudowire tunnel. Tunnel Type Tunnel type: • 0—Unknown • 1—PWE3 • 2—TE Tunnel Status Operational state of the tunnel: Up or Down. Tunnel Local VC Label MPLS label that is used by the router to identify or access the tunnel. It is inserted in the MPLS label stack by the local router. Tunnel Peer VC Label MPLS label that is used by the router to identify or access the tunnel. It is inserted in the MPLS label stack by the peer router. Tunnel Local Router IP IP address of the tunnel edge, which is used as the MPLS router identifier. Tunnel Peer Router IP IP address of the peer tunnel edge, which is used as the MPLS router identifier. Distribution Protocol Type Protocol used by MPLS to build the tunnel, such as LDP or TDP. Peer OID Tunnel identifier and device name. 12-34 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 12 Using Cisco PathTracer to Diagnose Problems Using Cisco PathTracer in MPLS Networks Layer 2 and Layer 3 path trace information is displayed in the Cisco PathTracer details window when a path is traced over MPLS TE tunnels. To view Layer 2 path information, choose the Layer 2 tab and then View > Show All. The path information is displayed in the active tab. Table 12-15 describes the Layer 2 properties that can be displayed in the Layer 2 tab specifically for MPLS TE tunnels. Table 12-15 Cisco PathTracer Layer 2 Properties for MPLS TE Tunnels Field Description MPLS TE Properties MPLS TE data set in an MPLS interface, primarily bandwidth allocation levels and signaling protocol. Tunnel Oper Status Operational status of the tunnel: Up or Down. If this value is Up, the Tunnel Admin Status must also be Up. See Tunnel Admin Status properties for additional information. Tunnel Bandwidth Kbps Configured bandwidth (in Kb/s) for the tunnel. Tunnel Description Description of the tunnel. Tunnel Name Interface name. Tunnel Admin Status Administrative status of the tunnel (Up or Down) with the following caveats: • If the Tunnel Oper Status value is Up, the Tunnel Admin Status value must also be Up. • If the Tunnel Admin Status value is Down, the Tunnel Oper Status value must also be Down. Tunnel Lockdown Whether or not the tunnel can be rerouted: • Enabled—The tunnel cannot be rerouted. • Disabled—The tunnel can be rerouted. Tunnel LSP ID LSP identifier. Tunnel Auto Route Whether or not destinations behind the tunnel are routed through the tunnel: Enabled or disabled. Tunnel Hold Priority Tunnel priority after path setup. Tunnel Setup Priority Tunnel priority upon path setup. Tunnel Path Option Tunnel path option: • Dynamic—The tunnel is routed along the ordinary routing decisions after taking into account the tunnel constraints such as attributes, priority, and bandwidth. • Explicit—The route is explicitly mapped with the included and excluded links. Tunnel Out Label TE tunnel MPLS label distinguishing the LSP selection in the adjacent device. Tunnel Affinity Tunnel’s preferential bits for specific links. Tunnel Destination Address IP address of the device in which the tunnel ends. Tunnel Peak Rate Kbps Peak flow specification (in Kb/s) for this tunnel. Tunnel Out Interface Interface through which the tunnel exits the device. 12-35 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 12 Using Cisco PathTracer to Diagnose Problems Using Cisco PathTracer in MPLS Networks Tunnel Burst Kbps Burst flow specification (in Kb/s) for this tunnel. Tunnel Average Rate Kbps Tunnel average rate in Kb/s. Tunnel Affinity Mask Tunnel affinity bits that should be compared to the link attribute bits. Table 12-15 Cisco PathTracer Layer 2 Properties for MPLS TE Tunnels (continued) Field Description 12-36 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 12 Using Cisco PathTracer to Diagnose Problems Using Cisco PathTracer in MPLS Networks CHAPTER 13-1 Cisco Prime Network 3.10 User Guide OL-28065-01 13 Monitoring Carrier Ethernet Services The following topics describe how you can use Cisco Prime Network Vision (Prime Network Vision) to monitor Carrier Ethernet services: • User Roles Required to Work with Carrier Ethernet Services, page 13-2 • Viewing CDP Properties, page 13-6 • Viewing Link Layer Discovery Protocol Properties, page 13-8 • Viewing Spanning Tree Protocol Properties, page 13-10 • Viewing Resilient Ethernet Protocol Properties, page 13-14 • Viewing HSRP Properties, page 13-17 • Viewing Access Gateway Properties, page 13-19 • Working with Ethernet Link Aggregation Groups, page 13-22 • Viewing mLACP Properties, page 13-28 • Viewing Provider Backbone Bridge Properties, page 13-31 • Viewing EFP Properties, page 13-32 • Connecting a Network Element to an EFP, page 13-37 • Understanding EFP Severity and Ticket Badges, page 13-37 • Viewing EVC Service Properties, page 13-39 • Viewing and Renaming Ethernet Flow Domains, page 13-41 • Working with VLANs and VLAN Overlays, page 13-44 • Understanding Unassociated Bridges, page 13-72 • Working with Ethernet Flow Point Cross-Connects, page 13-74 • Working with VPLS and H-VPLS Instances, page 13-77 • Working with Pseudowires, page 13-89 • Working with Ethernet Services, page 13-102 • Viewing IP SLA Responder Service Properties, page 13-109 • Viewing IS-IS Properties, page 13-111 • Viewing OSPF Properties, page 13-114 • Using REP and mLACP Show Commands, page 13-116 • Using Pseudowire Ping and Show Commands, page 13-116 13-2 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services User Roles Required to Work with Carrier Ethernet Services User Roles Required to Work with Carrier Ethernet Services This topic identifies the roles that are required to work with to Carrier Ethernet services in Prime Network Vision. Prime Network determines whether you are authorized to perform a task as follows: • For GUI-based tasks (tasks that do not affect elements), authorization is based on the default permission that is assigned to your user account. • For element-based tasks (tasks that do affect elements), authorization is based on the default permission that is assigned to your account. That is, whether the element is in one of your assigned scopes and whether you meet the minimum security level for that scope. For more information on user authorization, see the Cisco Prime Network 3.10 Administrator Guide. The following tables identify the tasks that you can perform: • Table 13-1 identifies the tasks that you can perform if a selected element is not in one of your assigned scopes. • Table 13-2 identifies the tasks that you can perform if a selected element is in one of your assigned scopes. By default, users with the Administrator role have access to all managed elements. To change the Administrator user scope, see the topic on device scopes in the Cisco Prime Network 3.10 Administrator Guide. Table 13-1 Default Permission/Security Level Required for Working with Carrier Ethernet Services - Element Not in User’s Scope Task Viewer Operator OperatorPlus Configurator Administrator Adding Elements to Maps Add associated VLANs to a map — — X X X Add EFP cross-connects — — X X X Add Ethernet services to a map — — X X X Add pseudowires to a map — — X X X Add unassociated bridges — — X X X Add VLANs to a map — — X X X Add VPLS instances to a map — — X X X Viewing Element Properties View access gateway properties — — — — X View associated network VLAN service links and VLAN mapping properties —— — — X View CDP properties — — — — X View EFD properties — — — — X View EFP cross-connect properties Partial1 Partial1 Partial1 Partial1 X View EFP properties Partial1 Partial1 Partial1 Partial1 X View Ethernet flow domains X X X X X View Ethernet LAG properties — — — — X View Ethernet service properties X X X X X 13-3 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services User Roles Required to Work with Carrier Ethernet Services View EVC service properties — — — — X View IP SLA responder service properties —— — — X View IS-IS properties — — — — X View Link Layer Discovery Protocol (LLDP) properties —— — — X View mLACP properties — — — — X View OSPF properties — — — — X View Provider Backbone Bridge (PBB) properties —— — — X View pseudowire properties Partial1 Partial1 Partial1 Partial1 X View pseudowire redundancy service properties Partial2 Partial2 Partial2 Partial2 View REP properties — — — — X View REP properties for VLAN service links —— — — X View STP properties — — — — X View STP properties for VLAN service links —— — — X View HSRP properties — — — — X View virtual service instance properties —— — — X View VLAN bridge properties — — — — X View VLAN links between VLAN elements and devices Partial3 Partial3 Partial3 Partial3 X View VLAN mappings — — — — X View VLAN service link properties — — — — X View VLAN trunk group properties — — — — X View VPLS access EFP properties — — — — X View VPLS core or access pseudowire endpoint properties —— — — X View VPLS instance properties X X X X X Working with Overlays Apply overlays X X X X X Display or hide overlays X X X X X Remove overlays X X X X X View pseudowire tunnel links in VPLS overlays —— — — X Table 13-1 Default Permission/Security Level Required for Working with Carrier Ethernet Services - Element Not in User’s Scope (continued) Task Viewer Operator OperatorPlus Configurator Administrator 13-4 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services User Roles Required to Work with Carrier Ethernet Services View REP information in VLAN domain views and VLAN overlays —— — — X View STP information in VLAN domain views and VLAN overlays —— — — X Other Tasks Display pseudowire information — — — — X Ping a pseudowire — — — — X Remove VLANs from a map — — X X X Rename Ethernet flow domains X X X X X Using REP and mLACP Show Commands —— — X X Using Pseudowire Ping and Show Commands —— — X X 1. The user can view properties available via Node > Properties but not those available via the right-click Properties option or in logical inventory. 2. The user can view the pseudowire redundancy icon in the navigation and map panes, but not the inventory or properties window. 3. The user can view links, but the links are dimmed and do not indicate their status. Table 13-2 Default Permission/Security Level Required for Working with Carrier Ethernet Services - Element in User’s Scope Task Viewer Operator OperatorPlus Configurator Administrator Adding Elements to a Map Add associated VLANs to a map — — X X X Add EFP cross-connects — — X X X Add Ethernet services to a map — — X X X Add pseudowires to a map — — X X X Add unassociated bridges — — X X X Add VLANs to a map — — X X X Add VPLS instances to a map — — X X X Viewing Element Properties View access gateway properties X X X X X View associated network VLAN service links and VLAN mapping properties XX X X X View CDP properties X X X X X View EFD properties X X X X X View EFP cross-connect properties X X X X X Table 13-1 Default Permission/Security Level Required for Working with Carrier Ethernet Services - Element Not in User’s Scope (continued) Task Viewer Operator OperatorPlus Configurator Administrator 13-5 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services User Roles Required to Work with Carrier Ethernet Services View EFP properties X X X X X View Ethernet flow domains X X X X X View Ethernet LAG properties X X X X X View Ethernet service properties X X X X X View EVC service properties X X X X X View IP SLA responder service properties XX X X X View IS-IS properties X X X X X View Link Layer Discovery Protocol (LLDP) properties XX X X X View mLACP properties X X X X X View OSPF properties X X X X X View Provider Backbone Bridge (PBB) properties XX X X X View pseudowire properties X X X X X View pseudowire redundancy service properties XX X X X View REP properties X X X X X View REP properties for VLAN service links XX X X X View HSRP properties X X X X X View STP properties X X X X X View STP properties for VLAN service links XX X X X View VLAN bridge properties X X X X X View VLAN links between VLAN elements and devices XX X X X View VLAN mappings X X X X X View VLAN service link properties X X X X X View VLAN trunk group properties X X X X X View VPLS access EFP properties X X X X X View VPLS core or access pseudowire endpoint properties XX X X X View VPLS instance properties X X X X X View VSI properties X X X X X Table 13-2 Default Permission/Security Level Required for Working with Carrier Ethernet Services - Element in User’s Scope (continued) Task Viewer Operator OperatorPlus Configurator Administrator 13-6 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Viewing CDP Properties Viewing CDP Properties Cisco Discovery Protocol (CDP) is primarily used to obtain protocol addresses of neighboring devices and discover the platform of those devices. In Logical Inventory To view CDP properties: Step 1 In Prime Network Vision, double-click the device whose CDP properties you want to view. Step 2 In the inventory window, click Logical Inventory > Cisco Discovery Protocol. The CDP properties are displayed in logical inventory as shown in Figure 13-1. Working with Overlays Apply overlays X X X X X Display or hide overlays X X X X X Remove overlays X X X X X View pseudowire tunnel links in VPLS overlays XX X X X View REP information in VLAN domain views and VLAN overlays XX X X X View STP information in VLAN domain views and VLAN overlays XX X X X Other Tasks Display pseudowire information — — — X X Ping a pseudowire — — — X X Remove VLANs from a map — — X X X Rename Ethernet flow domains X X X X X Using REP and mLACP Show Commands —— — X X Using Pseudowire Ping and Show Commands —— — X X Table 13-2 Default Permission/Security Level Required for Working with Carrier Ethernet Services - Element in User’s Scope (continued) Task Viewer Operator OperatorPlus Configurator Administrator 13-7 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Viewing CDP Properties Figure 13-1 CDP in Logical Inventory Table 13-3 describes the CDP instance properties that are displayed. Table 13-3 CDP Properties in Logical Inventory Field Description Process Process name; in this case, Cisco Discovery Protocol Process Status Process status: Running or Disabled. CDP Holdtime Specifies the amount of time a receiving device should hold the information sent by a device before discarding it. CDP Message Interval Interval between CDP advertisement transmissions. CDP Local Device ID Local device identifier. CDP Version CDP version: 1 or 2. CDP Neighbors Table Local Port Local port name. Local Port ID Local port identifier. Remote Device ID Remote device identifier. Remote Port ID Remote port identifier. Remote IP Address Remote IP address. 13-8 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Viewing Link Layer Discovery Protocol Properties In Physical Inventory To view CDP on a Layer 2 port: Step 1 In Prime Network Vision, double-click the device with the Layer 2 port with the CDP information you want to view. Step 2 In the inventory window, select the required port under Physical Inventory. The CDP information is displayed in the Discovery Protocols area in the Prime Network Vision content pane: • Discovery Protocol Type—CDP • Info—Up or Down Viewing Link Layer Discovery Protocol Properties LLDP stores and maintains the local device information, including a list of devices directly connected to the device. In Logical Inventory To view LLDP properties: Step 1 In Prime Network Vision, double-click the device with the LLDP information you want to view. Step 2 In the inventory window, choose Logical Inventory > Link Layer Discovery Protocol. The LLDP properties are displayed in logical inventory as shown in Figure 13-2. 13-9 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Viewing Link Layer Discovery Protocol Properties Figure 13-2 LLDP in Logical Inventory Table 13-4 describes the properties that are displayed for LLDP. Table 13-4 Link Layer Discovery Protocol Properties Field Description Process Process; in this case, Link Layer Discovery Protocol Process Status Process status: Running or Disabled. LLDP Hold Time LLDP advertised hold time in seconds. LLDP Reinitialization Delay LLDP interface reinitialization delay in seconds LLDP Advertisements Interval LLDP advertisements interval in seconds. Local System Name Local system name. Local Chassis ID Local chassis identifier. 13-10 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Viewing Spanning Tree Protocol Properties In Physical Inventory To view LLDP on a Layer 2 port: Step 1 In Prime Network Vision, double-click the device with the Layer 2 port with LLDP information you want to view. Step 2 In the inventory window, select the required port under Physical Inventory. The LLDP information is displayed in the Discovery Protocols area in the Prime Network Vision content pane: • Discovery Protocol Type—LLDP • Info—Tx (Enabled or Disabled), Rx (Enabled or Disabled). Viewing Spanning Tree Protocol Properties STP is a link management protocol that provides path redundancy while preventing undesirable loops in the network. To view Spanning Tree properties: Step 1 In Prime Network Vision, double-click the element whose STP properties you want to view. Step 2 In the inventory window, choose Logical Inventory > Spanning Tree Protocol. Step 3 STP properties are displayed in logical inventory as shown in Figure 13-3. LLDP Neighbors Table Local Port Local port. Local Port ID Local port identifier. Local Port Name Local port name. Remote System Name Remote system name. Remote Chassis ID Remote chassis identifier. Remote Port ID Remote port identifier. Remote Port Name Remote port name. Remote Management IP Remote management IP address. Table 13-4 Link Layer Discovery Protocol Properties (continued) Field Description 13-11 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Viewing Spanning Tree Protocol Properties Figure 13-3 STP in Logical Inventory Table 13-5 describes the properties that are displayed for STP. Table 13-5 STP Properties Field Description Process Process; in this case, Spanning Tree Protocol. Process Status Process status: Running or Disabled. Bridge Hello Time Hello message keepalive interval (in seconds) when the port is the root. Hello Time Current hello time (in seconds). Bridge Forward Delay When the port is the root and in listening or learning state, amount of time to wait (in seconds) before proceeding to the forwarding state. Forward Delay Current bridge forward delay (in seconds). Bridge Max Age When the port is the root, maximum age of learned Spanning Tree Protocol port information (in seconds). Max Age Current maximum age (in seconds). STP Protocol STP version: MST, RSTP, PVSTP, MSTP, or RPVST. UplinkFast PVSTP Uplink Fast function status: Up or Down. BackboneFast PVSTP BackboneFast function status: Up or Down. 13-12 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Viewing Spanning Tree Protocol Properties Step 4 To view the properties of an STP instance, do one of the following: • Double-click the required instance. • Click the required entry in logical inventory under the Spanning Tree Protocol branch. Table 13-6 describes the information that is displayed in the STP Instance Information Properties window. STP Instance Info Table STP Instance ID STP instance name. VLAN IDs VLAN identifiers. Bridge Priority Bridge priority. STP Root Port Hyperlinked entry to the STP port in logical or physical inventory. Root Cost Root cost value for this bridge. Designated Root MAC address of the designated root. Bridge ID Bridge identifier (MAC address). Bridge Hello Time Hello message keepalive interval (in seconds) when the port is the root. Hello Time Current hello time (in seconds). Bridge Forward Delay When the port is the root and in the listening or learning state, amount of time to wait (in seconds) before proceeding to the forwarding state. Forward Delay Current bridge forward delay (in seconds). Bridge Max Age When the port is the root, maximum age of learned Spanning Tree Protocol port information (in seconds). Max Age Current maximum age (in seconds). Table 13-5 STP Properties (continued) Field Description Table 13-6 STP Instance Information Properties Field Description STP Instance ID STP instance identifier. VLAN ID VLAN identifier. Bridge Priority Bridge priority. Bridge ID Bridge identifier (MAC address). Root Cost Root cost value for this bridge. Designated Root MAC address of the designated root. Bridge Hello Time Hello message keepalive interval (in seconds) when the port is the root. Hello Time Current hello time (in seconds). Bridge Forward Delay When the port is the root and in listening or learning state, amount of time to wait (in seconds) before proceeding to the forwarding state. Forward Delay Current bridge forward delay (in seconds). Bridge Max Age When the port is the root, the maximum age of learned Spanning Tree Protocol port information (in seconds). 13-13 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Viewing Spanning Tree Protocol Properties Step 5 To view MSTP properties, choose the required MSTP entry in logical inventory under Spanning Tree Protocol. Table 13-7 describes the information that is displayed for MSTP. Max Age Current maximum age (in seconds). STP Protocol Specification Specific STP protocol type or variant used for this instance, such as Rapid PvSTP. Is Root Whether or not the port is the root: True or False. Ports Info Table STP Port Hyperlinked entry to the STP port in physical inventory. Port State STP port state: Disabled, Blocking, Listening, Learning, or Forwarding, Port Role Port role: Unknown, Backup, Alternative, Designated, Root, or Boundary. Port Priority Default 802.1p priority assigned to untagged packets arriving at the port. Port Path Cost Port path cost, which represents the media speed for this port. Point To Point Port Whether or not the port is linked to a point-to-point link: True or False. Edge Port Whether or not the port is an edge port; that is, whether it is connected to a nonbridging device: True or False. MST Port Hello Time This field is displayed in the Ports Info Table only for MST. In seconds, the interval between hello BPDUs sent by root switch configuration messages. The range is 1 to 10 seconds. Port Identifier STP port identifier. Portfast Whether or not STP PortFast is enabled on the port: Up or Down. Designated Port Identifier Designated STP port identifier. Designated Bridge STP designated bridge. BPDU Filter BPDU Filter status: Up or Down. BPDU Guard BPDU Guard status: Up or Down. Table 13-6 STP Instance Information Properties (continued) Field Description 13-14 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Viewing Resilient Ethernet Protocol Properties The following topics describe how to view STP properties related to: • VLAN domain views and overlays—See Viewing STP Information in VLAN Domain Views and VLAN Overlays, page 13-65. • VLAN service link properties—See Viewing STP Properties for VLAN Service Links, page 13-66. Viewing Resilient Ethernet Protocol Properties Cisco Resilient Ethernet Protocol (REP) technology is implemented on Cisco Carrier Ethernet switches and intelligent service edge routers. REP is a segment protocol, and a REP segment is a chain of ports connected to each other and configured with the same segment identifier. Each end of a segment terminates on an edge switch. The port where the segment terminates is called the edge port. Cisco Prime Network discovers and displays REP Segments (identified by a REP segment identifier that is locally configured on the network element) along with Global REP configuration details. You can also view the REP port roles (open, alternate, and failed) in the Cisco Prime Network Vision map. The REP port role is displayed as a tool-tip between the REP enabled trunk ports in the Ethernet links. Using the Cisco Prime Network Vision map, you can identify if the segment is open or closed. The map displays the forwarding direction (REP port roles) along the Physical links within VLAN overlays. It also displays the forwarding direction along the VLAN links among the switching elements within the VLAN logical domain topology. REP implementation supports the following faults: • A REP Port Role change to Failed service event will be generated when a REP port role is change from Alternate or Open to Failed. • A REP Port Role change to OK clearing service event will be generated when a REP port role is change from Failed to Alternate or Open. Correlation to these service events to physical layer events (for example Link down or Port down) is also performed. You can REP properties in logical inventory. Step 1 In Prime Network Vision, double-click the device configured for REP. Table 13-7 MSTP Properties in Logical Inventory Field Description MST Force Version Force version used: MST, PVSTP, RSTP, STP, or Unknown. MST Cfg ID Rev Level Revision level used by the selected device and negotiated with other devices. MST Cfg ID Name MSTP instance name. MST Max Instances Maximum number of MSTP instances. MST Cfg ID Fmt Sel Configuration format used by this device and negotiated with other devices. MST External Root Cost External root cost of the MSTP instance. 13-15 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Viewing Resilient Ethernet Protocol Properties Step 2 In the inventory window, choose Logical Inventory > Resilient Ethernet Protocol. Figure 13-4 shows an example of REP in logical inventory. Figure 13-4 REP in Logical Inventory Table 13-8 describes the information that is displayed for REP. Step 3 To view REP segment properties, double-click the required entry in the REP Segments table. Figure 13-5 shows an example of REP segment properties in logical inventory. Table 13-8 REP Properties Field Description Process Process name; in this case, Resilient Ethernet Protocol. Process Status State of the REP process, such as Running or Down. Administrative VLAN Administrative VLAN used by REP to transmit its hardware flooding layer messages. Values range from 1 to 4094. Notification Enabled Whether or not notification is enabled: True or False. REP Version Version of REP being used. REP Segments Table Segment ID Segment identifier. Segment Complete Whether the segment is complete; that is, that no port in the segment is in a failed state: True or False. 13-16 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Viewing Resilient Ethernet Protocol Properties Figure 13-5 REP Segment Properties Table 13-9 describes the information that is displayed for REP segments. Table 13-9 REP Segment Properties Field Description Segment ID Segment identifier. Segment Complete Whether the segment is complete; that is, that no port in the segment is in a failed state: True or False. Segment Ports Table Port Hyperlinked entry to the port in physical inventory. Port State Current operational link state of the REP port: None, Init Down, No Neighbor, One Way, Two Way, Flapping, Wait, or Unknown. Port Type Port type: Primary Edge, Secondary Edge, or Intermediate. Port Role Role or state of the REP port depending on its link status and whether it is forwarding or blocking traffic: Failed, Alternate, or Open. Remote Device Name Name of the neighbor device that this port is connected to on this segment. This value can be null. Remote Port Name Name of the neighbor port on the neighbor bridge that this port is connected to on this segment. This value can be null. 13-17 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Viewing HSRP Properties The following topics describe how to view REP properties related to VLANs: • VLAN domain views and overlays—See Viewing REP Information in VLAN Domain Views and VLAN Overlays, page 13-62. • VLAN service link properties—See Viewing REP Properties for VLAN Service Links, page 13-63. Viewing HSRP Properties Hot Standby Router Protocol (HSRP) is a protocol that provides backup to a router in case of failure. Using HSRP, several routers are connected to the same Ethernet network segment and work together to present the appearance of a single virtual router. The routers share the same IP and MAC addresses; therefore in the event of failure of one router, the hosts on the LAN will be able to continue forwarding packets to a consistent IP and MAC address. HSRP groups are configured on IP interfaces. An IP interface is modeled by the VNE through the IPInterface DC. The IPInterface DC maintains the HSRP related information by the use of HSRP group entries. Ethernet DCs, which are used to model Ethernet ports, maintain MAC addresses of the HSRP groups. To view HSRP properties: Step 1 Double-click the required element in Prime Network Vision. Step 2 In logical inventory, choose Logical Inventory > Routing Entities > Routing Entity. Step 3 In the IP Interfaces tab, double-click the required interface to view the IP interface properties. If HSRP is configured on the IP interface, the HSRP Group tab is displayed as shown in Figure 13-6. Blocked VLANs VLANs that are blocked on this port. Configured Load Balancing Blocked VLANs List of VLANs configured to be blocked at this port for REP VLAN load balancing. Preemptive Timer Amount of time, in seconds, that REP waits before triggering preemption after the segment is complete. The entry can range from 0 to 300, or be Disabled. The value Disabled indicates that no time delay is configured, and that the preemption occurs manually. This property applies only to REP primary edge ports. LSL Ageout Timer Using the Link Status Layer (LSL) age-out timer, the amount of time, in milliseconds, that the REP interface remains up without receiving a hello from a neighbor. Remote Device MAC MAC address of the neighbor bridge that this port is connected to on this segment. This value can be null. Table 13-9 REP Segment Properties (continued) Field Description 13-18 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Viewing HSRP Properties Figure 13-6 HSRP Group Information Table 13-10 describes the information in the HSRP Group tab. Table 13-10 HSRP Group Properties Field Description Group Number Number of the HSRP group associated with the interface. Version Version of the HSRP group. Port Name Port on which the HSRP is configured. Priority Value that determines the role each HSRP router plays. Values are 1 through 254, with higher numbers having priority over lower numbers. Coupled Router The partnet router. State State of the HSRP group: Active or Standby. Virtual IP Address Virtual IP address assigned to the active router. Virtual MAC Address Virtual MAC address assigned to the active router. 13-19 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Viewing Access Gateway Properties Viewing Access Gateway Properties In an access network, an access gateway configuration ensures loop-free connectivity in the event of various failures by sending statically configured bridge protocol data units (BPDUs) toward the access network. Using statically configured BPDUs enables the gateway device to act appropriately when notified of the following topology changes: • Failure of a link in the access network. • Failure of a link between the access network and the gateway device. • Failure of an access device. • Failure of a gateway device. To view access gateway properties: Step 1 Double-click the element configured for access gateway. Step 2 In the inventory window, choose Logical Inventory > Access Gateway > access-gateway. The group name is appended by either MSTAG or REPAG, indicating the group type Multiple Spanning Tree Access Gateway or Resilient Ethernet Protocol Access Gateway. Figure 13-7 shows an example of an access gateway entry in logical inventory. Figure 13-7 Access Gateway in Logical Inventory 13-20 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Viewing Access Gateway Properties Table 13-11 describes the information that is displayed for an access gateway. Step 3 Choose an access gateway instance to view instance properties. Figure 13-8 shows an example of the information displayed for an access gateway instance. Table 13-11 Access Gateway Properties in Logical Inventory Field Description Group Name Access gateway group name. Group Type Group type: MSTAG or REPAG. Interface Properties Interface Hyperlink to the interface in physical inventory on which access gateway is configured. Config Name Name of the MSTP region. The default value is the MAC address of the switch, formatted as a text string using the hexadecimal representation specified in IEEE Standard 802. Max Age In seconds, the maximum age for the bridge. Values range from 6 to 40 seconds. Provider Bridge Whether the current instance of the protocol is in 802.1ad mode: True or False. Bridge Address Bridge identifier for the interface. Port Identifier Port identifier for the interface. External Cost External path cost on the current port. Values range from 1 to 200000000. Config Revision Number of the configuration revision. Hello Time Current hello time (in seconds) Port Active Whether or not the port is active: True or False. BPDUs Sent Number of BPDUs sent. Reversion Control Enabled Whether reversion control is enabled: True or False. 13-21 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Viewing Access Gateway Properties Figure 13-8 Access Gateway Instance in Logical Inventory Table 13-12 describes the information that is displayed for an access gateway instance. Table 13-12 Access Gateway Instance Properties Field Description Interface Key Hyperlink to the interface in physical inventory on which access gateway is configured. Config Name Name of the MSTP region. The default value is the MAC address of the switch, formatted as a text string using the hexadecimal representation specified in IEEE Standard 802. Config Revision Number of the configuration revision. Max Age In seconds, the maximum age for the bridge. Values range from 6 to 40 seconds. Provider Bridge Whether the current instance of the protocol is in 802.1ad mode: True or False. Bridge Address Bridge identifier for the current switch. BPDUs Sent Number of BPDUs sent. Port Identifier Port identifier for the interface. Reversion Control Enabled Whether reversion control is enabled: True or False. External Cost External path cost on the current port. Values range from 1 to 200000000. 13-22 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with Ethernet Link Aggregation Groups Working with Ethernet Link Aggregation Groups Ethernet link aggregation groups (LAGs) provide the ability to treat multiple switch ports as one switch port. The port groups act as a single logical port for high-bandwidth connections between two network elements. A single link aggregation group balances the traffic load across the links in the channel. LAG links are discovered automatically for devices that support LAG technology and use VNEs that model Link Aggregation Control Protocol (LACP) attributes. You can create static links between Ethernet LAGs by choosing a LAG and the desired port channel for the A or Z side as described in Adding Static Links, page 6-15. If a physical link within the link aggregation group fails, the following actions occur: • Traffic that was previously carried over the failed link is moved to the remaining links. Most protocols operate over single ports or aggregated switch ports and do not recognize the physical ports within the port group. • An aggregation service alarm is generated. The aggregation service alarm indicates the percentage of links within the aggregation that have failed. For example, if an Ethernet link aggregation group contains four Ethernet links and one fails, the aggregation service alarm indicates that 25% of the links are down. Hello Time Current hello time (in seconds) Port Active Whether or not the port is active: True or False. Instances Table Instance ID Access gateway instance identifier. VLAN IDs VLAN identifiers. Cost Path cost for this instance. Bridge Priority Priority associated with current bridge. Root Bridge Priority Priority associated with the root bridge. Root Bridge Address Address of the root bridge. Port Priority Priority of the interface for this instance. Topology Changes Number of times the topology has changed for this instance. Access GW External Cost External root cost of this instance. Table 13-12 Access Gateway Instance Properties (continued) Field Description 13-23 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with Ethernet Link Aggregation Groups Viewing Ethernet LAG Properties Note Cisco CRS devices must be configured to receive SNMP traps in order to view Ethernet LAG properties. For more information on required SNMP settings, see the Cisco Prime Network 3.10 Administrator Guide. To view properties for Ethernet link aggregation groups: Step 1 In Prime Network Vision, double-click the device with the link aggregation group you want to view. Step 2 In the inventory window, choose Logical Inventory > Ethernet Link Aggregation. The link aggregation properties are displayed as shown in Figure 13-9. Figure 13-9 Ethernet Link Aggregation in Logical Inventory Table 13-13 describes the aggregation group properties that are displayed in the Data Link Aggregations table. Table 13-13 Data Link Aggregations Table Field Description ID Aggregation identifier. Double-click the entry to view the properties for that aggregation. Type Aggregation group type: Ethernet Channel or IEEE 8023 AD LAG. Group Number Aggregation group number. 13-24 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with Ethernet Link Aggregation Groups Step 3 To view properties for a specific aggregation, double-click the group identifier. The information that is displayed depends on the type of aggregation: • For Ethernet Channel aggregations, see Table 13-14. • For IEEE 802.3 AD aggregations, see Table 13-15. Bandwidth Aggregation bandwidth. Aggregation Control Protocol Aggregation control protocol: Manual, Link Aggregation Control Protocol (LACP), or Port Aggregation Protocol (PagP). Status Aggregation status: Up or Down. MAC Address Aggregation MAC address. Table 13-13 Data Link Aggregations Table (continued) Field Description Table 13-14 LAG Ethernet Channel Properties Field Description Group Number Aggregation group number. Bandwidth Aggregation bandwidth in b/s. Control Protocol Aggregation control protocol: Manual, Link Aggregation Control Protocol (LACP), or Port Aggregation Protocol (PagP). MAC Address Aggregation MAC address. Administrative State Aggregation administrative status: Up or Down. Operational State Aggregation operational status: Up or Down. Adjacent Adjacent group, hyperlinked to the group in logical inventory. mLACP Properties mLACP properties are displayed if the aggregation group is associated with an ICCP redundancy group. ICCP Redundancy Group ICCP redundancy group associated with this aggregation group, hyperlinked to the relevant entry in logical inventory. mLACP Role Role of the LAG in the redundancy group: Active or Standby. mLACP Operational System MAC MAC address used in a dual-homed environment that is selected by ICCP from one of the configured system MAC addresses for one of the points of attachment (PoAs). mLACP Operational System Priority Priority used in a dual-homed environment that is selected by ICCP from the configured system priority on one of the PoAs. mLACP Failover Option Configured mLACP failover mode: Revertive or Nonrevertive. mLACP Max Bundle Maximum number of links allowed per bundle. 13-25 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with Ethernet Link Aggregation Groups Aggregated Ports Table ID Aggregated port identifier, hyperlinked to the interface in physical inventory. Type Aggregation type, such as Layer 2 VLAN. Mode VLAN mode, such as Trunk. Native VLAN ID VLAN identifier (VID) associated with this VLAN. The range of VLANs is 1 to 4067. VLAN Encapsulation Type Type of encapsulation configured on the VLAN, such as IEEE 802.1Q. Allowed VLANs List of VLANs allowed on this interface. VLAN Encapsulation Admin Type VLAN administration encapsulation type, such as IEEE 802.1Q. Subinterfaces Table Address IP address of the subinterface. Mask Subnet mask applied to the IP address. VLAN Type Type of VLAN, such as Bridge or IEEE 802.1Q. Operational State Operational state of the subinterface: Up or Down. VLAN ID VLAN identifier. Inner VLAN CE-VLAN identifier. IP Interface IP interface configured as part of the subinterface, hyperlinked to the routing entity or VRF in logical inventory. VRF Name VRF associated with the subinterface. Is MPLS Whether the subinterface is enabled for MPLS: True or False. This column is displayed when at least one interface is MPLS-enabled. Tunnel Edge Whether this is a tunnel edge: True or False. VC Virtual circuit identifier, hyperlinked to the VC Table when the subinterface is configured for ATM VC. Binding Hyperlinked entry to the specific bridge in logical inventory. EFPs Table EFP ID EFP identifier. Operational State EFP operational state: Up or Down. VLAN VLAN associated with this EFP. Inner VLAN CE-VLAN identifier. Translated VLAN Translated, or mapped, VLAN identifier. Translated Inner VLAN Translated, or mapped, inner VLAN identifier. Binding Hyperlinked entry to the specific bridge in logical inventory. Description Description for the EFP. Table 13-14 LAG Ethernet Channel Properties (continued) Field Description 13-26 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with Ethernet Link Aggregation Groups Table 13-15 LAG IEEE 802.3 AD Properties Field Description Group Number Aggregation group number. Bandwidth Aggregation bandwidth. Control Protocol Aggregation control protocol: Manual, Link Aggregation Control Protocol (LACP), or Port Aggregation Protocol (PagP). MAC Address Aggregation MAC address. Administrative State Aggregation administrative status: Up or Down. Operational State Aggregation operational status: Up or Down. Dot3ad Agg Partner System Priority Priority of the partner system. Dot3ad Agg MAC Address Aggregation MAC address. Dot3ad Agg Actor Admin Key Actor administrative key. Dot3ad Agg Actor System Priority Actor system priority. Dot3ad Agg Partner Oper Key Partner operational key. Dot3ad Agg Actor Oper Key Actor operational key. Dot3ad Agg Collector Max Delay Maximum delay (in microseconds) for either delivering or discarding a received frame by the frame collector. Dot3ad Agg Actor System ID Actor system identifier, in the form of a MAC address. Dot3ad Agg Partner System ID Partner system identifier, in the form of a MAC address. mLACP Properties mLACP properties are displayed if the aggregation group is associated with an ICCP redundancy group. ICCP Redundancy Group ICCP redundancy group associated with this aggregation group, hyperlinked to the relevant entry in logical inventory. mLACP Role Role of the LAG in the redundancy group: Active or Standby. mLACP Operational System MAC MAC address used in a dual-homed environment that is selected by ICCP from one of the configured system MAC addresses for one of the points of attachment (PoAs). mLACP Operational System Priority Priority used in a dual-homed environment that is selected by ICCP from the configured system priority on one of the PoAs. mLACP Failover Option Configured mLACP failover mode: Revertive or Nonrevertive. mLACP Max Bundle Maximum number of links allowed per bundle. Aggregated Ports Table ID Port identifier, hyperlinked to the interface in physical inventory. Type Type of VLAN, such as Layer 2 VLAN. Discovery Protocols Discovery protocols used on this port. 13-27 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with Ethernet Link Aggregation Groups Subinterfaces Table Address IP address of the subinterface. Mask Subnet mask applied to the IP address. VLAN Type Type of VLAN, such as Bridge or IEEE 802.1Q. Operational State Operational state of the subinterface: Up or Down. VLAN ID VLAN identifier. Inner VLAN CE-VLAN identifier. IP Interface IP interface configured as part of the subinterface, hyperlinked to the routing entity or VRF in logical inventory. VRF Name VRF associated with the subinterface. VC Virtual circuit identifier, hyperlinked to the VC Table when the subinterface is configured for ATM VC. Binding Hyperlinked entry to the specific bridge in logical inventory. EFPs Table EFP ID EFP identifier. Operational State EFP operational state: Up or Down. VLAN VLAN associated with this EFP. Inner VLAN CE-VLAN identifier. Translated VLAN Translated, or mapped, VLAN identifier. Translated Inner VLAN Translated, or mapped, inner VLAN identifier. Binding Hyperlinked entry to the specific bridge in logical inventory. Description Description for the EFP. LACP Port Entries Aggregated Port Port on which the aggregation is configured, hyperlinked to the entry in physical inventory. Dot3ad Agg Port Partner Admin Port Priority Administrative port priority for the partner. Dot3ad Agg Port Partner Admin Key Administrative key for the partner port. Dot3ad Agg Port Partner Oper Port Priority Priority assigned to the aggregation port by the partner. Dot3ad Agg Port Actor Oper State Local operational state for the port. Dot3ad Agg Port Actor Admin State Local administrative state as transmitted by the local system in LACP data units (LACPDUs). Dot3ad Agg Port Selected Agg ID Selected identifier for the aggregation port. Dot3ad Agg Port Partner Oper Key Operational key for the partner port. Dot3ad Agg Port Partner Admin State Partner administrative state. Dot3ad Agg Port Actor Port Priority Priority assigned to the local aggregation port. Dot3ad Agg Port Partner Oper State Partner administrative state as transmitted by the partner in the most recently transmitted LAPCDU. Dot3ad Agg Port Attached Agg ID Identifier of the aggregator that the port is attached to. Table 13-15 LAG IEEE 802.3 AD Properties (continued) Field Description 13-28 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Viewing mLACP Properties Viewing mLACP Properties Prime Network Vision supports the discovery of Multichassis LACP (mLACP) configurations on devices configured for them, and displays mLACP configuration information, such as redundancy groups and properties, in inventory. To view mLACP properties: Step 1 In Prime Network Vision, double-click the element configured for mLACP. Step 2 In the inventory window, choose Logical Inventory > ICCP Redundancy. In response, Prime Network Vision lists the Inter-Chassis Communication Protocol (ICCP) redundancy groups configured on the device as shown in Figure 13-10. Figure 13-10 ICCP Redundancy in Logical Inventory Dot3ad Agg Port Actor Admin Key Administrative key for the local port. Dot3ad Agg Port Actor Port Number assigned to the local aggregation port. Dot3ad Agg Port Partner Oper Port Number assigned to the aggregation port by the partner. Dot3ad Agg Port Actor Oper Key Operational for the local port. Dot3ad Agg Port Partner Admin Port Administrative value of the port for the partner. Table 13-15 LAG IEEE 802.3 AD Properties (continued) Field Description 13-29 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Viewing mLACP Properties Table 13-16 describes the information displayed in the ICCP Redundancy Groups table. Step 3 To view additional information about an ICCP redundancy group, do either of the following: • In the logical inventory window navigation pane, choose Logical Inventory ICCP Redundancy > ICCP-group. • In the logical inventory content pane, right-click the required group in the ICCP Redundancy Groups table and choose Properties. The ICCP Redundancy Group Properties window is displayed with the Backbone Interfaces and Data Link Aggregations tabs as shown in Figure 13-11. Figure 13-11 ICCP Redundancy Group Properties Window Table 13-16 ICCP Redundancy Groups in Logical Inventory Field Description Group Number ICCP group identifier. Peer Monitoring Option Method used to monitor the peer: BFD or IP Reachability Monitoring. Member IP Address IP address of the neighbor PoA device. Member Device Name Name of the neighbor PoA device. mLACP Node ID Identifier used by this member of the mLACP redundancy group. mLACP Configured System MAC System MAC address of the redundancy group advertised to other members of the mLACP redundancy group and used for arbitration. mLACP Configured System Priority System priority advertised to other mLACP members of the redundancy group. 13-30 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Viewing mLACP Properties Table 13-17 describes the information available in the ICCP Redundancy Group Properties window. Step 4 To view additional mLACP properties, double-click the entry for the required link aggregation group in the Data Link Aggregations tab. mLACP information is displayed in the Link Aggregation Group Properties window, as described in the following tables: • Table 13-14—LAG Ethernet Channel Properties • Table 13-15—LAG IEEE 802.3 AD Properties Table 13-17 ICCP Redundancy Group Properties Window Field Description Group Number ICCP group identifier. Peer Monitoring Option Method used to monitor the peer: BFD or IP Reachability Monitoring. Member IP Address IP address of the neighbor PoA device. Member device name Name of the neighbor PoA device. mLACP Node ID Identifier used by this member of the mLACP redundancy group. mLACP Configured System MAC System MAC address of the redundancy group advertised to other members of the mLACP redundancy group and used for arbitration. mLACP Configured System Priority System priority advertised to other mLACP members of the redundancy group. Backbone Interfaces Tab ID Backbone interface defined for the redundancy group, hyperlinked to the relevant entry in logical inventory. Status Status of the backbone interface: Up, Down, or Unknown. Data Link Aggregations Tab ID Link aggregation group associated with the redundancy group, hyperlinked to the relevant entry in logical inventory. Type Aggregation group type: Ethernet Channel or IEEE 8023 AD LAG. Group Number Aggregation group number. Bandwidth Aggregation bandwidth. Aggregation Control Protocol Aggregation control protocol: Manual, LACP, or PAgP. Status Aggregation status: Up or Down. MAC Address Aggregation MAC address. 13-31 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Viewing Provider Backbone Bridge Properties Viewing Provider Backbone Bridge Properties Provider backbone bridges (PBBs), specified by IEEE 802.1ah-2008, provide a way to increase the number of service provider supported Layer 2 service instances beyond the number supported by QinQ and VPLS. PBB adds a backbone VLAN tag and backbone destination and source MAC addresses to encapsulate customer Ethernet frames and create a MAC tunnel across core switches. Prime Network supports PBB inventory discovery and modeling for the following devices: • Cisco 7600-series devices running Cisco IOS version 12.2(33)SRE1 • Cisco ASR 9000-series devices running Cisco IOS XR version 3.9.1 Prime Network models the IB type of Backbone edge bridges which includes both I-type and B-type components. To view PBB properties: Step 1 In Prime Network Vision, double-click the element configured for PBB. Step 2 In the inventory window, choose Logical Inventory > BridgeILans > PBB-bridge. Figure 13-12 shows an example of PBB properties in logical inventory. Figure 13-12 PBB Properties in Logical Inventory 13-32 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Viewing EFP Properties Table 13-18 describes the information displayed for PBB. Viewing EFP Properties Prime Network Vision provides information about EFPs in a number of ways. For example: • EFP names displayed in Prime Network Vision maps add EFP and the managed element name to the interface name, such as GigabitEthernet4/0/1 EFP: 123@c4-npe5-67. • If you select an EFP in the navigation pane in Prime Network Vision and then click Show List View, an Ethernet Flow Points table lists the network element, port, and network VLAN associated with the EFP. To view additional EFP properties: Step 1 In the Prime Network Vision map view, select the required EFP in the navigation pane or in the map pane and then do either of the following: • Right-click the EFP and choose Properties. • Choose Node > Properties. Table 13-18 PBB Properties in Logical Inventory Field Description Name Identifier of the bridge as follows: • For Cisco 7600 devices, the identifier of the MAC tunnel created. • For Cisco ASR 9000-series devices, the identifier is a combination of the bridge group and the bridge domain on the B-Bridge component. IB Bridge Mapping Table ISID 24-bit entry representing the Backbone service instance. I-Bridge XID of the I-Bridge component, hyperlinked to the relevant bridge in logical inventory. B-Bridge XID of the B-Bridge component, hyperlinked to the relevant bridge in logical inventory. 13-33 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Viewing EFP Properties Figure 13-13 shows an example of the EFP Properties window. Figure 13-13 EFP Properties Window Table 13-19 describes the information displayed in the EFP Properties window. Table 13-19 EFP Properties Window Field Description EFP ID Identifier for the EFP. VLAN Match Criteria Match criteria configured on the EFP for forwarding decisions. Split Horizon Group Split horizon group to which the EFP is associated. If no split horizon group is defined, the value is null. If only one split horizon group exists and it is enabled for the EFP, the value is the default group 0. Operational State Operational status of the EFP: Up or Down. Administrative State Administrative status of the EFP: Up or Down. Binding Hyperlinked entry to the relevant item in logical inventory, such as a pseudowire or bridge. Rewrite Definition Rewrite command configured on the EFP: pop, push, or translate. 13-34 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Viewing EFP Properties Step 2 Click the hyperlink entry in the Binding field to view the related properties in logical inventory. In this example, clicking the hyperlink displays the relevant bridge in logical inventory, as shown in Figure 13-14. Figure 13-14 Bridge Associated with EFP in Logical Inventory Table 13-20 describes the information displayed for an EFP associated with a bridge. Table 13-20 EFP Associated with a Bridge in Logical Inventory Field Description Name VLAN bridge name. Type VLAN bridge type. MAC Address VLAN bridge MAC address. VLAN ID VLAN bridge VLAN identifier. STP Instance STP instance information, hyperlinked to the STP entry in logical inventory. VSI VSI information, hyperlinked to the VSI entry in logical inventory. 13-35 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Viewing EFP Properties Step 3 To view EFP properties in physical inventory, navigate to the required interface in one of the following ways: • In the bridge entry in logical inventory, click the hyperlinked entry in the Binding field. • Use the procedure described in Viewing and Renaming Ethernet Flow Domains, page 13-41 to navigate to the individual interface. • In physical inventory, navigate to and then select the required interface. The EFPs tab is displayed in the content pane next to the Subinterfaces tab as shown in Figure 13-15. EFPs Table EFP ID EFP identifier. Operational State EFP operational state: Up or Down. VLAN VLAN associated with this EFP. Inner VLAN CE-VLAN identifier. Translated VLAN Translated, or mapped, VLAN identifier. Translated Inner VLAN Translated, or mapped, inner VLAN identifier. Binding Hyperlinked entry to the specific interface and EFP entry in physical inventory. Description Description for the EFP. Table 13-20 EFP Associated with a Bridge in Logical Inventory (continued) Field Description 13-36 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Viewing EFP Properties Figure 13-15 EFPs Tab in Physical Inventory Table 13-21 describes the information displayed in the EFPs tab. Table 13-21 EFPs Tab Field Description EFP ID EFP identifier. Operational State EFP operational state. VLAN VLAN identifier. Inner VLAN CE-VLAN identifier. Translated VLAN Translated VLAN identifier. Translated Inner VLAN Translated CE-VLAN identifier. Binding Hyperlinked entry to the specific bridge or pseudowire in logical inventory. Description Configured description for the EFP. 13-37 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Connecting a Network Element to an EFP Connecting a Network Element to an EFP You can add and connect network elements to an EFP under an existing aggregation for VLAN, VPLS, Pseudowire, and Ethernet Service. To connect network elements to an EFP: Step 1 Select an EFP node under the VLAN/VPLS/Pseudowire/Ethernet Service aggregation node and choose File > Add to Map > Network Element. Step 2 In the Add Network Element dialog box, search for the desired network elements and choose the network element that you want to add. The selected network element appears under the aggregation node in the navigation pane. Step 3 Right-click the EFP node and choose Topology > Connect CE Device. Step 4 Right-click the network element that you added and choose Topology > Connect to EFP. The map view displays a link between the EFP and the added network element. If required, you can remove the link, by right-clicking the link and choosing Remove Link. Step 5 To hide or show the connected network elements, right-click the EFP node and choose Hide Connected Devices or Show CE device. Understanding EFP Severity and Ticket Badges Severity and ticket badges are displayed on EFP icons as follows: • If the VLAN EFP element represents a configuration, such as a service instance on a Cisco 7600 device or an enhanced port on a Cisco ASR 9000 device, and is associated directly with a network VLAN or a bridge domain switching entity, the severity and ticket badges are based on the underlying service instance or enhanced port configuration. Figure 13-16 shows an example of a ticket badge based on a service instance. 13-38 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Understanding EFP Severity and Ticket Badges Figure 13-16 EFP Severity and Ticket Badges Based on Underlying Service Instance • If the Ethernet flow point element represents a VLAN interface for a regular switch port, the severity and ticket badges are based on the corresponding port, as shown in Figure 13-17. Figure 13-17 EFP Severity and Ticket Badges Based on Corresponding Port 13-39 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Viewing EVC Service Properties Viewing EVC Service Properties Certain EVC service properties are configured as port attributes. These attributes determine the degree of service transparency and protect the service provider’s network from protocol control traffic. Prime Network Vision discovers these key EVC service properties and displays this information in physical inventory for the following devices: • Cisco ME3400- and Cisco ME3400E-series devices running Cisco IOS versions 12.2(52)SE to 12.2(54)SE. • Cisco 3750 Metro devices running Cisco IOS versions 12.2(52)SE to 12.2(54)SE. Shared Switching Entities and EVC Service View Some switching entities that Prime Network Vision discovers are concurrently part of a network VLAN and VPLS/EoMPLS instance. These switching entities are referred to as shared switching entities. Prime Network Vision displays the switching entity information for shared switching entities only under the VPLS instances in the EVC service view. To view EVC port-related properties for the supported devices and software versions: Step 1 In Prime Network Vision, double-click the required device. Step 2 In the inventory window, choose Physical Inventory > Chassis > module > port. Figure 13-18 shows an example of a port in physical inventory configured with these EVC properties. 13-40 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Viewing EVC Service Properties Figure 13-18 EVC Port Properties in Physical Inventory Table 13-22 describes the information displayed for these properties. Table 13-22 EVC Port Properties in Physical Inventory Field Description Storm Control and Monitoring Properties Area Storm Control Status of storm control on the port: Enabled or Disabled. Port Monitoring Status Status of port monitoring: • Enabled—The switch sends keepalive messages on user network interfaces (UNIs) and enhanced network interfaces (ENIs) and does not send keep alive messages on network node interfaces (NNIs). • Disabled—The switch does not send keepalive messages. Port Monitoring Interval Keepalive interval in seconds. The default value is ten seconds. Storm Control Level Representing a percentage of the total available bandwidth of the port, the threshold at which additional traffic of the specified type is suppressed until the incoming traffic falls below the threshold. Storm Control Type Type of storm the port is configured for protection from: Broadcast, Multicast, or Unicast. 13-41 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Viewing and Renaming Ethernet Flow Domains Viewing and Renaming Ethernet Flow Domains An Ethernet flow domain represents an Ethernet access domain. The Ethernet flow domain holds all network elements between the CE (inclusive, if managed by the SP), up to the SP core (exclusive). This includes CE, access, aggregation, and distribution network elements. An Ethernet flow domain can have no N-PEs (flat VLAN) or one or more N-PEs (N-PE redundancy configuration). The Ethernet flow domain is defined using physical connectivity at the port level, and not at the network element level. STP is used to mark the root bridge, root or blocked ports, and blocked VLAN links. Security Properties Areas Port Security Status of security on the port: Enabled or Disabled. MAC Address Limit Maximum number of MAC addresses allowed on the interface. Aging Type Type of aging used for automatically learned addresses on a secure port: • Absolute—Times out the MAC address after the specified age-time has been exceeded, regardless of the traffic pattern. This is the default for any secured port, and the age-time value is set to 0. • Inactivity—Times out the MAC address only after the specified age-time of inactivity from the corresponding host has been exceeded. Aging Time Length of time, in minutes, that a MAC address can remain on the port security table. Violation Mode Action that occurs when a new device connects to a port or when a new device connects to a port after the maximum number of devices are connected: • Protect—Drops packets with unknown source addresses until a sufficient number of secure MAC addresses are removed to drop below the maximum value • Restrict—Drops packets with unknown source addresses until a sufficient number of secure MAC addresses are removed to drop below the maximum value and causes the Security Violation counter to increment. • Shutdown—Puts the interface into the error-disabled state immediately and sends an SNMP trap notification. Table 13-22 EVC Port Properties in Physical Inventory (continued) Field Description 13-42 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Viewing and Renaming Ethernet Flow Domains To view Ethernet flow domains: Step 1 In Prime Network Vision, choose Network Inventory > Ethernet Flow Domains. The Ethernet Flow Domain List window is displayed with the domain name, the system-defined domain name, and a brief description for each Ethernet flow domain as shown in Figure 13-19. Figure 13-19 Ethernet Flow Domain List Properties Window Step 2 To rename an Ethernet flow domain: a. Right-click the required domain, then choose Rename. b. In the Rename Node dialog box, enter a new name for the domain. c. Click OK. The window is refreshed, and the new name is displayed. Step 3 To view Ethernet flow domain properties, do either of the following: • Right-click the required domain, then choose Properties. • Double-click the required domain. The Ethernet Flow Domain Properties window is displayed as shown in Figure 13-20. 13-43 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Viewing and Renaming Ethernet Flow Domains Figure 13-20 Ethernet Flow Domain Properties Window Table 13-23 describes the information displayed in the Ethernet Flow Domain Properties window. Note Not all fields are available in all tables. The table contents depend on the domain type, such as FastEthernet. Step 4 To navigate to the individual interface or link aggregation group, click an interface identifier or group. The interface or link aggregation group properties are displayed in the inventory window. Table 13-23 Ethernet Flow Domain Properties Window Field Description Domain Name Name of the selected domain. System Defined Name Domain name as identified by the most dominant device and its lowest port name lexicographically. Elements Table ID Interface identifier, hyperlinked to the interface in physical inventory. Type Aggregation group type: Ethernet Channel (EtherChannel), or IEEE 8023 AD LAG (IEEE 802.3 link aggregation group). Discovery Protocols Discovery protocols used on the interface. Is ELMI Enabled Whether or not Ethernet LMI is enabled on the interface: True or False. 13-44 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with VLANs and VLAN Overlays Working with VLANs and VLAN Overlays The following topics provide information and procedures for working with VLANs and VLAN overlays: • Understanding VLAN and EFD Discovery, page 13-44 • Understanding VLAN Elements, page 13-45 • Switching Entities Containing Termination Points, page 13-49 • Adding VLANs to a Map, page 13-49 • Removing VLANs from a Map, page 13-52 • Viewing VLAN Mappings, page 13-52 • Working with Associated VLANs, page 13-54 • Viewing VLAN Links Between VLAN Elements and Devices, page 13-57 • Applying VLAN Overlays, page 13-60 • Displaying or Hiding VLAN Overlays, page 13-61 • Removing a VLAN Overlay, page 13-61 • Viewing VLAN Service Link Properties, page 13-62 • Viewing REP Information in VLAN Domain Views and VLAN Overlays, page 13-62 • Viewing REP Properties for VLAN Service Links, page 13-63 • Viewing STP Information in VLAN Domain Views and VLAN Overlays, page 13-65 • Viewing STP Properties for VLAN Service Links, page 13-66 • Viewing VLAN Trunk Group Properties, page 13-67 • Viewing VLAN Bridge Properties, page 13-69 Understanding VLAN and EFD Discovery When you start the Prime Network gateway the first time, Prime Network Vision waits for two topology cycles to complete before discovering new VLANs, VLAN associations, and EFDs. The default configured time for two topology cycles to complete is one hour, but might be configured for longer periods of time on large setups. This delay allows the system to stabilize, and provides the time needed to model devices and discover links. During this delay, Prime Network Vision does not add VNEs or apply updates to existing VLANs or EFDs. After the initial delay has passed, Prime Network Vision discovers new VLANs, VLAN associations, and EFDs, applies updates to existing VLANs, VLAN associations, and EFDs, and updates the database accordingly. When you restart the gateway, Prime Network Vision uses the persisted topology information instead of waiting two topology cycles, thus improving the discovery time for new VLANs, VLAN associations, and EFDs. 13-45 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with VLANs and VLAN Overlays Understanding VLAN Elements The following concepts are important to understand when working with the representation of edge EFPs inside VLANs: • VLAN Elements in Prime Network Vision, page 13-45 • VLANs, page 13-45 • Switching Entities, page 13-45 • Ethernet Flow Points, page 13-46 VLAN Elements in Prime Network Vision Table 13-24 describes the icons that Prime Network Vision uses to represent VLAN elements. VLANs Prime Network Vision discovers and allows you to display maps with a network-level view of VLANs. In Prime Network, a VLAN entity consists of one or more switching entities and the corresponding EFP elements. A network VLAN represents the virtual LAN. The network VLAN holds its contained switching entities and can be associated to a customer. The network VLAN also holds the Ethernet flow points that are part of the network VLAN but not part of any switching entity. For example, a port that tags ingress flows after which the flow moves to a different VLAN. Switching Entities A switching entity represents a device-level Layer 2 forwarding entity (such as a VLAN or bridge domain) that participates in a network VLAN. A switching entity is associated to a network VLAN according to its relationship to the same Ethernet Flow Domain (EFD) and the VLAN identifier. If you right-click a switching entity in Prime Network Vision and then choose Inventory, the inventory window is displayed with the corresponding bridge selected in Logical Inventory. A switching entity typically contains EFP elements. Table 13-24 VLAN Elements and Icons in Prime Network Vision Element Associated Network Element Icon Network VLAN None Switching entity Bridge Ethernet Flow Point (EFP) Ethernet port 13-46 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with VLANs and VLAN Overlays Ethernet Flow Points An Ethernet flow point (EFP) can represent a port that is configured for participation in a specific VLAN. If you right-click an EFP in Prime Network Vision and then choose Inventory, the inventory window is displayed with the corresponding port selected in Physical Inventory. EFPs that are located in a switching entity represent Ethernet ports that are configured as switch ports (in either Access, Trunk, or Dot1Q tunnel mode). Figure 13-21 shows an example of EFPs configured as switch ports in Prime Network Vision. Figure 13-21 EFPs Configured as Switch Ports EFPs that are located directly inside a VLAN represent one of the following: • Termination point EFPs—Ethernet ports that are at the edge of a Layer 2 domain flow, such as a VLAN, on which traffic enters a Layer 3 domain or a different Layer 2 domain, such as EoMPLS. These ports are found on such devices as the Cisco 7600 series, Cisco GSR, and Cisco ASR 9000 series devices. These EFPs are typically connected to a switching entity inside the VLAN by a VLAN link, as shown in Figure 13-22. 13-47 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with VLANs and VLAN Overlays Figure 13-22 Termination Point EFP Inside a VLAN • Edge EFPs—A subset of EFPs that exist inside a switching entity but that are not connected to other EFPs and that represent edge EFPs in the context of the VLAN. 13-48 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with VLANs and VLAN Overlays In Prime Network Vision, edge EFPs are displayed directly under the VLAN at the same level as their switching entities and are connected to their corresponding switching entities by a dotted link, as shown in Figure 13-23. Figure 13-23 Edge EFP Inside a VLAN 13-49 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with VLANs and VLAN Overlays An edge EFP can be displayed both inside and outside of its switching entity, as shown (highlighted with a red outline) in Figure 13-24: Figure 13-24 Edge EFPs Displayed Inside and Outside of Switching Entities You can delete EFPs and switching entities that have a reconciliation icon by right-clicking them and choosing Delete. After all switching entities and EFPs are deleted from a network VLAN, the empty network VLAN is automatically deleted from Prime Network Vision after a few minutes. Switching Entities Containing Termination Points For some devices, such as Cisco 7600 series, Cisco GSR, and Cisco ASR 9000 series devices, the related switching entities can contain Ethernet flow point elements that serve as termination points on different network VLANs. If a single map contains both the switching entities and the network VLANs, a link is displayed between them. Adding VLANs to a Map You can add VLANs to a map if the VLANs were previously discovered by Prime Network Vision and are not currently displayed in the map. Note Adding VLANs affects other users if they are working with the same map. 13-50 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with VLANs and VLAN Overlays To add VLANs to a map: Step 1 In Prime Network Vision, display the map to which you want to add the VLANs. Step 2 Choose File > Add to Map > VLAN. The Add VLAN to map dialog box is displayed as shown in Figure 13-25. Figure 13-25 Add VLAN Dialog Box Step 3 In the Add VLAN dialog box, do either of the following: • Choose a search category, enter a search string, then click Go to narrow the VLAN display to a range of VLANs or a specific VLAN. The search condition is “contains.” Search strings are case-insensitive. For example, if you choose the Name category and enter “net,” Prime Network Vision displays VLANs that have “net” anywhere in their names. The string “net” can be at the beginning, the middle, or end of the name, such as Ethernet. • Choose Show All to display all the VLANs. Step 4 Select the VLANs that you want to add to the map. Tip Press Shift or Ctrl to choose multiple adjoining or nonconsecutive VLANs. Step 5 Click OK. The VLANs are displayed in the Prime Network Vision content pane as shown in Figure 13-26. Any tickets that apply to the VLANs are displayed in the ticket pane. 13-51 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with VLANs and VLAN Overlays Figure 13-26 VLANs in Map View After you add a VLAN to a map, you can use Prime Network Vision to view its switching entities and Ethernet flow points. For more information, see: • Viewing and Renaming Ethernet Flow Domains, page 13-41 • Viewing EFP Properties, page 13-32 You can view additional information about REP and STP in logical inventory, VLAN domain views, and VLAN overlays. For REP, see: • Viewing Resilient Ethernet Protocol Properties, page 13-14 • Viewing REP Information in VLAN Domain Views and VLAN Overlays, page 13-62 • Viewing REP Properties for VLAN Service Links, page 13-63 For STP, see: • Viewing Spanning Tree Protocol Properties, page 13-10 • Viewing STP Information in VLAN Domain Views and VLAN Overlays, page 13-65 • Viewing STP Properties for VLAN Service Links, page 13-66 13-52 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with VLANs and VLAN Overlays Removing VLANs from a Map You can remove one or more VLANs from the current map. This change does not affect other maps. Removing a VLAN from a map does not remove it from the Prime Network database. You can add the VLAN to the map at any time. When removing VLANs from maps, keep the following in mind: • Removing a VLAN affects other users who are working with the same map view. • This option does not change the business configuration or database. • You cannot remove virtual routers or sites from the map without removing the VLAN. To remove a VLAN, in the Prime Network Vision navigation pane or map view, right-click the VLAN and choose Remove from Map. The VLAN is removed from the navigation pane and map view along with all VLAN elements such as connected CE devices. Remote VLANs (extranets) are not removed. Viewing VLAN Mappings VLAN mapping, or VLAN ID translation, is used to map customer VLANs to service provider VLANs. VLAN mapping is configured on the ports that are connected to the service provider network. VLAN mapping acts as a filter on these ports without affecting the internal operation of the switch or the customer VLANs. If a customer wants to use a VLAN number in a reserved range, VLAN mapping can be used to overlap customer VLANs by encapsulating the customer traffic in IEEE 802.1Q tunnels. To view VLAN mappings: Step 1 In Prime Network Vision, double-click the device with VLAN mappings configured. Step 2 In the inventory window, choose Physical Inventory > Chassis > slot > port. Step 3 Click VLAN Mappings next to the Subinterfaces tab in the lower portion of the content pane. The VLAN Mappings tab is displayed as shown in Figure 13-27. 13-53 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with VLANs and VLAN Overlays Figure 13-27 VLAN Mappings Tab in Physical Inventory Table 13-25 describes the information that is displayed in the VLAN Mappings table. Table 13-25 VLAN Mappings Table Field Description Direction Whether the VLAN mapping is defined in the incoming or outgoing direction: In or Out. VLAN Customer-side VLAN identifier. Inner VLAN Used for two-to-one mappings, the customer-side inner VLAN identifier. Translated VLAN Translated, or mapped, service-provider side VLAN identifier. Translated Inner VLAN Translated, or mapped, service-provider side inner VLAN identifier. Action Action taken if the VLAN traffic meets the specified mapping: Translate or Drop. 13-54 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with VLANs and VLAN Overlays Working with Associated VLANs Prime Network Vision discovers associations between network VLANs and displays the information in Prime Network Vision. Network VLAN associations are represented by VLAN service links, and can be any of the tag manipulation types described in Table 13-26. When working with VLANs, you can: • Add an associated VLAN—See Adding an Associated VLAN, page 13-54. • View properties for associated VLANs—See Viewing Associated Network VLAN Service Links and VLAN Mapping Properties, page 13-56. Adding an Associated VLAN To add an associated VLAN to an existing VLAN in a map: Step 1 In Prime Network Vision, select the required VLAN in the map view. Step 2 Right-click the VLAN and choose Add Associated VLAN. The Add Associated VLAN table is displayed as shown in Figure 13-28. Table 13-26 Types of Tag Manipulations in VLAN Associations VLAN Tag Manipulation Description Example One-to-one One VLAN tag is translated to another VLAN tag. VLAN tag 100 > VLAN tag 200 Two-to-two • Two VLAN tags exist and both are translated to other tags. • Two VLAN tags exist, but tag manipulation is applied only to the outer tag. • Inner tag 100, Outer tag 101 > Inner tag 200, Outer tag 201 • Inner tag 100, Outer tag 101 > Inner tag 100, Outer tag 201 One-to-two One VLAN tag exists and an additional tag is inserted into the packet. VLAN tag 100 > Inner tag 100, Outer tag 101 13-55 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with VLANs and VLAN Overlays Figure 13-28 Add Associated VLAN Window In this example, the selected network VLAN has one associated VLAN: VLAN-1742. Table 13-27 describes the information displayed in the Add Associated VLAN table. Step 3 Select the required VLAN in the Add Associated VLAN table, then click OK. The associated network VLAN is added to the map in Prime Network Vision. Table 13-27 Add Associated VLAN Table Field Description Name Name of the VLAN. ID VLAN identifier. EFD Name Name of the Ethernet flow domain. EFD System Name Name that Prime Network assigns to the EFD. System Name Name that Prime Network assigns to the VLAN. Description Brief description of the VLAN. 13-56 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with VLANs and VLAN Overlays Viewing Associated Network VLAN Service Links and VLAN Mapping Properties After you add an associated network VLAN, you can: • View the associated network VLAN service links in Prime Network Vision in the thumbnail view. • View VLAN mapping properties in the Link Properties window. To view associated network VLAN service links and VLAN mapping properties: Step 1 Select the required network VLAN in the map view. Step 2 Right-click the VLAN, then choose Show Thumbnail. Figure 13-29 shows an example of a network VLAN in a thumbnail. The VLAN service links are displayed as lines between the associated network VLANs. The links represent the connections between the Ethernet flow points that are part of each network VLAN. Figure 13-29 VLAN Service Links Between Associated Network VLANs Step 3 To view additional information, right-click a link, and choose Properties. The Link Properties window is displayed as shown in Figure 13-30. 13-57 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with VLANs and VLAN Overlays If VLAN tag manipulation is configured on the link, the VLAN Mapping Properties area in the Link Properties window displays the relevant information. For example, in Figure 13-30, the VLAN Mapping Properties area shows that a one-to-one VLAN mapping for VLAN tag 1709 to VLAN tag 709 is configured on GigabitEthernet1/1/1 on c7-sw8 on the egress direction. Figure 13-30 VLAN Mapping Properties in Link Properties Window For additional information about viewing network VLAN service link properties, see: • Viewing REP Properties for VLAN Service Links, page 13-63 • Viewing STP Properties for VLAN Service Links, page 13-66 Viewing VLAN Links Between VLAN Elements and Devices If a Prime Network Vision map contains a VLAN and the network element on which the VLAN is configured, along with EFPs, switching entities, or network VLANs, you might see what appear to be multiple associations between the logical and physical entities. Actually, however, you are seeing other views of the original VLAN link. For example, assume that you have the following situation, as shown in Figure 13-31 and described in the following paragraphs. 13-58 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with VLANs and VLAN Overlays Figure 13-31 VLAN Elements and Devices in Prime Network Vision The elements are configured as follows: • Port GigabitEthernet1/1/2 on element c7-sw10 is connected to port GigabitEthernet1/1/2 on element c7-sw8 by an Ethernet topology link. • Port GigabitEthernet1/1/2 on element c7-sw10 is a trunk port associated with VLAN-1704 which is configured on element c7-sw10. • Port GigabitEthernet1/1/2 on element c7-sw8 is a trunk port associated with VLAN-704 which is configured on element c7-sw8. • Port GigabitEthernet1/1/2 on element c7-sw8 has a VLAN mapping to tunnel VLAN-1704 (C-VLAN) in VLAN-704 (SP-VLAN). In this example, VLAN discovery identified two network VLANs: VLAN-1704 and VLAN-704. Each of these network VLANs contains a switching entity and an EFP that represent the connected ports, GigabitEthernet1/1/2@c7-sw10 and GigabitEthernet1/1/2@c7-sw8, respectively. The four links in the map are identified in Figure 13-32 and described in the following table. 13-59 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with VLANs and VLAN Overlays Figure 13-32 Links Between VLAN Elements and Devices The key point is that a link between a VNE and EFP, switching entity, or network VLAN does not represent an association between the VNE and the logical element. Such a link is simply another view of the VLAN link. If the thumbnail view is closed, instead of a link between the VNE and EFP, you will see a link between the VNE and the switching entity or network VLAN. 1 The Ethernet topological link between port GigabitEthernet1/1/2 on VNE c7-sw10 and GigabitEthernet1/1/2 on VNE c7-sw8. 2 The VLAN link between GigabitEthernet1/1/2@c7-sw10 EFP and GigabitEthernet1/1/2@c7-sw8 EFP. 3 Another view of the VLAN link (link 2), shown as a link between GigabitEthernet1/1/2@c7-sw10 EFP and GigabitEthernet1/1/2@c7-sw8 EFP. 4 Another view of the VLAN link (link 2), shown as a link between GigabitEthernet1/1/2@c7-sw10 EFP and GigabitEthernet1/1/2@c7-sw8 EFP. 13-60 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with VLANs and VLAN Overlays Applying VLAN Overlays You can create an overlay of a specific VLAN on top of the physical network elements displayed in a map view. The overlay highlights the network elements and links that the selected VLAN and its associated VLANs traverse. Network elements and links that are not part of the VLAN are dimmed in the map view. The VLAN overlay is a snapshot of the network to help you visualize the network elements and links connected to a VLAN. The overlay displays STP and REP link and port information. If you select a network VLAN that is associated with other VLANs, the associated VLANs are included in the overlay. The VLAN service overlay allows you to isolate the parts of a network that are being used by a particular service. This information can then be used for troubleshooting. For example, the overlay can highlight configuration or design problems when bottlenecks occur and all site interconnections use the same link. To add a VLAN overlay: Step 1 Display the network map for which you want to create an overlay in Prime Network Vision. Step 2 In the toolbar, choose Choose Overlay Type > VLAN. Step 3 In the Select VLAN Overlay dialog box, do either of the following: • Choose a search category, enter a search string, then click Go to narrow the selection to a set of overlays or a specific overlay. The search condition is “contains.” Search strings are case-insensitive. For example, if you choose the Name category and enter “net,” Prime Network Vision displays overlays that have “net” in their names. The string “net” can be at the beginning, middle, or end of the name, such as Ethernet. • Choose Show All to view all overlays. Step 4 Select an overlay, then click OK. The network elements and physical links used by the selected VLAN overlay are highlighted in the network map. All other network elements and links are dimmed. The VLAN name is displayed in the title of the window. See Figure 13-33. 13-61 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with VLANs and VLAN Overlays Figure 13-33 VLAN Overlay Example Note The overlay is a snapshot taken at a specific point in time. As a result, the information in the overlay might become stale. To update the overlay, click Refresh the Last Selected Overlay in the toolbar. Displaying or Hiding VLAN Overlays After you create a VLAN overlay, you can hide it by clicking Hide Overlay in the toolbar. All previously dimmed network elements and links are displayed. To display the overlay, click Show Overlay. Note The Overlay icon toggles between Show Overlay and Hide Overlay. When selected, the VLAN overlay is displayed and the Hide Overlay tool is active. When deselected, the VLAN overlay is hidden and the Show Overlay tool is active. Removing a VLAN Overlay To remove a VLAN overlay from a map, choose Choose Overlay Type > None in the toolbar. The overlay is removed from the map, and the Show Overlay/Hide Overlay icon is dimmed. 13-62 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with VLANs and VLAN Overlays Viewing VLAN Service Link Properties See the following topics for information on viewing VLAN service link properties: • Viewing REP Properties for VLAN Service Links, page 13-63 • Viewing STP Properties for VLAN Service Links, page 13-66 • Viewing Associated Network VLAN Service Links and VLAN Mapping Properties, page 13-56 Viewing REP Information in VLAN Domain Views and VLAN Overlays You can view REP segment and port information in Prime Network Vision in the map view. The icons displayed depend on whether you view the REP information in the VLAN domain view or in a VLAN overlay. Table 13-28 describes the icons and badges used to represent REP segment and port information. Table 13-28 REP Icons and Badges in VLAN Domain Views and Overlays Item Description VLAN Domain View VLAN Overlay REP identifier—Uses the format REP-id where id represents the REP segment identifier. The REP identifier is displayed in the domain view if the visual link represents only one link. f the visual link represents more than one link, no REP identifier is displayed. The REP identifier is displayed in a VLAN overlay view if all the links represented by the visual link are from the same source to the same destination. REP No Neighbor segment— Indicates that the specified segment has no neighbor. REP identifier for incorrect configuration—Indicates that the two sides of the link are configured differently or incorrectly. 13-63 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with VLANs and VLAN Overlays Viewing REP Properties for VLAN Service Links To view REP properties for a VLAN service link, open the Link Properties window in either of the following ways: • Double-click the VLAN service link. • Right-click the VLAN service link, and choose Properties. Figure 13-34 shows an example of the Link Properties window with REP information. Multiple links with badges icon—Indicates that one or more link is represented by the visual link and at least one of the links contains a badge. The multiple links icon is displayed in the domain view if more than one link is represented by the visual link and at least one of the links contains a badge. The multiple links icon is displayed in a VLAN overlay view if either of the following is true: • More than one link is represented by the visual link and the links have different sources or destinations. • A badge or REP identifier exists on a sublink. REP primary badge—Indicates a REP primary port. Blocking badge—Indicates a REP alternate port. Primary and blocking badge—Indicates a REP primary port that is also blocking. Table 13-28 REP Icons and Badges in VLAN Domain Views and Overlays (continued) Item Description VLAN Domain View VLAN Overlay 13-64 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with VLANs and VLAN Overlays Figure 13-34 VLAN Service Link Properties Window with REP Information Table 13-29 describes the information that is displayed for REP for each end of the link. Table 13-29 REP Properties in VLAN Service Link Properties Window Field Description Segment ID REP segment identifier. Port Type Port type: Primary Edge, Secondary Edge, or Intermediate. Port Role Role or state of the REP port depending on its link status and whether it is forwarding or blocking traffic: Failed, Alternate, or Open. Port Status Operational link state of the REP port: None, Init Down, No Neighbor, One Way, Two Way, Flapping, Wait, or Unknown. 13-65 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with VLANs and VLAN Overlays Viewing STP Information in VLAN Domain Views and VLAN Overlays You can view STP segment and port information in Prime Network Vision in the map view. The icons displayed depend on whether you view the STP information in the VLAN domain view or in a VLAN overlay. Table 13-30 describes the icons and badges used to represent STP link and port information. To view additional STP information in a VLAN overlay, right-click an STP link and choose Show Callouts. The following STP port information is displayed as shown in Figure 13-35: • Port name • Port role • Port state Figure 13-35 STP Link Information in a VLAN Overlay Table 13-30 STP Information in VLAN Domain Views and Overlays Item Description VLAN Domain View VLAN Overlay The STP root bridge, or root of the STP tree, is indicated by an uppercase R. An STP root port is the port at the root of the STP tree. Each switching entity in the network VLAN should have a port designated as the root port. The STP root port is indicated by an uppercase R on the Ethernet flow point that is designated the root port. STP blocks some VLAN ports to ensure a loop-free topology. The blocked port is marked with a red deny badge on the side on which traffic is denied. 13-66 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with VLANs and VLAN Overlays Viewing STP Properties for VLAN Service Links To view STP properties for a VLAN service link, open the Link Properties window in one of the following ways: • Double-click the VLAN service link. • Right-click the VLAN service link, and choose Properties. Figure 13-36 shows an example of the Link Properties window with STP information. Figure 13-36 STP Properties in VLAN Service Link Properties Window Table 13-31 describes the information that is displayed for STP for the VLAN service link. Table 13-31 STP Properties in VLAN Service Link Properties Window Field Description Port State STP port state: Disabled, Blocking, Listening, Learning, or Forwarding, Port Role STP port role: Unknown, Backup, Alternative, Designated, Root, or Boundary. 13-67 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with VLANs and VLAN Overlays Viewing VLAN Trunk Group Properties VTP is a Layer 2 multicast messaging protocol that manages the addition, deletion, and renaming of VLANs on a switched network-wide basis. Prime Network Vision displays VTP information in the logical inventory. VTP information is shown only for Cisco devices that support VTP, and support is provided only for VTP Version 1 and 2. Support for Version 3 is limited to the additional attributes that are supported by the version, such as primary and secondary server. No support is provided for the display of VTP information at the port (trunk) level. Prime Network Vision shows all VTP modes: Server, Client, Transparent, and Off. For each mode, Prime Network Vision displays the relevant mode information such as VTP domain, VTP mode, VTP version, VLAN trunks, and the trunk encapsulation. Prime Network Vision also displays VTP domain information in a view that includes a list of all switches that are related to these domains, their roles (server, client, and so on), and their VTP properties. To view VTP properties: Step 1 In Prime Network Vision, choose Network Inventory > VTP Domains. Step 2 Double-click the VTP domain you want to view. The VTP Domain Properties window is displayed as shown in Figure 13-37. Figure 13-37 VTP Domain Properties Window in Logical Inventory 13-68 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with VLANs and VLAN Overlays Table 13-32 describes the information that is displayed in the VTP Domain Properties window. Step 3 To view the VTP properties at the device, double-click the VTP domain. Table 13-33 describes the VTP information that is displayed in the inventory window content pane. Table 13-32 VTP Domain Properties Window Field Description Managed Element Managed element name, hyperlinked to VTP in logical inventory. Operating Mode VTP operating mode: • Server—Allows VLAN creation, modification, and deletion, and specification of other configuration parameters for the entire VTP domain. Server is the default mode. • Client—Same behavior as VTP server, except VLANs cannot be created, changed, or deleted. • Transparent—The device does not participate in the VTP. The device does not advertise its VLAN configuration and does not synchronize its VLAN configuration based on received advertisements. However, the device forwards received VTP advertisements out of their trunk ports in VTP Version 2. • Off—The device does not participate in VTP and does not forward VTP advertisements. Process Status Status of the VTP process: Running or Disabled. Authentication Enabled Whether or not VTP authentication is enabled: True or False. Authentication ensures authentication and integrity of switch-to-switch VTP messages. VTP Version 3 introduces an additional mechanism to authenticate the primary VTP server as the only device allowed to change the VLAN configuration on a network-wide basis. Configuration Revision 32-bit number that indicates the level of revision for a VTP packet. Each VTP device tracks the VTP configuration revision number that is assigned to it. Most VTP packets contain the VTP configuration revision number of the sender. Version VTP version: 1, 2, or 3. Table 13-33 VTP Properties in Inventory Field Description Operating Mode VTP operating mode: Server, Client, Transparent, or Off. Domain Name VTP domain name. Version VTP version: 1, 2, or 3. Pruning Whether or not VTP pruning is enabled: True or False. VTP pruning increases available bandwidth by restricting flooded traffic to those trunk links that the traffic must use to access the appropriate network devices. 13-69 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with VLANs and VLAN Overlays Step 4 When finished, press Ctrl + F4 to close each VTP properties window. Viewing VLAN Bridge Properties You can view VLAN bridges provisioned on a device by displaying the device in the Prime Network Vision inventory window and choosing Bridges in logical inventory. To view VLAN bridge properties: Step 1 In Prime Network Vision, double-click the device containing the VLAN bridges you want to view. Step 2 In the inventory window, choose Logical Inventory > Bridges > bridge. VLAN bridge properties are displayed as shown in Figure 13-38. Figure 13-38 VLAN Bridge Properties in Logical Inventory Configuration Revision 32-bit number that indicates the level of revision for a VTP packet. Authentication Whether or not VTP authentication is enabled: True or False. Table 13-33 VTP Properties in Inventory (continued) Field Description 13-70 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with VLANs and VLAN Overlays Table 13-34 describes the information that is displayed. Depending on the bridge configuration, any of the tabs might be displayed for the selected bridge. Table 13-34 VLAN Bridge Properties Field Description Name VLAN bridge name. Type VLAN bridge type. MAC Address VLAN bridge MAC address. VLAN ID VLAN bridge VLAN identifier. STP Instance STP instance information, hyperlinked to the STP entry in logical inventory. Bridge Table Tab MAC Address Bridge MAC address. Port Port associated with the bridge, hyperlinked to the interface in physical inventory. Interfaces Tab ID VLAN interface identifier, hyperlinked to the interface in physical inventory. Type VLAN interface type, such as Layer 2 VLAN. Mode VLAN interface configuration mode: • Unknown—The interface is not VLAN aware. • Access—Puts the interface into permanent nontrunking mode and negotiates to convert the link into a nontrunk link. The interface becomes nontrunking. • Dynamic Auto—The interface can convert the link to a trunk link. The interface becomes a trunk if the neighbor interface is set to Trunk or Dynamic Desirable mode. • Dynamic Desirable—The interface actively attempts to convert the link to a trunk link. The interface becomes a trunk if the neighboring interface is set to Trunk, Dynamic Desirable, or Dynamic Auto mode. Dynamic Desirable is the default mode for all Ethernet interfaces. • Trunk—Puts the interface into permanent trunking mode and negotiates to convert the link into a trunk link. The interface becomes a trunk interface even if the neighbor interface is not a trunk interface. • Dot1Q Tunnel—Configures the interface as a tunnel (nontrunking) port to be connected in an asymmetric link with an 802.1Q trunk port. 802.1Q tunneling is used to maintain customer VLAN integrity across a service provider network. Native VLAN ID VLAN Identifier (VID) associated with this VLAN. The range of the VLAN ID is 1 to 4067. VLAN Encapsulation Type Type of encapsulation configured on the VLAN, such as IEEE 802.1Q. 13-71 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with VLANs and VLAN Overlays Step 3 When finished, press Ctrl + F4 to close each VLAN Bridge properties window. Using Commands to Work With VLANs The following commands can be launched from the physical inventory by right-clicking an Ethernet slot and choosing Commands > Configuration. Before executing any commands, you can preview them and view the results. If desired, you can also schedule the commands. To find out if a device supports these commands, see the Cisco Prime Network 3.10 Supported Cisco VNEs. Allowed VLANs List of the VLANs allowed on this VLAN interface. VLAN Encapsulation Admin Type VLAN administration encapsulation type, such as IEEE 802.1Q. EFPs Tab EFP ID EFP identifier. Operational State EFP operational state. VLAN VLAN identifier. Inner VLAN CE-VLAN identifier. Translated VLAN Translated VLAN identifier. Translated Inner VLAN Translated CE-VLAN identifier. Binding Port Hyperlinked entry to the port in physical inventory. Description Brief description of the EFP. Pseudowires Tab ID Pseudowire identifier, hyperlinked to the VLAN entry in Bridges in logical inventory. Peer Identifier of the pseudowire peer, hyperlinked to the entry in the Pseudowire Tunnel Edges table in logical inventory. Tunnel ID Tunnel identifier. Tunnel Status Status of the tunnel: Up or Down. Peer Router IP IP address of the peer router for this pseudowire. Sub Interfaces Tab BER VLAN bit error rate. Interface Name Interface on which the VLAN is configured. VLAN Type Type of VLAN, such as Bridge or IEEE 802.1Q. Operational State Subinterface operational state. VLAN ID VLAN identifier. Inner VLAN CE-VLAN identifier. Table 13-34 VLAN Bridge Properties (continued) Field Description 13-72 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Understanding Unassociated Bridges These commands are applicable only for Cisco ASR 5000 series network elements. Note You might be prompted to enter your device access credentials while executing a command. Once you have entered them, these credentials will be used for every subsequent execution of a command in the same GUI client session. If you want to change the credentials, click Edit Credentials. Edit Credentials button will not be available for SNMP commands or if the command is scheduled for a later time. Understanding Unassociated Bridges Some switching entities might not belong to a flow domain, such as a network VLAN, a VPLS instance, or a network pseudowire. These switching entities are referred to as unassociated bridges. In addition, a switching entity that belongs to a network VLAN is considered an unassociated bridge if it meets both of the following criteria: • The network VLAN contains a null Ethernet flow domain (EFD). • The switching entity contains no switch ports. Unassociated bridge switching entities can hold Ethernet flow points that serve as termination points on different network VLANs. If these switching entities are added to a map with the relevant VLANs, the links are displayed in the Prime Network Vision map. Adding Unassociated Bridges Prime Network Vision enables you to add unassociated bridges to maps and to view their properties. To add an unassociated bridge to a map: Step 1 In Prime Network Vision, select the required map or domain. Step 2 Open the Add Unassociated Bridge dialog box in one of the following ways: • Choose File Add to Map > Unassociated Bridge. • In the toolbar, click Add to Map and choose Unassociated Bridge. Figure 13-39 shows an example of the Add Unassociated Bridge dialog box. Table 13-35 VLAN Commands Command Inputs Required and Notes Create VLAN VLAN ID, VLAN Context Name, Bind Interface Name, Status Modify VLAN VLAN ID, Delete Bind Interface, Context Name, Bind Interface Name, Status Delete VLAN VLAN ID 13-73 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Understanding Unassociated Bridges Figure 13-39 Add Unassociated Bridge Dialog Box Step 3 In the Add Unassigned Bridge to domain dialog box, select the required bridge and click OK. The map is refreshed and displays the newly added bridge as shown in Figure 13-40. 13-74 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with Ethernet Flow Point Cross-Connects Figure 13-40 Unassociated Bridge in Prime Network Vision Working with Ethernet Flow Point Cross-Connects Prime Network Vision automatically discovers Ethernet flow point (EFP) cross-connects, also known as locally switched EFPs. Prime Network Vision also identifies changes in already identified EFP cross-connects, such as cross-connect deletions or changes. Cross-connect changes can occur when one side of the cross-connect is removed or replaced. Prime Network Vision also associates the VLANs that contain the EFPs that are part of the cross-connects. If the cross-connect contains a range EFP, which represents a range of VLANs, and you add the related VLANs to a map, Prime Network Vision displays the links between them and the cross-connect as well. Prime Network Vision enables you to add EFP cross-connects to maps and to view their properties in inventory, as described in the following topics: • Adding EFP Cross-Connects, page 13-75 • Viewing EFP Cross-Connect Properties, page 13-75 13-75 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with Ethernet Flow Point Cross-Connects Adding EFP Cross-Connects To add an EFP cross-connect to a map: Step 1 In Prime Network Vision, select the map to which you wish to add the cross-connect. Step 2 Open the Add EFP Cross-Connect dialog box in one of the following ways: • Choose File Add to Map > Cross Connect. • In the toolbar, click Add to Map and choose Cross Connect. Step 3 In the Add EFP Cross Connect to domain dialog box, select the required EFP cross-connect and click OK. The map is refreshed and displays the newly added EFP cross-connect. Viewing EFP Cross-Connect Properties To view EFP cross-connect properties in Prime Network Vision, do either of the following: • Select the EFP cross-connect with the properties you want to view, and choose Node > Properties. • Double-click the device configured with an EFP cross-connect and, in the inventory window, choose Logical Inventory > Local Switching > Local Switching Entity. The information that is displayed for EFP cross-connects is the same in both the Local Switching Entry Properties window and in the Local Switching Table in logical inventory (as shown in Figure 13-41). 13-76 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with Ethernet Flow Point Cross-Connects Figure 13-41 Local Switching Table in Logical Inventory Table 13-36 describes the information displayed for the EFP cross-connects in the Local Switching Table. Table 13-36 EFP Cross-Connect Properties in Local Switching Table Field Description Key Entry key for the cross-connect group. Entry Status Status of the cross-connect: Down, Unresolved, or Up. Segment 1 Identifier of the first cross-connect segment, hyperlinked to the relevant entry in physical inventory. Segment 1 Port Name Identifier of the first cross-connect segment port. Segment 1 Status Status of the first cross-connect segment, such as Admin Up, Admin Down, Oper Down, or Up. Segment 2 Identifier of the second cross-connect segment, hyperlinked to the relevant entry in physical inventory. Segment 2 Port Name Identifier of the second cross-connect segment port. Segment 2 Status Status of the second cross-connect segment, such as Admin Up, Admin Down, Oper Down, or Up. 13-77 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with VPLS and H-VPLS Instances Working with VPLS and H-VPLS Instances Virtual Private LAN Service (VPLS) is a Layer 2 VPN technology that provides Ethernet-based multipoint-to-multipoint communication over MPLS networks. VPLS allows geographically dispersed sites to share an Ethernet broadcast domain by connecting sites through pseudowires. The network emulates a LAN switch or bridge by connecting customer LAN segments to create a single bridged Ethernet LAN. Hierarchical VPLS (H-VPLS) partitions the network into several edge domains that are interconnected using an MPLS core. The edge devices learn only of their local N-PE devices and therefore do not need large routing table support. The H-VPLS architecture provides a flexible architectural model that enables Ethernet multipoint and point-to-point Layer 2 VPN services, as well as Ethernet access to Layer 3 VPN services, enabling service providers to offer multiple services across a single high-speed architecture. Prime Network Vision discovers the following VPLS-related information from the network and constructs VPLS instances: • VSIs • Pseudowires • EFPs • Switching entities Working with VPLS and H-VPLS in Prime Network Vision Prime Network Vision enables you to: • Add VPLS instances to a map—See Adding VPLS Instances to a Map, page 13-78. • Apply VPLS overlays—See Applying VPLS Instance Overlays, page 13-79. • View link details in VPLS overlays—See Viewing Pseudowire Tunnel Links in VPLS Overlays, page 13-81. • View VPLS-related properties—See the following topics: – Viewing VPLS Instance Properties, page 13-83 – Viewing Virtual Switching Instance Properties, page 13-84 – Viewing VPLS Core or Access Pseudowire Endpoint Properties, page 13-86 – Viewing VPLS Access Ethernet Flow Point Properties, page 13-88 You can delete a VPLS forward from Prime Network Vision if it is displayed with the reconciliation icon. 13-78 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with VPLS and H-VPLS Instances Adding VPLS Instances to a Map You can add the VPLS instances that Prime Network Vision discovers to maps as required. To add a VPLS instance to a map: Step 1 In Prime Network Vision, select the required map or domain. Step 2 Open the Add VPLS Instance to map dialog box in either of the following ways: • In the toolbar, choose Add to Map > VPLS. • In the menu bar, choose File > Add to Map > VPLS. Step 3 In the Add VPLS Instance dialog box, do either of the following: • To search for specific elements: a. Choose Search. b. To narrow the display to a range of VPLS instances or a group of VPLS instances, enter a search string in the search field. c. Click Go. For example, if you enter VPLS1, the VPLS instances that have names containing the string VPLS1 are displayed. • To view all available VPLS instances, choose Show All and click Go. The VPLS instances that meet the specified search criteria are displayed in the Add VPLS Instance dialog box in table format. The dialog box also displays the date and time at which the list was generated. To update the list, click Refresh. Note If an element is not included in your scope, it is displayed with the locked device icon. For information about sorting and filtering the table contents, see Filtering and Sorting Tabular Content, page 2-40. Step 4 In the Add VPLS Instance dialog box, select the instances that you want to add. You can select and add multiple instances by pressing Ctrl while selecting individual instances or by pressing Ctrl +Shift to select a group of instances. Step 5 Click OK. The VPLS instance is displayed in the navigation pane and in the content area. In addition, any associated tickets are displayed in the ticket pane. See Figure 13-42. 13-79 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with VPLS and H-VPLS Instances Figure 13-42 VPLS Instance in Prime Network Vision Map The VPLS instance information is saved with the map in the Prime Network database. Applying VPLS Instance Overlays An VPLS instance overlay allows you to isolate the parts of a network that are being used by a specific VPLS instance. To apply a VPLS instance overlay: Step 1 In Prime Network Vision, choose the map in which you want to apply an overlay. Step 2 From the toolbar, choose Choose Overlay Type > VPLS. Figure 13-43 shows an example of the Select VPLS Instance Overlay for map dialog box. 13-80 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with VPLS and H-VPLS Instances Figure 13-43 Select VPLS Instance Overlay Dialog Box Step 3 Select the required VPLS instance for the overlay. Step 4 Click OK. The elements being used by the selected VPLS instance are highlighted in the map while the other elements are dimmed, as shown in Figure 13-44. 13-81 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with VPLS and H-VPLS Instances Figure 13-44 VPLS Instance Overlay in Prime Network Vision Step 5 To hide and view the overlay, click Hide Overlay/Show Overlay in the toolbar. The button toggles depending on whether the overlay is currently displayed or hidden. Step 6 To remove the overlay, choose Choose Overlay Type > None. Viewing Pseudowire Tunnel Links in VPLS Overlays When a VPLS overlay is applied to a map in Prime Network Vision, you can view the details of the pseudowires that are interconnected through selected links. To view unidirectional or bidirectional pseudowire traffic links when a VPLS overlay is applied to a map: Step 1 Right-click the required link in the overlay, and choose Show Callouts. The link must be visible (not dimmed) in the map. Link information is displayed as shown in Figure 13-45. Figure 13-45 Link Callout Window for a VPLS Overlay 13-82 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with VPLS and H-VPLS Instances The callout window displays the following information for each link represented by the selected link: • Link details and direction. • Details of the sites using the link and the interlinks. Step 2 To view the pseudowire link details, double-click the yellow callout window. The details about the link are displayed in the Link Details window as shown in Figure 13-46. Figure 13-46 Link Details Window for a VPLS Overlay The Link Details window provides the following information: Step 3 Click OK to close the Link Details window. Step 4 To close the link callout window, right-click the selected link, then choose Hide Callouts. Viewing VPLS-Related Properties Prime Network Vision enables you to view the properties of the following VPLS-related elements: • VPLS instances—See Viewing VPLS Instance Properties, page 13-83. • Virtual Switching Instances—Viewing Virtual Switching Instance Properties, page 13-84 • Tunnels—See Viewing VPLS Core or Access Pseudowire Endpoint Properties, page 13-86. • Port connectors—See Viewing VPLS Access Ethernet Flow Point Properties, page 13-88. 1 Link details and direction. In this example, the link is from p1 to p2. 3 Link details and direction. In this example, the link is from p2 to p1. 2 and 4 Details of the pseudowire tunnel traversing this link. 13-83 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with VPLS and H-VPLS Instances Viewing VPLS Instance Properties To view the properties of a VPLS instance in Prime Network Vision, open the VPLS Instance Properties window in either of the following ways: • In the navigation pane or the map pane, right-click the VPLS instance and choose Properties. • In the navigation pane or the map pane, select the VPLS instance and choose Node > Properties. Figure 13-47 shows an example of the VPLS Instance Properties window. Figure 13-47 VPLS Instance Properties Window Table 13-37 describes the information that is displayed for VPLS instance properties. The tabs that appear in the window depend on the VPLS instance and its configuration. Table 13-37 VPLS Instance Properties Field Description System Name Name that Prime Network Vision assigns to the VPLS instance. Name User-defined name of the VPLS instance. When the VPLS instance is created, the system name and this name are the same. If you change the name of the VPLS instance (right-click, then choose Rename), the changed name appears in this field whereas the system name retains the original name. VPN ID VPN identifier used in an MPLS network to distinguish between different VPLS traffic. VPLS Forwards Tab Name User-defined name of the VPLS forward. System Name Name that Prime Network Vision assigns to the VPLS forward. Bridge Bridge that the VSI is configured to use, hyperlinked to the bridge table in logical inventory. VSI VSI hyperlinked to the relevant entry in logical inventory. 13-84 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with VPLS and H-VPLS Instances Viewing Virtual Switching Instance Properties To view VSI properties in Prime Network Vision, open the VSI properties window in either of the following ways: • Double-click the required device and, in the inventory window, choose Logical Inventory > VSIs > vsi. • In the navigation pane, expand the VPLS instance, right-click the required VPLS forward, and choose Inventory or Properties. (See Figure 13-48.) VPN ID VPN identifier for the VSI. Access Pseudowires Tab Name Pseudowire name. Port VSI on which the pseudowire is configured, hyperlinked to the entry in logical inventory. Local Router IP Local router IP address on which the pseudowire is configured. Tunnel ID Virtual circuit identifier of the pseudowire. PTP Tunnel Hyperlinked entry to the pseudowire properties in logical inventory. Peer Router IP Peer router IP address on which the pseudowire is configured. Peer OID Hyperlinked entry to the pseudowire properties of the peer. Pseudowire Type Type of pseudowire, such as Ethernet, Ethernet Tagged, CESoPSN Basic, PPP, or SAToP. Pseudowire Edge Binding Type Pseudowire endpoint association: • 0—Unknown • 1—Connection termination point • 2—Ethernet flow point • 3—Switching entity • 4—Pseudowire switching entity • 5—VPLS forward Access Flow Points Tab Name Access flow point name. Double-click to view port connector properties. Port Interface configured as a flow point, hyperlinked to the interface in physical inventory. Table 13-37 VPLS Instance Properties (continued) Field Description 13-85 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with VPLS and H-VPLS Instances Figure 13-48 VPLS Forward in Prime Network Vision Navigation Pane If you right-click the VPLS forward and choose Inventory, the inventory window is displayed. If you right-click the VPLS forward and choose Properties, the VSI Properties window is displayed. The information displayed is the same for both options. VSI properties are displayed as shown in Figure 13-49. Figure 13-49 VSI Properties in Logical Inventory 13-86 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with VPLS and H-VPLS Instances Table 13-38 describes the information that is displayed for the selected VSI. Viewing VPLS Core or Access Pseudowire Endpoint Properties Pseudowire endpoints are displayed under VPLS Instance (Access) or VPLS Forward (Core) in the Prime Network Vision navigation pane. To view pseudowire endpoint properties for a VPLS instance, right-click the required pseudowire endpoint in the navigation pane, and choose Properties. (See Figure 13-50.) Figure 13-50 VPLS Pseudowire in Prime Network Vision Navigation Pane Figure 13-51 shows an example of the Tunnel Properties window that is displayed. Table 13-38 VSI Properties in Logical Inventory Field Description VSI Name VSI name. VPN ID VPN identifier used in an MPLS network to distinguish between different VPLS traffic. VSI Mode VSI mode: Point-to-Point (default) or Multipoint. Discovery Mode VSI discovery mode: Manual, BGP, LDP, RADIUS, DNS, MSS/OSS, or Unknown. Operational State VSI operational status: Up or Down. Administrative State VSI administrative status: Up or Down. Local Bridge Local bridge, hyperlinked to the bridge in logical inventory. Pseudowires Table Pseudowire ID Pseudowire identifier, hyperlinked to the Tunnel Edges table under Pseudowires in logical inventory. Autodiscovery Whether the pseudowire was automatically discovered: True or False. Split Horizon SSH pseudowire policy that indicates whether or not packets are forwarded to the MPLS core: True or False. Pseudowire Peer IP IP address of the pseudowire peer. Pseudowire VC ID Pseudowire virtual circuit identifier. 13-87 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with VPLS and H-VPLS Instances Figure 13-51 VPLS Tunnel Properties Window Table 13-39 describes the information that is displayed for pseudowire endpoint properties. Table 13-39 Tunnel Properties Window Field Description Port VSI on which the pseudowire is configured, hyperlinked to the VSI in logical inventory. Peer Hyperlinked entry to the pseudowire endpoint peer pseudowires in logical inventory. Peer VC Label MPLS label that is used by this router to identify or access the tunnel. It is inserted into the MPLS label stack by the peer router. Tunnel Status Operational state of the tunnel: Up or Down. Local VC Label MPLS label that is used to identify or access the tunnel. It is inserted into the MPLS label stack by the local router. Local Router IP IP address of this tunnel edge, which is used as the MPLS router identifier. Tunnel ID Identifier that, along with the router IP addresses of the two pseudowire endpoints, identifies the PWE3 tunnel. Peer Router IP IP address of the peer tunnel edge, which is used as the MPLS router identifier. Local MTU Size, in bytes, of the MTU on the local interface. Remote MTU Size, in bytes, of the MTU on the remote interface. Signaling Protocol Protocol used by MPLS to build the tunnel, such as LDP or TDP. Pseudowire Type Type of pseudowire, such as Ethernet, Ethernet Tagged, CESoPSN Basic, PPP, or SAToP. 13-88 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with VPLS and H-VPLS Instances Viewing VPLS Access Ethernet Flow Point Properties The ports that represent the attachment circuits to VPLS instances are displayed under VPLS instances in the Prime Network Vision navigation pane. To view the properties for the Access Ethernet Flow Points configured for a VPLS instance, right-click the required interface in the navigation pane, and choose Inventory. (See Figure 13-52.) Figure 13-52 VPLS Interface in Prime Network Vision Navigation Pane Figure 13-53 shows an example of the information displayed for the interface in physical inventory. Figure 13-53 EFP Properties in Physical Inventory The information displayed in this window is the same as that displayed when the interface is selected in physical inventory. The following information is displayed, depending on the interface and its configuration: • Location and interface details. • Technology-related information, such as Ethernet CSMA/CD or ATM IMA properties. • VLAN configuration details. 13-89 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with Pseudowires • List of the configured subinterfaces on the port. For more information on the Subinterfaces table, see Viewing a Port Configuration, page 3-25. • List of the configured EFPs on the port. For more information on the EFPs table, see Viewing EFP Properties, page 13-32. • List of VLAN mappings configured on the port. For more information about the VLAN Mappings table, see Viewing VLAN Mappings, page 13-52. Working with Pseudowires Prime Network supports the discovery and modeling of Any Transport over MPLS (AToM) and Ethernet over MPLS (EoMPLS) domains that span multisegment pseudowires. After discovery is complete, you can add any of the pseudowires to a map, view their properties in logical inventory, or view their redundancy status. The following topics describe the options available to you for working with pseudowires in Prime Network: • Adding Pseudowires to a Map, page 13-89 • Viewing Pseudowire Properties, page 13-92 • Pinging a Pseudowire, page 13-95 • Displaying Pseudowire Information, page 13-97 • Viewing Pseudowire Redundancy Service Properties, page 13-99 • Applying Pseudowire Overlays, page 13-101 Adding Pseudowires to a Map You can add a pseudowire that Prime Network discovers to maps as required. To add a pseudowire to a map: Step 1 In Prime Network Vision, select the required map or domain. Step 2 Open the Add Pseudowire to map dialog box in either of the following ways: • In the toolbar, choose Add to Map > Pseudowire. • In the menu bar, choose File > Add to Map > Pseudowire. Figure 13-54 shows an example of the Add Pseudowire dialog box. 13-90 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with Pseudowires Figure 13-54 Add Pseudowire Dialog Box Step 3 In the Add Pseudowire dialog box, do either of the following: • To search for specific elements: a. Choose Search. b. To narrow the display to a range of pseudowire or a group of pseudowires, enter a search string in the search field. c. Click Go. For example, if you enter pseudo1, the pseudowires that have names containing the string “pseudo1” are displayed. • To view all available pseudowires, choose Show All and click Go. The pseudowires that meet the specified search criteria are displayed in the Add Pseudowire dialog box in table format. The dialog box also displays the date and time at which the list was generated. To update the list, click Refresh. Note If an element is not included in your scope, it is displayed with the locked device icon. For information about sorting and filtering the table contents, see Filtering and Sorting Tabular Content, page 2-40. Step 4 In the Add Pseudowire dialog box, select the pseudowires that you want to add. You can select and add multiple pseudowires by pressing Ctrl while selecting individual pseudowires or by pressing Ctrl +Shift to select a group of pseudowires. 13-91 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with Pseudowires Step 5 Click OK. The pseudowire is displayed in the navigation pane and in the content area. In addition, any associated tickets are displayed in the ticket pane. See Figure 13-55. Figure 13-55 Pseudowire in Prime Network Vision Map Step 6 Click the pseudowire in the navigation pane or double-click the pseudowire in the map pane to view the pseudowire components, such as pseudowire endpoints, pseudowire switching entities, and terminating interfaces. Figure 13-56 shows an example of an expanded pseudowire in Prime Network Vision. 13-92 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with Pseudowires Figure 13-56 Pseudowire Components in Prime Network Vision Maps The pseudowire information is saved with the map in the Prime Network database. Viewing Pseudowire Properties To view pseudowire properties: Step 1 In Prime Network Vision, select the required map or domain. Step 2 To view pseudowire endpoint properties configured on an element: a. In the navigation or map pane, right-click the required element and then choose Inventory. b. In the inventory window, choose Logical Inventory > Pseudowires. The Tunnel Edges table is displayed, listing the pseudowire endpoints configured on the selected element. For a description of the information contained in the Pseudowires Tunnel Edges table, see Table 19-30 on page 19-54. Step 3 To view the properties of a pseudowire that you added to a map, do either of the following: • If the pseudowire icon is of the largest size, click the Properties button. • Right-click the element, and then choose Properties. The Pseudowire Properties window is displayed as shown in Figure 13-57. 13-93 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with Pseudowires Figure 13-57 Pseudowire Properties Window Table 13-40 describes the information presented in the Pseudowire Properties window. Step 4 To view the properties of a pseudowire endpoint associated with a pseudowire, right-click the required pseudowire endpoint, and then choose Properties. The Tunnel Properties window containing the pseudowire endpoint properties is displayed as shown in Figure 13-51 and described in Table 13-39. Step 5 To view the properties of a pseudowire switching entity associated with the pseudowire, select the switching entity, and then choose Node > Inventory. The Local Switching table is displayed as shown in Figure 13-41. Table 13-36 describes the information displayed in the Local Switching table. Step 6 To view the properties of the pseudowire endpoint that terminates on the subinterface, right-click the required interface, and then choose Properties. Note The selected port must be an Ethernet subinterface for the Contained Current CTPs table to be displayed. Table 13-41 describes the information displayed in the Contained Current CTPs table. Table 13-40 Pseudowire Properties Window Field Description Name Name of the pseudowire. Multisegment Pseudowire Whether or not the pseudowire is multisegment: True or False. System Name Internal or system-generated name of the pseudowire. Pseudowire Type Type of pseudowire, such as Ethernet, Ethernet Tagged, CESoPSN Basic, PPP, or SAToP. 13-94 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with Pseudowires Step 7 To view the properties of an Ethernet flow point associated with the pseudowire, right-click the EFP and then choose Properties. See Viewing EFP Properties, page 13-32 for the information that is displayed for EFPs. Table 13-41 Contained Current CTPs Table Field Description Local Interface The name of the subinterface or port, hyperlinked to the interface in physical inventory. ID The tunnel identifier, hyperlinked to Pseudowires Tunnel Edges table in logical inventory. Peer The peer tunnel identifier, hyperlinked to the peer pseudowire tunnel in logical inventory. Tunnel ID The identifier that, along with the router IP addresses of the two tunnel edges, identifies the tunnel. Tunnel Status The operational state of the tunnel: Up or Down. Local Router IP The IP address of this tunnel edge, which is used as the router identifier. Peer Router IP The IP address of the peer tunnel edge, which is used as the router identifier. Pseudowire Type Type of pseudowire, such as Ethernet, Ethernet Tagged, CESoPSN Basic, PPP, or SAToP. Local MTU The size, in bytes, of the MTU on the local interface. Remote MTU The size, in bytes, of the MTU on the remote interface. Local VC Label The MPLS label that is used by this router to identify or access the tunnel. It is inserted in the MPLS label stack by the local router. Peer VC Label The MPLS label that is used by this router to identify or access the tunnel. It is inserted in the MPLS label stack by the peer router. Signaling Protocol The protocol used to build the tunnel, such as LDP or TDP. Preferred Path Tunnel The path to be used for pseudowire traffic. 13-95 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with Pseudowires Pinging a Pseudowire Prime Network Vision enables you to ping a peer router to ensure that the pseudowire tunnel is available. Note You might be prompted to enter your device access credentials while executing the command. Once you have entered them, these credentials will be used for every subsequent execution of a command in the same GUI client session. If you want to change the credentials, click Edit Credentials. Edit Credentials button will not be available for SNMP commands or if the command is scheduled for a later time. To ping a pseudowire peer router: Step 1 In the require map, double-click the required device configured for pseudowire. Step 2 In the inventory window, choose Logical Inventory > Pseudowires. Step 3 In the Tunnel Edges table, select the interface with the peer edge that you want to ping, and make sure that the tunnel status is up. Step 4 Right-click the interface and choose Commands > Configure > Ping Pseudowire as shown in Figure 13-58. Figure 13-58 Ping Pseudowire Command The Ping Pseudowire dialog box is displayed with the General tab as shown in Figure 13-59. 13-96 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with Pseudowires Figure 13-59 Ping Pseudowire Dialog Box - General Tab Step 5 In the General tab, provide the following inputs: • Multisegment Ping—Enables or disables multisegment pinging (for Cisco IOS XR devices only.) • Ping with default Destination IP and VC-ID—Check the check box to ping the selected peer pseudowire endpoint using the default destination IP address and VC identifier. You do not need to enter a destination IP address or tunnel identifier if you choose this option. • Destination IP Address—Enter the required destination IP address if you do not want to use the default destination IP address. If you enter a destination IP address, you must enter the tunnel identifier in the VC-ID field. • VC-ID—Enter the required tunnel identifier if you do not want to use the default VC identifier. If you enter a tunnel identifier, you must enter the destination IP address in the Destination IP Address field. Step 6 To preview the command to ensure it is right, click Preview. The command is displayed in the Result tab for your review. Step 7 To execute the command, click Execute. The result of the command is displayed in the Result tab, as shown in Figure 13-60. 13-97 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with Pseudowires Figure 13-60 Ping Pseudowire Dialog Box - Result Tab Step 8 Click Close to close the Ping Pseudowire dialog box. Displaying Pseudowire Information To view Virtual Circuit Connectivity Verification (VCCV) and Control Channel (CC) information for a pseudowire endpoint: Note You might be prompted to enter your device access credentials while exectuing the command. Once you have entered them, these credentials will be used for every subsequent execution of a command in the same GUI client session. If you want to change the credentials, click Edit Credentials. Edit Credentials button will not be available for SNMP commands or if the command is scheduled for a later time. Step 1 In the require map, double-click the required device configured for pseudowire. Step 2 In the inventory window, choose Logical Inventory > Pseudowire. Step 3 In the Tunnel Edges table, right-click the required interface and choose Commands > Show > Display Pseudowire. Step 4 In the Display Pseudowire dialog box, do either of the following: • To view the command before running it, click Preview. • To run the command, click Execute. When you click Execute, the results are displayed in the dialog box as shown in Figure 13-61. 13-98 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with Pseudowires Figure 13-61 Display Pseudowire Dialog Box Step 5 The following information is displayed: • The element name. • The command issued. • The results, including: – VCCV: CC Type—The types of CC processing that are supported. The number indicates the position of the bit that was set in the received octet. The available values are: - CW [1]—Control Word - RA [2]—Router Alert - TTL [3]—Time to Live - Unkn [x]—Unknown – Elapsed time—The elapsed time, in seconds. Step 6 Click Close to close the Display Pseudowire dialog box. 13-99 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with Pseudowires Viewing Pseudowire Redundancy Service Properties If a pseudowire is configured for redundancy service, a redundancy service badge is applied to the secondary (backup) pseudowire in the navigation and map panes in the Prime Network Vision window. Additional redundancy service details are provided in the inventory window for the device on which the pseudowire is configured. To view redundancy service properties for pseudowires: Step 1 To determine if a pseudowire is configured for redundancy service, expand the required pseudowire in the navigation or map pane. If the pseudowire is configured for redundancy service, the redundancy service badge appears in the navigation and map panes as shown in Figure 13-62. Figure 13-62 Pseudowire Redundancy Service Badge in a Map Step 2 To view additional details, in the map, double-click the element with the redundancy service badge. The PTP Layer 2 MPLS Tunnel Properties window is displayed as shown in Figure 13-63 and shows that the selected pseudowire has a Secondary role in a redundancy service. 13-100 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with Pseudowires Figure 13-63 Layer 2 MPLS Tunnel Properties for Pseudowire Redundancy Service Step 3 In the PTP Layer 2 MPLS Tunnel Properties window, click the VC ID hyperlink. The Tunnel Edges table in logical inventory is displayed, with the local interface selected in the table. (See Figure 13-64.) Figure 13-64 Pseudowire Redundancy Service in Logical Inventory 13-101 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with Pseudowires The entries indicate that the selected tunnel edge has a Secondary role in the first VC and a Primary role in the second VC. For more information about the Pseudowires Tunnel Edges table, see Table 19-30 on page 19-54. Applying Pseudowire Overlays A pseudowire overlay allows you to isolate the parts of a network that are used by a specific pseudowire. To apply a pseudowire overlay: Step 1 In Prime Network Vision, choose the map in which you want to apply an overlay. Step 2 From the toolbar, choose Choose Overlay Type > Pseudowire. Figure 13-65 shows an example of the Select Pseudowire Overlay for map dialog box. Figure 13-65 Select Pseudowire Overlay Dialog Box Step 3 Select the required pseudowire for the overlay. Step 4 Click OK. The elements being used by the selected pseudowire are highlighted in the map while the other elements are dimmed, as shown in Figure 13-66. 13-102 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with Ethernet Services Figure 13-66 Pseudowire Overlay in Prime Network Vision Step 5 To hide and view the overlay, click Hide Overlay/Show Overlay in the toolbar. The button toggles depending on whether the overlay is currently displayed or hidden. Step 6 To remove the overlay, choose Choose Overlay Type > None. Working with Ethernet Services Ethernet services are created when the following business elements are linked to one another: • Network VLAN and bridge domain are linked through a shared EFP. • Network VLAN and VPLS instance are linked through either of the following: – A shared, standalone EFP. – A shared switching entity. • Network VLAN and network pseudowire (single or multi-segment) are linked through either of the following: – A shared, standalone EFP. – A shared switching entity. • VPLS-EoMPLS connected via a shared access pseudowire endpoint. • Network VLAN and cross-connect are connected by a shared EFP. • Network VLAN and service link are connected by a shared EFP. If a VPLS, network pseudowire, cross-connect, or network VLAN object is not connected to another business element, it resides alone in an Ethernet service. 13-103 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with Ethernet Services In releases prior to Prime Network Vision 3.8, EVC multiplex was discovered by means of Ethernet flow point associations. Beginning with Prime Network Vision 3.8, multiplex capabilities were enhanced to distinguish multiplexed services based on the Customer VLAN ID; that is, Prime Network Vision 3.9 is Inner Tag-aware. As a result, in environments in which service providers have customers with multiplexed services, an EVC can distinguish each service and create its own EVC representation. Prime Network Vision discovers Ethernet services and enables you to add them to maps, apply overlays, and view their properties. See the following topics for more information: • Adding Ethernet Services to a Map, page 13-103 • Applying Ethernet Service Overlays, page 13-104 • Viewing Ethernet Service Properties, page 13-106 Adding Ethernet Services to a Map You can add the Ethernet services that Prime Network Vision discovers to maps as required. To add an Ethernet service to a map: Step 1 In Prime Network Vision, select the required map or domain. Step 2 Open the Add Ethernet Service to map dialog box in either of the following ways: • In the toolbar, choose Add to Map > Ethernet Service. • In the menu bar, choose File > Add to Map > Ethernet Service. Step 3 In the Add Ethernet Service dialog box, do either of the following: • To search for specific elements: a. Choose Search, and then choose a search category: EVC Terminating EFPs, Name, or System Name. b. To narrow the display to a range of Ethernet services or a group of Ethernet services, enter a search string in the search field. c. Click Go. For example, if you choose Name and enter EFP1, the network elements that have names beginning with EFP1 are displayed. • To view all available Ethernet services, choose Show All and click Go. The available elements that meet the specified search criteria are displayed in the Add Ethernet Service dialog box in table format. The dialog box also displays the date and time at which the list was generated. To update the list, click Refresh. Note If an element is not included in your scope, it is displayed with the locked device icon. For information about sorting and filtering the table contents, see Filtering and Sorting Tabular Content, page 2-40. Step 4 In the Add Ethernet Service dialog box, select the elements that you want to add. You can select and add multiple elements by pressing Ctrl while selecting individual elements or by pressing Ctrl +Shift to select a group of elements. 13-104 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with Ethernet Services Step 5 Click OK. The Ethernet service is displayed in the navigation pane and in the content area. In addition, any associated tickets are displayed in the ticket pane. See Figure 13-67. Figure 13-67 Ethernet Service in Prime Network Vision The Ethernet service information is saved with the map in the Prime Network database. Applying Ethernet Service Overlays An Ethernet service overlay allows you to isolate the parts of a network that are being used by a specific Ethernet service. To apply an Ethernet service overlay: Step 1 In Prime Network Vision, choose the map in which you want to apply an overlay. Step 2 From the toolbar, choose Choose Overlay Type > Ethernet Service. Figure 13-68 shows an example of the Select Ethernet Service Overlay for map dialog box. 13-105 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with Ethernet Services Figure 13-68 Select Ethernet Service Overlay Dialog Box Step 3 Select the required Ethernet Service for the overlay. Step 4 Click OK. The elements being used by the selected Ethernet service are highlighted in the map while the other elements are dimmed, as shown in Figure 13-69. 13-106 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with Ethernet Services Figure 13-69 Ethernet Service Overlay in Prime Network Vision Step 5 To hide and view the overlay, click Hide Overlay/Show Overlay in the toolbar. The button toggles depending on whether the overlay is currently displayed or hidden. Step 6 To remove the overlay, choose Choose Overlay Type > None. Viewing Ethernet Service Properties To view Ethernet service properties: Step 1 In Prime Network Vision, select the map containing the required Ethernet service. Step 2 In the navigation or map pane, right-click the Ethernet service and choose Properties. Figure 13-70 shows an example of an Ethernet Service Properties window with the EVC Terminating table. Depending on the types of service in the EVC, tabs might be displayed. For example, if the EVC contains two network VLANs and a VPLS, tabs are displayed for the following: • EVC Terminating table • Network VLANs • VPLS 13-107 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with Ethernet Services Figure 13-70 Ethernet Service Properties Window Table 13-42 describes the information that is displayed for an Ethernet service. Step 3 To view the EVC Properties window, click the hyperlink in the EVC field. Figure 13-71 shows an example of the EVC Properties window. Table 13-42 Ethernet Service Properties Window Field Description Name Ethernet service name. System Name Name that Prime Network Vision assigns to the Ethernet service. EVC Name of the EVC associated with the Ethernet service, hyperlinked to the EVC Properties window. EVC Terminating Table Name EVC name, represented by the interface name, EFP, and the EFP name. Network Element Hyperlinked entry to the specific interface and EFP in physical inventory. Port Hyperlinked entry to the specific interface in physical inventory. 13-108 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Working with Ethernet Services Figure 13-71 EVC Properties Window Table 13-43 describes the information that is displayed in the EVC Properties window. The tabs that are displayed depend on the services included in the EVC. For example, if the EVC contains two network VLANs and a VPLS, tabs are displayed for the following: • EVC Terminating table • Network VLANs • VPLS Table 13-43 EVC Properties Window Field Description System Name Name of the system on which the EVC is configured. Name EVC name. Cross-Connects Table Name Cross-connect name. Segment 1 Identifier of the first cross-connect endpoint. Segment 2 Identifier of the second cross-connect endpoint. System Name Cross-connect system name. 13-109 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Viewing IP SLA Responder Service Properties Viewing IP SLA Responder Service Properties Cisco IOS Service Level Agreements (SLAs) software allows you to analyze IP service levels for IP applications and services by using active traffic monitoring to measure network performance. The IP SLA responder is a component embedded in the destination Cisco device that allows the system to anticipate and respond to IP SLAs request packets. The responder provides accurate measurements without requiring dedicated probes. The responder uses the Cisco IOS IP SLAs Control Protocol to provide a mechanism through which it can be notified on which port it should listen and respond. Two-Way Active Measurement Protocol (TWAMP) defines a standard for measuring round-trip network performance between any two devices that support the protocol. Prime Network Vision supports IP SLA Responder service on the following devices: • Cisco 3400ME and 3750ME devices running Cisco IOS 12.2(52)SE. • Cisco MWR2941 devices running Cisco CSR 3.2. To view IP SLA Responder service properties: Step 1 In Prime Network Vision, double-click the device configured for IP SLA Responder service. Step 2 In the inventory window, choose Logical Inventory > IP SLA Responder. IP SLA Responder properties are displayed as shown in Figure 13-72. Network VLANs Tab Name VLAN name. ID VLAN identifier. EFD Name Name of the Ethernet flow domain. EFD System Name Name that Prime Network Vision assigns to the EFD. System Name VLAN system name. Description Brief description of the VLAN. Network Pseudowires Tab Name Pseudowire name. System Name System on which the pseudowire is configured. Description Brief description of the pseudowire. Pseudowire Type Type of pseudowire. Is Multisegment Pseudowire Whether or not the pseudowire is multisegment: True or False. VPLS Instances Tab Name VPLS instance name. System Defined Name Name that Prime Network Vision assigns to the VPLS instance. VPN ID Identifier of associated VPN. Table 13-43 EVC Properties Window (continued) Field Description 13-110 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Viewing IP SLA Responder Service Properties Figure 13-72 IP SLA Responder in Logical Inventory Table 13-44 describes the properties displayed for IP SLA Responder service. Table 13-44 IP SLA Responder Properties in Logical Inventory Field Description IP SLA Responder Status Status of the IP SLA Responder: Up or Down. IP SLA TWAMP Responder Status Status of the IP SLA TWAMP responder: Up or Down. UDP Echo Tab IP Address Destination IP address used for the UDP echo operation. Port Number Destination port number used for the UDP echo operation. TCP Connect Tab IP Address Destination IP address used for the TCP connect operation. Port Number Destination port number used for the TCP connect operation. 13-111 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Viewing IS-IS Properties Viewing IS-IS Properties Intermediate System-to-Intermediate System (IS-IS) protocol is a routing protocol developed by the ISO. It is a link-state protocol where IS routers exchange routing information based on a single metric to determine network topology. It behaves in a manner similar to OSPF in the TCP/IP network. IS-IS networks contain end systems, intermediate systems, areas, and domains. End systems are user devices. Intermediate systems are routers. Routers are organized into local groups called areas, and areas are grouped into a domain. To view IS-IS properties: Step 1 In Prime Network Vision, double-click the device configured for IS-IS. Step 2 In the inventory window, choose Logical Inventory > IS-IS > System. Figure 13-73 shows an example of the IS-IS window with the Process table in logical inventory. Figure 13-73 IS-IS Window in Logical Inventory 13-112 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Viewing IS-IS Properties Table 13-45 describes the information that is displayed in this window and the Processes table. Step 3 To view IS-IS process information, choose Logical Inventory > IS-IS > Process nnn. Figure 13-74 shows an example of the information that is displayed for the IS-IS process. Figure 13-74 IS-IS Process Properties in Logical Inventory Table 13-45 IS-IS Properties in Logical Inventory - Processes Table Field Description Version Version of IS-IS that is implemented. Processes Table Process ID Identifier for the IS-IS process. System ID Identifier for this Intermediate System. IS Type Level at which the Intermediate System is running: Level 1, Level 2, or Level 1-2. Manual Area Address Address assigned to the area. 13-113 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Viewing IS-IS Properties Table 13-46 describes the information that is displayed for the selected IS-IS process. Table 13-46 IS-IS Process Properties in Logical Inventory Field Description Process Unique identifier for the IS-IS process. System ID Identifier for this Intermediate System. IS Type Level at which the Intermediate System process is running: Level 1, Level 2, or Level 1-2. Manual Area Address Address assigned to the area. Metrics Tab IS Type Level at which the Intermediate System is running: Level 1, Level 2, or Level 1-2. Metric Style Metric style used: Narrow, Transient, or Wide. Metric Value Metric value assigned to the link. This value is used to calculate the path cost via the links to destinations. This value is available for Level 1 or Level 2 routing only. If the metric style is Wide, the value can range from 1 to 16777214. If the metric style is Narrow, the value can range from 1 to 63. The default value for active IS-IS interfaces is 10, and the default value for inactive IS-IS interfaces is 0. Address Family IP address type used: IPv4 or IPv6. Interfaces Tab Interface Name Interface name. Neighbors Tab System ID Identifier for the neighbor system. Interface Neighbor interface name. IP Address Neighbor IP address. Type IS type for the neighbor: Level 1, Level 2, or Level 1-2. SNPA Subnetwork point of attachment (SNPA) for the neighbor. Hold Time Holding time, in seconds, for this adjacency. The value is based on received IS-to-IS Hello (IIH) PDUs and the elapsed time since receipt. State Administrative status of the neighbor system: Up or Down. Address Family IP address type used by the neighbor: IPv4 or IPv6. 13-114 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Viewing OSPF Properties Viewing OSPF Properties Prime Network Vision supports the following versions of OSPF: • OSPFv1 • OSPFv2 • OSPFv3 Using Prime Network Vision you can view OSPF properties for: • OSPF processes, including the process identifier and OSPF version. • OSPF network interfaces, such as the area identifier, network type, and status. • OSPF neighbors, including the neighbor identifier, neighbor interface address, and status. To view OSPF properties: Step 1 In Prime Network Vision, double-click the device configured for OSPF. Step 2 To view OSPF processes, choose Logical Inventory > OSPF Processes > OSPF Process (vn) ID where vn represents the OSPF version and ID is the OSPF process identifier. For example, in Figure 13-75, the entry in the navigation tree is OSPF Process (v2) 10. Figure 13-75 OSPF Processes in Logical Inventory Table 13-47 describes the information that is displayed for OSPF processes. 13-115 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Viewing OSPF Properties Table 13-47 OSPF Processes in Logical Inventory Field Description OSPF Process Details Process ID Unique process identifier. Router ID Router IP address. OSPF Version OSPF version: v1, v2, or v3. SPF Timers Schedule Delay Number of milliseconds to wait after a change before calculating the shortest path first (SPF). Min Hold Time Minimum number of milliseconds to wait between two consecutive SPF calculations. Max Wait Time Maximum number of milliseconds to wait between two consecutive SPF calculations. OSPF Neighbors Table Neighbor ID OSPF neighbor IP address. Area OSPF area identifier. Interface Address IP address of the interface on the neighbor configured for OSPF. State State of the communication with the neighbor: Down, Attempt, Init, 2-Way, Exstart, Exchange, Loading, and Full. OSPF Interface Hyperlinked entry to the OSPF Interface Properties window. The OSPF Interfaces window displays the same information as the OSPF Interfaces Table below. OSPF Interfaces Table IP Interface OSPF interface, hyperlinked to the relevant entry in the routing entity IP Interfaces table in logical inventory. For more information about the IP Interfaces table, see Table 19-13. Internet Address OSPF interface IP address. Area ID OSPF area identifier. Priority Eight-bit unsigned integer that specifies the priority of the interface. Values range from 0 to 255. Of two routers, the one with the higher priority takes precedence. Cost Specified cost of sending a packet on the interface, expressed as a metric. Values range from 1 to 65535. Status State of the interface: Up or Down. State OSPF state: BDR, DR, DR-Other, Waiting, Point-to-Point, or Point-to-Multipoint. Network Type Type of OSPF network: Broadcast, Nonbroadcast Multiple Access (NBMA), Point-to-Multipoint, Point-to-Point, or Loopback. DR Address Designated router IP address. BDR Address Backup designated router IP address. 13-116 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Using REP and mLACP Show Commands Using REP and mLACP Show Commands The following commands can be launched from the inventory by right-clicking the appropriate node and selecting Commands. Before executing any commands, you can preview them and view the results. If desired, you can also schedule the commands. To find out if a device supports these commands, see the Cisco Prime Network 3.10 Supported Cisco VNEs. Note You might be prompted to enter your device access credentials while executing a command. Once you have entered them, these credentials will be used for every subsequent execution of a command in the same GUI client session. If you want to change the credentials, click Edit Credentials. Edit Credentials button will not be available for SNMP commands or if the command is scheduled for a later time. Using Pseudowire Ping and Show Commands The Ping Pseudowire and Display Pseudowire commands can be launched from the inventory by right-clicking the appropriate node and selecting Commands. Before executing any commands, you can preview them and view the results. If desired, you can also schedule the commands. To find out if a device supports these commands, see the Cisco Prime Network 3.10 Supported Cisco VNEs. Ping Pseudowire Command Use the Ping Pseudowire command to ping the peer router with a tunnel ID from a single or multisegment pseudowire. This command can be used to verify connectivity between any set of PE routers in the pseudowire path. For a multisegment pseudowire this command can be used to verify that all the segments of the multisegment pseudowire are operating. You can use this command to verify connectivity at the following pseudowire points: • From one end of the pseudowire to the other • From one of the pseudowires to a specific segment • The segment between two adjacent PE routers Table 13-48 REP and mLACP Commands Command Input Required and Notes REP Command REP > Show REP Segment Information This action performed at the command the launch point. mLACP Commands Commands > Show and choose: Show Group Show MPLS LDP Show Channel Show LACP Internal These actions are performed at the command the launch point. 13-117 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Using Pseudowire Ping and Show Commands You can choose to ping the peer router by default or provide the IP of the required destination router to ping. Note The Ping Pseudowire command applies to all Cisco IOS and Cisco IOS XR devices that support pseudowire technology. For more information on how to use this command, see Pinging a Pseudowire, page 13-95. Display Pseudowire Command Use the Display Pseudowire command to show the MPLS Layer 2 (L2) transport binding using tunnel identifier. MPLS L2 transport binding allows you to identify the VC label binding information. This command can be used to display information about the pseudowire switching point. For more information on how to use this command, see Displaying Pseudowire Information, page 13-97. 13-118 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 13 Monitoring Carrier Ethernet Services Using Pseudowire Ping and Show Commands CHAPTER 14-1 Cisco Prime Network 3.10 User Guide OL-28065-01 14 Monitoring Carrier Grade NAT Properties Carrier Grade NAT is a large-scale Network Address Translation (NAT) that provides translation of millions of private IPv4 addresses to public IPv4 addresses. These translations support subscribers and content providers with a bandwidth throughput of at least 10 Gbps full-duplex. Carrier Grade NAT addresses the IPv4 address completion problem. It employs Network Address and Port Translation (NAPT) to aggregate many private IPv4 addresses into fewer public IPv4 addresses. For example, a single public IPv4 address with a pool of 32,000 port numbers supports 320 individual private IP subscribers, assuming that each subscriber requires 100 ports. Carrier Grade NAT also offers a way to implement a graceful transition to IPv6 addresses. Carrier Grade NAT attributes and instances are configured as a CRS-ADVSVC-PLIM card on Cisco CRS-1 routers. To route internal public addresses to external public addresses, a VPN Routing and Forwarding (VRF) instance is created. Interfaces are created for the VRF at the subscriber-side (private) and the Internet-side (public). The VRF enables static or dynamic routing of protocols on the interfaces. Cisco Prime Network supports the following instances for Carrier Grade NAT: • Stateful Address Translation- NAT44 Stateful • Stateless Address Translation- NAT 64 Stateless (X-LAT) • IPv6 rapid deployment (6rd) Each Carrier Grade NAT instance has several attributes listed under them, such as preferred location, address pools, associated interfaces, and statistics. The attributes are grouped under related categories. The categories and attributes are listed below: Note IPv4 Network Address Translation (NAT44) is not supported for devices running Cisco IOS XR software version 4.0. The following topics describe how to use Prime Network Vision to view Carrier Grade NAT properties: • User Roles Required to View Carrier Grade NAT Properties, page 14-2 • Viewing Carrier Grade NAT Properties in Logical Inventory, page 14-2 • Viewing Carrier Grade NAT Properties in Physical Inventory, page 14-5 • Using CG NAT Configure, Delete, and Show Commands, page 14-6 14-2 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 14 Monitoring Carrier Grade NAT Properties User Roles Required to View Carrier Grade NAT Properties User Roles Required to View Carrier Grade NAT Properties This topic identifies the roles that are required to view Carrier Grade NAT properties in Prime Network Vision. Prime Network determines whether you are authorized to perform a task as follows: • For GUI-based tasks (tasks that do not affect elements), authorization is based on the default permission that is assigned to your user account. • For element-based tasks (tasks that do affect elements), authorization is based on the default permission that is assigned to your account. That is, whether the element is in one of your assigned scopes and whether you meet the minimum security level for that scope. For more information on user authorization, see the Cisco Prime Network 3.10 Administrator Guide. The following tables identify the tasks that you can perform: • Table 14-1 identifies the tasks that you can perform if a selected element is not in one of your assigned scopes. • Table 14-2 identifies the tasks that you can perform if a selected element is in one of your assigned scopes. By default, users with the Administrator role have access to all managed elements. To change the Administrator user scope, see the topic on device scopes in the Cisco Prime Network 3.10 Administrator Guide. Viewing Carrier Grade NAT Properties in Logical Inventory To view Carrier Grade NAT properties in logical inventory: Step 1 In Prime Network Vision, double-click the Cisco CRS device configured for Carrier Grade NAT. Step 2 In the inventory window, click Logical Inventory > Carrier Grade NAT. Table 14-1 Default Permission/Security Level Required for Viewing Carrier Grade NAT Properties - Element Not in User’s Scope Task Viewer Operator OperatorPlus Configurator Administrator View Carrier Grade NAT properties ——— — X Using CG NAT Configure, Delete, and Show Commands ——— X X Table 14-2 Default Permission/Security Level Required for Viewing Carrier Grade NAT Properties - Element in User’s Scope Task Viewer Operator OperatorPlus Configurator Administrator View Carrier Grade NAT properties XXX X X Using CG NAT Configure, Delete, and Show Commands ——— X X 14-3 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 14 Monitoring Carrier Grade NAT Properties Viewing Carrier Grade NAT Properties in Logical Inventory The Carrier Grade NAT properties are displayed in logical inventory as shown in Figure 14-1. Figure 14-1 Carrier Grade NAT in Logical Inventory Table 14-3 describes the Carrier Grade NAT properties that are displayed. Table 14-3 Carrier Grade NAT Properties in Logical Inventory Field Description CGN Name Name of the Carrier Grade NAT service. Preferred Location Tab Preferred Location Hyperlinked entry to the card in physical inventory. Preferred Location (alias) Location of module in clear text. Location Type Configured type of location: Active or Standby. Redundancy Status Redundancy state: Online or Offline. If the field is empty, it means the data was not collected from the device. Service Infra Interface Hyperlinked entry to the routing entity in logical inventory. For more information about routing entities in logical inventory, see Viewing Routing Entities, page 19-32. 14-4 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 14 Monitoring Carrier Grade NAT Properties Viewing Carrier Grade NAT Properties in Logical Inventory Address Pools Tab Inside VRF Hyperlinked entry to the inside VRF in logical inventory. For more information about VRF properties in logical inventory, see Viewing VRF Properties, page 19-27. Address Family Type of IP address in this pool: IPv4 or IPv6. Outside VRF Hyperlinked entry to the outside VRF in logical inventory. For more information about VRF properties in logical inventory, see Viewing VRF Properties, page 19-27. Address Pool Range of IP addresses that can be used for the service instance. If an end address is not specified, the entire range of 255 addresses is used for the address pool. Associated Interfaces Tab Interface Hyperlinked entry to the associated entry in logical inventory: • For SVI service interfaces, hyperlinked entry to the routing entity in logical inventory. • For SVI service applications, hyperlinked entry to the VRF entity in logical inventory. Service Types Tab Service Type Name Name of the Carrier Grade NAT service. Service Type Type of Carrier Grade NAT service: 6RD, XLAT, or NAT44. Statistics Tab Statistics Name Name of the statistic. For statistic names and descriptions, see Table 14-4. Statistics Value Value of the statistic. Table 14-3 Carrier Grade NAT Properties in Logical Inventory (continued) Field Description 14-5 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 14 Monitoring Carrier Grade NAT Properties Viewing Carrier Grade NAT Properties in Physical Inventory You can also display pool utilization by right-clicking a VNE and choosing Commands > Show > Pool Utilization. Viewing Carrier Grade NAT Properties in Physical Inventory To view Carrier Grade NAT properties in physical inventory: Step 1 In Prime Network Vision, double-click the Cisco CRS device configured for Carrier Grade NAT. Step 2 To view Carrier Grade NAT properties configured on a specific interface, click Physical Inventory > chassis > shelf > slot > card > interface. See Table 3-11 for a description of the information displayed in the Subinterfaces table. Step 3 To view Carrier Grade NAT properties configured on a Cisco CRS-CGSE-PLIM card, click Physical Inventory > chassis > shelf > slot > PLIM-card. Figure 14-2 shows an example of Carrier Grade NAT properties in physical inventory. Table 14-4 Carrier Grade NAT Statistics in Logical Inventory Statistic Name Description Inside to outside drops port limit exceeded Number of packets dropped because the port limit has been exceeded. The value is calculated from the time Carrier Grade NAT was configured and running on the card. Inside to outside drops resource depletion Number of packets that are dropped because no ports are available. The value is calculated from the time Carrier Grade NAT was configured and running on the card. Inside to outside drops limit system reached Number of packets that are dropped because the system limit has been exceeded. The value is calculated from the time Carrier Grade NAT was configured and running on the card. Inside to outside forward rate Number of packets forwarded from the inside to the outside in the last one second. Outside to inside forward rate Number of packets forwarded from the outside to the inside in the last one second. Translations create rate Number of translation entries created in the last one second. Translations delete rate Number of translation entries deleted in the last one second. 14-6 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 14 Monitoring Carrier Grade NAT Properties Using CG NAT Configure, Delete, and Show Commands Figure 14-2 Carrier Grade NAT Properties in Physical Inventory The field CGN Service is displayed, and the entry is hyperlinked to the associated Carrier Grade NAT service in logical inventory. Using CG NAT Configure, Delete, and Show Commands The following commands can be launched from the inventory by right-clicking the appropriate node and selecting Commands. Before executing any commands, you can preview them and view the results. If desired, you can also schedule the commands. To find out if a device supports these commands, see the Cisco Prime Network 3.10 Supported Cisco VNEs. Note You might be prompted to enter your device access credentials while executing a command. Once you have entered them, these credentials will be used for every subsequent execution of a command in the same GUI client session. If you want to change the credentials, click Edit Credentials. Edit Credentials button will not be available for SNMP commands or if the command is scheduled for a later time. 14-7 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 14 Monitoring Carrier Grade NAT Properties Using CG NAT Configure, Delete, and Show Commands Table 14-5 Carrier Grade NAT Commands Command Inputs Required and Notes Configure > Add Static Port Forwarding To configure CG NAT service instance for static port forwarding. Required inputs are: Carrier Grade NAT and CGN instance name, inside VRF name and address, address family (IPv4 or IPv6), protocol (TCP, UDP, ICMP), port number Configure > Add NAT 64 Forwarding To configure CG NAT service instance for NAT 64. Required inputs are: CGN instance name, NAT 64 instance name, name of IPv4 or IPv6 service Configure > Add 6rd Forwarding To configure CG NAT service instance for 6rd. Required inputs are: CGN instance name, 6rd instance name, name of IPv4 or IPv6 service Delete > Static Port Forwarding Click Execute Now to remove CG NAT instance. Show > Pool Utilization CGN instance name, inside VRF name, start and end address 14-8 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 14 Monitoring Carrier Grade NAT Properties Using CG NAT Configure, Delete, and Show Commands CHAPTER 15-1 Cisco Prime Network 3.10 User Guide OL-28065-01 15 Monitoring DWDM Properties The Cisco IP over dense wavelength division multiplexing (IPoDWDM) solution enables the convergence of the IP and DWDM core networks of the service providers. It increases service flexibility, operational efficiency and reliability while lowering operating expenses (OpEx) and capital expenditures (CapEx). Cisco Prime Network discovers and displays the following DWDM attributes in the Physical Inventory tree of the Cisco Prime Network Vision: • DWDM controllers. The controller location is same as the DWDM interface. • Loopback information for the DWDM controller. • DWDM controller status. • DWDM port properties—Wavelength, Laser Status, Tx Power, and Rx Power. • DWDM controller card status (G.709 status). Prime Network also provides commands that support DWDM and Synchronous Optical Network (SONET) controllers. These commands help in configuring the device and in displaying device details. The commands are described in Using IPoDWDM Configuration and Show Commands, page 15-15. (For information on the SONET commands, see Using SONET Configure, Clear, and Show Commands, page 21-54.) The following topics describe how you can view and monitor IP over dense wavelength division multiplexing (DWDM) properties configured on network elements by using Cisco Prime Network Vision (Prime Network Vision): • User Roles Required to View DWDM Properties, page 15-1 • Viewing DWDM in Physical Inventory, page 15-3 • Viewing G.709 Properties, page 15-5 • Viewing Performance Monitoring Configuration, page 15-11 • Using IPoDWDM Configuration and Show Commands, page 15-15 User Roles Required to View DWDM Properties This topic identifies the roles that are required to view DWDM properties using Prime Network Vision. Prime Network determines whether you are authorized to perform a task as follows: • For GUI-based tasks (tasks that do not affect elements), authorization is based on the default permission that is assigned to your user account. 15-2 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 15 Monitoring DWDM Properties User Roles Required to View DWDM Properties • For element-based tasks (tasks that do affect elements), authorization is based on the default permission that is assigned to your account. That is, whether the element is in one of your assigned scopes and whether you meet the minimum security level for that scope. For more information on user authorization, see the Cisco Prime Network 3.10 Administrator Guide. The following tables identify the tasks that you can perform: • Table 15-1 identifies the tasks that you can perform if a selected element is not in one of your assigned scopes. • Table 15-2 identifies the tasks that you can perform if a selected element is in one of your assigned scopes. By default, users with the Administrator role have access to all managed elements. To change the Administrator user scope, see the topic on device scopes in the Cisco Prime Network 3.10 Administrator Guide. Table 15-1 Default Permission/Security Level Required for Viewing DWDM Properties - Element Not in User’s Scope Task Viewer Operator OperatorPlus Configurator Administrator View DWDM properties ——— — X View G.709 properties — — — — X View performance monitoring configuration information ——— — X Using IPoDWDM Configuration and Show Commands ——— X X Table 15-2 Default Permission/Security Level Required for Viewing DWDM Properties - Element in User’s Scope Task Viewer Operator OperatorPlus Configurator Administrator View DWDM properties XXX X X View G.709 properties X X X X X View performance monitoring configuration information XXX X X Using IPoDWDM Configuration and Show Commands ——— X X 15-3 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 15 Monitoring DWDM Properties Viewing DWDM in Physical Inventory Viewing DWDM in Physical Inventory Prime Network Vision enables you to monitor a variety of DWDM properties in physical inventory, including forward error correction (FEC), G.709 status, and performance monitoring parameters. To view DWDM properties in physical inventory: Step 1 In a Prime Network Vision map, double-click the device on which DWDM is configured. Step 2 In the inventory window, choose Physical Inventory > Chassis and navigate to the interface configured for DWDM. DWDM details are displayed in the DWDM area in the content pane as shown in Figure 15-1. Figure 15-1 DWDM Properties in Physical Inventory 15-4 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 15 Monitoring DWDM Properties Viewing DWDM in Physical Inventory Table 15-3 describes the information displayed for DWDM. Table 15-3 DWDM Properties in Physical Inventory Field Description Location Physical interface using the format rack/slot/module/port where: • rack is the chassis number of the rack. • slot is the physical slot number of the line card. • module is the module number. A physical layer interface module (PLIM) is always 0. Shared port adapters (SPAs) are referenced by their subslot number. • port is the physical port number of the interface. Controller Status Status of the controller: Up or Down. Loopback Whether or not the DWDM controller is configured for loopback mode. Frequency Frequency of the channel in terahertz. Port Type The port type. In this case, DWDM. MSA ITU Channel Multi Source Agreement (MSA) ITU channel number. Rx Power Actual optical power at the receiving port. Tx Power Value of the transmit power level. Rx LOS Threshold Number of optical channel transport unit (OTU) loss of signal (LOS) alarms. If the receive optical power is less than or equal to this defined threshold, the optical LOS alarm is raised. Wavelength Wavelength corresponding to the channel number in nanometers. Wavelength Band Indicates the wavelength band: C-band or L-band. Optics Type Indicates the optics type: GE or DWDM. G709 Properties G709 Status Whether the G.709 wrapper is enabled or disabled: Up or Down. OTU Detected Alarms OTU overhead alarms. ODU Detected Alarms Optical channel data unit (ODU) alarms. OTU Detected Alerts OTU alerts. ODU Detected Alerts ODU alerts. FEC Info Indicates the: • FEC mode of the controller: Disabled, Enhanced, Standard, or Unknown. • FEC mode on the remote device: Disabled, Enhanced, Standard, or Unknown. • Number of sync word mismatches found during the tracking phase. G709 Details Click to view G709 properties. For more information, see Viewing G.709 Properties, page 15-5. 15-5 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 15 Monitoring DWDM Properties Viewing G.709 Properties Viewing G.709 Properties The Telecommunication Standardization Sector (ITU-T) Recommendation G.709 provides a standardized method for transparently transporting services over optical wavelengths end to end. A significant component of G.709 is the FEC code that improves performance and extends the distance that optical signals can span. To view G.709 properties: Step 1 In Prime Network Vision, double-click the device on which DWDM is configured. Step 2 In the inventory window, choose Physical Inventory > Chassis and navigate to the interface configured for DWDM. Step 3 In the content pane, click G709 Details. The G709 Info Properties window is displayed as shown in Figure 15-2 for all Cisco devices except the Cisco 7600 series devices. PM 15-min Settings Click to view 15-minute performance monitoring properties. For more information, see Viewing Performance Monitoring Configuration, page 15-11. PM 24-hour Settings Click to view 24-hour performance monitoring properties. For more information, see Viewing Performance Monitoring Configuration, page 15-11. Table 15-3 DWDM Properties in Physical Inventory (continued) Field Description 15-6 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 15 Monitoring DWDM Properties Viewing G.709 Properties Figure 15-2 DWDM G709 Properties Window Figure 15-3 shows the tabs that are displayed in the G709 Info Properties window for Cisco 7600 series devices. For Cisco 7600 series devices: • The ODU Alert Counters tab is displayed. • The ODU TTI and OTU TTI tabs are not displayed. 15-7 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 15 Monitoring DWDM Properties Viewing G.709 Properties Figure 15-3 DWDM G709 Properties Window for Cisco 7600 Series Devices Table 15-4 describes the fields that are displayed above the tabs in the G709 Info Properties window. Table 15-4 DWDM G709 Properties Window Field Description Location Physical interface using the format rack/slot/module/port where: • rack is the chassis number of the rack. • slot is the physical slot number of the line card. • module is the module number. A physical layer interface module (PLIM) is always 0. Shared port adapters (SPAs) are referenced by their subslot number. • port is the physical port number of the interface. 15-8 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 15 Monitoring DWDM Properties Viewing G.709 Properties OTU Alarms OTU Alarm Reporting Enabled for The types of alarms enabled for reporting: • AIS—Alarm indication signal (AIS) alarms. • BDI—Backward defect indication (BDI) alarms. • BEI—Backward error indication (BEI) alarms. • BIP—Bit interleaved parity (BIP) alarms. • FECMISMATCH—FEC mismatch alarms. • IAE—Incoming alignment error (IAE) alarms. • LOF—Loss of frame (LOF) alarms. • LOM—Loss of multiple frames (LOM) alarms. • LOS—Loss of signal (LOS) alarms. • TIM—Type identifier mismatch (TIM) alarms. OTU Asserted Alarms OTU alarms indicated to be reported by the user. OTU Detected Alarms OTU alarms detected by the hardware. ODU Alarms ODU Alarm Reporting Enabled for The types of ODU alarms enabled for reporting: • AIS—Incoming SONET AIS error status. • BDI—Path termination BDI error status. • BEI—Backward error indication (BEI) error status. • BIP—Bit interleaved parity (BIP) error status. • LCK—Upstream connection locked (LCK) error status. • OCI—Open connection indication (OCI) error status. • PTIM—Payload TIM error status. • TIM—Data stream TIM error status. ODU Asserted Alarms ODU alarms indicated to be reported by the user. ODU Detected Alarms ODU alarms detected by the hardware. Table 15-4 DWDM G709 Properties Window (continued) Field Description 15-9 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 15 Monitoring DWDM Properties Viewing G.709 Properties The G709 Info Properties window contains the following tabs, depending on the selected network element: • OTU Alarm Counters Tab, page 15-10 • OTU Alert Counters Tab, page 15-10 • ODU Alarm Counters Tab, page 15-10 • OTU TTI Tab, page 15-10 • ODU TTI Tab, page 15-10 • ODU Alert Counters Tab, page 15-11 OTU Alerts OTU Alert Reporting Enabled for The types of alerts enabled for reporting: • SD-BER—Section Monitoring (SM) bit error rate (BER) is in excess of the signal degradation (SD) BER threshold. • SF-BER—SM BER is in excess of the signal failure (SF) BER threshold. • PM-TCA—Performance monitoring (PM) threshold crossing alert (TCA). • SM-TCA—SM threshold crossing alert. OTU Asserted Alerts OTU alerts indicated to be reported by the user. OTU Detected Alerts OTU alerts detected by the hardware. ODU Alerts ODU Alert Reporting Enabled for The types of ODU alerts enabled for reporting: • SD-BER—SM BER is in excess of the SD BER threshold. • SF-BER—SM BER is in excess of the SF BER threshold. • PM-TCA—PM threshold crossing alert. • SM-TCA—SM threshold crossing alert. ODU Asserted Alerts ODU alerts indicated to be reported by the user. ODU Detected Alerts ODU alerts detected by the hardware. Other FEC Info FEC properties: • FEC mode for the controller—Disable, Enhanced, Standard, or Unknown. • Remote FEC mode—FEC mode on the remote device: Disabled, Enhanced, Standard, or Unknown. • FEC mismatch counter—Number of sync word mismatches found during the tracking phase. Status G.709 wrapper administrative status: Up or Down. Table 15-4 DWDM G709 Properties Window (continued) Field Description 15-10 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 15 Monitoring DWDM Properties Viewing G.709 Properties Step 4 To view additional G.709 properties, click the required tab. Table 15-5 describes the information displayed in each tab. Table 15-5 G709 Properties Window Tabs Field Description OTU Alarm Counters Tab Type Type of OTU alarm, such as BDI or BEI. Counter Number of alarms reported for each alarm type. OTU Alert Counters Tab Type Type of OTU alert, such as SD-BER or SF-BER. Threshold Threshold set for the type of alert. Counter Number of alerts reported for each alert type. A value of -1 indicates that no value has been set up. ODU Alarm Counters Tab Type Type of ODU alarm, such as AIS or BDI. Counter Number of alarms reported for each alarm type. OTU TTI Tab This tab is not displayed for Cisco 7600 series devices. Type Type of OTU Trail Trace Identifier (TTI) configured: • Expected • Received • Sent String Type For each TTI type, the type of string: • ASCII • Hexadecimal TTI String For each TTI type, the specific TTI string configured. ODU TTI Tab This tab is not displayed for Cisco 7600 series devices. Type Type of ODU TTI configured: • Expected • Received • Sent String Type For each TTI type, the type of string: • ASCII • Hexadecimal TTI String For each TTI type, the specific TTI string configured. 15-11 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 15 Monitoring DWDM Properties Viewing Performance Monitoring Configuration Step 5 To close the G709 Info Properties window, click the upper right corner. Viewing Performance Monitoring Configuration Performance monitoring parameters are used to gather, store, set thresholds for, and report performance data for early detection of problems. Thresholds are used to set error levels for each performance monitoring parameter. During the accumulation cycle, if the current value of a performance monitoring parameter reaches or exceeds its corresponding threshold value, a threshold crossing alert (TCA) can be generated. The TCAs provide early detection of performance degradation. Prime Network Vision enables you to view the configuration settings for performance monitoring. Performance monitoring statistics are accumulated on a 15-minute basis, synchronized to the start of each quarter-hour. They are also accumulated on a daily basis starting at midnight. Historical counts are maintained for thirty-three 15-minute intervals and two daily intervals. To view performance monitoring configuration settings: Step 1 In Prime Network Vision, double-click the device on which DWDM is configured. Step 2 In the inventory window, choose Physical Inventory > Chassis and navigate to the interface configured for DWDM. Step 3 In the content pane, select the performance monitoring configuration settings you want to view: • To view the performance monitoring 15-minute configuration settings, click PM 15-min Settings. • To view the performance monitoring 24-hour configuration settings, click PM 24-hour Settings. The Client DWDM PM Settings Properties window is displayed as shown in Figure 15-4. ODU Alert Counters Tab This tab is displayed only for Cisco 7600 series devices. Type Type of OTU alert, such as SD-BER or SF-BER. Threshold Threshold set for the type of alert. Counter Number of alerts reported for each alert type. A value of -1 indicates that no value has been set up. Table 15-5 G709 Properties Window Tabs (continued) Field Description 15-12 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 15 Monitoring DWDM Properties Viewing Performance Monitoring Configuration Figure 15-4 Client DWDM PM Settings Properties Window Table 15-6 describes the information displayed above the tabs in the Client DWDM PM Settings Properties window and in each of the tabs. Table 15-6 Client DWDM PM Settings Properties Window and Tabs Field Description Interval Type The performance monitoring interval, either 15 minutes or 24 hours. Location Physical interface using the format rack/slot/module/port where: • rack is the chassis number of the rack. • slot is the physical slot number of the line card. • module is the module number. A physical layer interface module (PLIM) is always 0. Shared port adapters (SPAs) are referenced by their subslot number. • port is the physical port number of the interface. FEC PM Settings Tab Type FEC performance monitoring parameter being tracked: • EC-BITS—The number of bit errors corrected (EC-BITS) in the DWDM trunk line during the performance monitoring time interval. • UC-WORDS—The number of uncorrectable words (UC-WORDS) detected in the DWDM trunk line during the performance monitoring time interval. Threshold Threshold for the performance monitoring parameter. TCA Whether TCA generation for the specified parameter on the DWDM controller is enabled or disabled. 15-13 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 15 Monitoring DWDM Properties Viewing Performance Monitoring Configuration Optics PM Settings Tab Type Optics performance monitoring parameter being tracked: • LBC—Laser bias current. • OPR—Optical power on the unidirectional port. • OPT—Transmit optical power in dBm. Max Threshold Maximum threshold configured for the parameter. Max TCA If enabled, indicates a TCA is generated if the value of the parameter exceeds the maximum threshold during the performance monitoring period. If disabled, TCAs are not generated if the maximum threshold is exceeded. Min Threshold Minimum threshold configured for the parameter. Min TCA If enabled, indicates a TCA is generated if the value of the parameter drops below the minimum threshold during the performance monitoring period. If disabled, TCAs are not generated if the value drops below the minimum threshold. Table 15-6 Client DWDM PM Settings Properties Window and Tabs (continued) Field Description 15-14 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 15 Monitoring DWDM Properties Viewing Performance Monitoring Configuration OTN PM Settings Tab Type OTN performance monitoring parameter being tracked: • bbe-pm-fe—Far-end path monitoring background block errors (BBE-PM). Indicates the number of background block errors recorded in the optical transport network (OTN) path during the performance monitoring time interval. • bbe-pm-ne—Near-end path monitoring background block errors (BBE-PM). • bbe-sm-fe—Far-end section monitoring background block errors (BBE-SM). Indicates the number of background block errors recorded in the OTN section during the performance monitoring time interval. • bbe-sm-ne—Near-end section monitoring background block errors (BBE-SM). • bber-pm-fe—Far-end path monitoring background block errors ratio (BBER-PM). Indicates the background block errors ratio recorded in the OTN path during the performance monitoring time interval. • bber-pm-ne—Near-end path monitoring background block errors ratio (BBER-PM). • bber-sm-fe—Far-end section monitoring background block errors ratio (BBER-SM). Indicates the background block errors ratio recorded in the OTN section during the performance monitoring time interval. • bber-sm-ne—Near-end section monitoring background block errors ratio (BBER-SM) • es-pm-fe—Far-end path monitoring errored seconds (ES-PM). Indicates the errored seconds recorded in the OTN path during the performance monitoring time interval. • es-pm-ne—Near-end path monitoring errored seconds (ES-PM). • es-sm-fe—Far-end section monitoring errored seconds (ES-SM). Indicates the errored seconds recorded in the OTN section during the performance monitoring time interval. • es-sm-ne—Near-end section monitoring errored seconds (ES-SM). • esr-pm-fe—Far-end path monitoring errored seconds ratio (ESR-PM). Indicates the errored seconds ratio recorded in the OTN path during the performance monitoring time interval. • esr-pm-ne—Near-end path monitoring errored seconds ratio (ESR-PM). • esr-sm-fe—Far-end section monitoring errored seconds ratio (ESR-SM). Indicates the errored seconds ratio recorded in the OTN section during the performance monitoring time interval. • esr-sm-ne—Near-end section monitoring errored seconds ratio (ESR-SM). • fc-pm-fe—Far-end path monitoring failure counts (FC-PM). Indicates the failure counts recorded in the OTN path during the performance monitoring time interval. • fc-pm-ne—Near-end path monitoring failure counts (FC-PM). • fc-sm-fe—Far-end section monitoring failure counts (FC-SM). Indicates the failure counts recorded in the OTN section during the performance monitoring time interval. • fc-sm-ne—Near-end section monitoring failure counts (FC-SM). Table 15-6 Client DWDM PM Settings Properties Window and Tabs (continued) Field Description 15-15 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 15 Monitoring DWDM Properties Using IPoDWDM Configuration and Show Commands Using IPoDWDM Configuration and Show Commands The following commands can be launched from the inventory by right-clicking the appropriate node and selecting Commands. Before executing any commands, you can preview them and view the results. If desired, you can also schedule the commands. To find out if a device supports these commands, see the Cisco Prime Network 3.10 Supported Cisco VNEs. Type (cont.) • ses-pm-fe—Far-end path monitoring severely errored seconds (SES-PM). Indicates the severely errored seconds recorded in the OTN path during the performance monitoring time interval. • ses-pm-ne—Far-end path monitoring severely errored seconds (SES-PM). • ses-sm-fe—Far-end section monitoring severely errored seconds (SES-SM). Indicates the severely errored seconds recorded in the OTN section during the performance monitoring time interval. • ses-sm-ne—Near-end section monitoring severely errored seconds (SES-SM). • sesr-pm-fe—Far-end path monitoring severely errored seconds ratio (SESR-PM). Indicates the severely errored seconds ratio recorded in the OTN path during the performance monitoring time interval. • sesr-pm-ne—Near-end path monitoring severely errored seconds ratio (SESR-PM). • sesr-sm-fe—Far-end section monitoring severely errored seconds ratio (SESR-SM). Indicates the severely errored seconds ratio recorded in the OTN section during the performance monitoring time interval. • sesr-sm-ne—Near-end section monitoring severely errored seconds ratio (SESR-SM). • uas-pm-fe—Far-end path monitoring unavailable seconds (UAS-PM). Indicates the unavailable seconds recorded in the OTN path during the performance monitoring time interval. • uas-pm-ne—Near-end path monitoring unavailable seconds (UAS-PM). • uas-sm-fe—Far-end section monitoring unavailable seconds (UAS-SM). Indicates the unavailable seconds recorded in the OTN section during the performance monitoring time interval. • uas-sm-ne—Near-end section monitoring unavailable seconds (UAS-SM). Threshold Threshold configured for the parameter. TCA If enabled, indicates a TCA is generated if the value of the parameter crosses the threshold during the performance monitoring period. If disabled, TCAs are not generated if the value crosses the threshold. Table 15-6 Client DWDM PM Settings Properties Window and Tabs (continued) Field Description 15-16 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 15 Monitoring DWDM Properties Using IPoDWDM Configuration and Show Commands Note You might be prompted to enter your device access credentials while executing a command. Once you have entered them, these credentials will be used for every subsequent execution of a command in the same GUI client session. If you want to change the credentials, click Edit Credentials. Edit Credentials button will not be available for SNMP commands or if the command is scheduled for a later time. Table 15-7 IPoDWDM Commands Command Input Required and Notes Show > Controller Data N/A; performed from command launch point Show > PM History Data PM interval type: 15-min or 24-hour Interval number Show > RTPM Counters PM interval type: 15-min or 24-hour Show > RTPM Threshold PM interval type: 15-min or 24-hour Show > Wavelength Map N/A; performed from command launch point Show > IM Trace Details Card location (for example, 0/5/CPU0) Show > Device Log N/A; performed from command launch point Clear > Counters N/A; performed from command launch point Configure > Channel Channel number Option: Set or reset channel Configure > FEC Mode G.709 FEC mode: Disabled, enhanced, or standard Configure > G.709 ODU ODU alarm type: ais, bdi, lck, oci, ptim, or tim Option: Enable or disable alarm type Configure > G.709 OTU OTU alarm type: bdi, fecmismatch, iae, lof, lom, los, sd-ber, sf-ber, or tim Option: Enable or disable alarm type Configure > G.709 TTI Optical channel unit type: ODU or OTU TTI type: Expected or sent TTI string type: ASCII or hex TTI string Option: Set or reset TTI string Configure > G.709 Wrapper Option: Disable or enable G.709 wrapper Configure > Laser State Laser state: Switch off or on Configure > Loopback Loopback value: Internal or line Option: Set or remove 15-17 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 15 Monitoring DWDM Properties Using IPoDWDM Configuration and Show Commands Configure > PM FEC Data PM interval type FEC alarm type: • Ec-bits—Bit errors corrected (BIEC); the number of bit errors corrected in the DWDM trunk line during the performance monitoring time interval • Uc-words—Uncorrectable words; the number of uncorrectable words detected in the DWDM trunk line during the performance monitoring time interval TCA options: Enable or disable TCA generation Threshold option. Set configures the value on the device; reset is the default. If you select blank, the threshold value is not used. Threshold value Configure > PM Optics Data PM interval: 15-min or 24-hour Optics alarm type: • lbc—Laser bias current • opr—Optical power on the unidirectional port • opt—Transmit optical power in dBm Maximum TCA option: Enable or disable Maximum threshold option: Choosing Set configures the value on the device; Reset is the default. If you select blank, the threshold value is not used. Maximum threshold Minimum TCA option: enable or disable Minimum threshold option: Choosing Set configures the value on the device; Reset is the default. If you select blank, the threshold value is not used. Minimum threshold Configure > PM OTN Data PM interval: 15-min or 24-hour OTN alarm type. For a list of types and their descriptions, see the OTN PN Settings Tab information in Table 15-6 on page 15-12. TCA option: Enable or disable Threshold option: Choosing Set configures the value on the device; Reset is the default. If you select blank, the threshold value is not used. Threshold value Configure > Transmit Power Transmit power in dBm Option: Set or reset transponder Tx threshold Configure > Rx LOS Threshold Rx LOS threshold value Option: Set or reset transponder Rx threshold Table 15-7 IPoDWDM Commands (continued) Command Input Required and Notes 15-18 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 15 Monitoring DWDM Properties Using IPoDWDM Configuration and Show Commands CHAPTER 16-1 Cisco Prime Network 3.10 User Guide OL-28065-01 16 Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties The following topics describe how you can use Cisco Prime Network Vision (Prime Network Vision) to monitor Ethernet operations, administration, and maintenance (OAM) tools: • User Roles Required to View Ethernet OAM Tool Properties, page 16-1 • Ethernet OAM Overview, page 16-2 • Viewing Connectivity Fault Management Properties, page 16-3 • Using CFM Configure and Enable Commands, page 16-10 • Viewing Ethernet LMI Properties, page 16-16 • Using E-LMI Configure and Enable Commands, page 16-20 • Viewing Link OAM Properties, page 16-20 • Using L-OAM Configuration, Assign, Enable, and Show Commands, page 16-25 User Roles Required to View Ethernet OAM Tool Properties This topic identifies the roles that are required to view Ethernet OAM tool properties. Prime Network determines whether you are authorized to perform a task as follows: • For GUI-based tasks (tasks that do not affect elements), authorization is based on the default permission that is assigned to your user account. • For element-based tasks (tasks that do affect elements), authorization is based on the default permission that is assigned to your account. That is, whether the element is in one of your assigned scopes and whether you meet the minimum security level for that scope. For more information on user authorization, see the Cisco Prime Network 3.10 Administrator Guide. The following tables identify the tasks that you can perform: • Table 16-1 identifies the tasks that you can perform if a selected element is not in one of your assigned scopes. • Table 16-2 identifies the tasks that you can perform if a selected element is in one of your assigned scopes. By default, users with the Administrator role have access to all managed elements. To change the Administrator user scope, see the topic on device scopes in the Cisco Prime Network 3.10 Administrator Guide. 16-2 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 16 Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties Ethernet OAM Overview Ethernet OAM Overview Prime Network Vision supports three, interrelated OAM components, including: • Connectivity Fault Management—Connectivity Fault Management (CFM) is an end-to-end per-service-instance (per VLAN) Ethernet layer OAM protocol that includes connectivity monitoring, fault verification, and fault isolation. CFM allows you to manage individual customer service instances. Ethernet Virtual Connections (EVCs) are the services that are sold to customers and are designated by service VLAN tags. CFM operates on a per-service-VLAN (or per-EVC) basis. It lets you know when an EVC fails and provides tools to isolate the failure. See Viewing Connectivity Fault Management Properties, page 16-3. Table 16-1 Default Permission/Security Level Required for Viewing Ethernet OAM Tool Properties - Element Not in User’s Scope Task Viewer Operator OperatorPlus Configurator Administrator View CFM properties— — — — X View Ethernet LMI properties ——— — X View Link OAM properties ——— — X Using CFM Configure and Enable Commands ——— X X Using E-LMI Configure and Enable Commands ——— X X Using L-OAM Configuration, Assign, Enable, and Show Commands ——— X X Table 16-2 Default Permission/Security Level Required for Viewing Ethernet OAM Tool Properties - Element in User’s Scope Task Viewer Operator OperatorPlus Configurator Administrator View CFM propertiesX X X X X View Ethernet LMI properties XXX X X Using CFM Configure and Enable Commands ——— X X Using E-LMI Configure and Enable Commands ——— X X Using L-OAM Configuration, Assign, Enable, and Show Commands ——— X X 16-3 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 16 Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties Viewing Connectivity Fault Management Properties • Ethernet Local Management Interface—Ethernet Local Management Interface (Ethernet LMI) operates between the customer edge (CE) and the user-facing provider edge (U-PE) devices. Ethernet LMI allows you to automatically provision CEs based on EVCs and bandwidth profiles. See Viewing Ethernet LMI Properties, page 16-16. • Link OAM—Link OAM allows you to monitor and troubleshoot a single Ethernet link. It is an optional sublayer implemented in the Data Link Layer between the Logical Link Control (LLC) and MAC sublayers of the Open Systems Interconnect (OSI) model. You can monitor a link for critical events and, if needed, put a remote device into loopback mode for link testing. Link OAM also discovers unidirectional links, which are created when one transmission direction fails. See Viewing Link OAM Properties, page 16-20. Viewing Connectivity Fault Management Properties CFM provides capabilities for detecting, verifying, and isolating connectivity failures in networks with bridges operated by multiple independent organizations, each with restricted management access to each other's equipment. CFM allows you to discover and verify end-to-end, Carrier Ethernet PE-to-PE or CE-to-CE paths through bridges and LANs. CFM consists of maintenance domains. Maintenance domains are administrative regions used to manage and administer specific network segments. Maintenance domains are organized in a hierarchy. The administrator assigns a maintenance level to the domain from 0 (lowest level) to 7 (highest level); the maintenance level determines the domain’s position within the CFM hierarchy. CFM maintenance domain boundaries are indicated by maintenance points. A maintenance point is an interface point that participates within a CFM maintenance domain. Maintenance point types include: • Maintenance Endpoints—Maintenance endpoints (MEPs) are active CFM elements residing at the edge of a domain. MEPs can be inward or outward facing. They periodically transmit continuity check messages and expect to periodically receive similar messages from other MEPs within a domain. If requested, MEPs can also transmit traceroute and loopback messages. MEPs are responsible for keeping CFM messages within the boundaries of a maintenance domain. • Maintenance Intermediate Points—Maintenance intermediate points (MIPs) are passive elements that catalog information received from MEPs and other MIPs. MIPs only respond to specific CFM messages such as traceroute and loopback, and they forward those messages within the maintenance domain. Note Prime Network Vision does not display information for CFM maintenance endpoints or maintenance intermediate points for Cisco Viking devices if errors exist in their configurations. An error in the configuration is indicated by an exclamation point (!) in the CLI output. For example, if you enter the command show ethernet cfm local maintenance-points, a configuration error is indicated as follows: cfm_d100/2 cfm_s100 Te0/2/0/3.100 Up MEP 2100 eb:7a:53! CFM uses standard Ethernet frames. CFM frames are distinguishable by EtherType and for multicast messages, by MAC address. CFM frames are sourced, terminated, processed, and relayed by bridges. Routers support only limited CFM functions. 16-4 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 16 Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties Viewing Connectivity Fault Management Properties Bridges that cannot interpret CFM messages forward them as normal data frames. All CFM messages are confined to a maintenance domain and to an S-VLAN (PE-VLAN or Provider-VLAN). CFM supports three types of messages • Continuity check—Multicast heartbeat messages exchanged periodically among MEPs. They allow MEPs to discover other MEPs within a domain and allow maintenance intermediate points (MIPs) to discover MEPs. Continuity check messages (CCMs) are confined to a domain and S-VLAN. • Loopback—Unicast frames that a MEP transmits, at the request of an administrator, to verify connectivity to a particular maintenance point. A reply to a loopback message indicates whether a destination is reachable but does not allow hop-by-hop discovery of the path. A loopback message is similar in concept to an Internet Control Message Protocol (ICMP) Echo (ping) message. • Traceroute—Multicast frames that a MEP transmits, at the request of an administrator, to track the path (hop-by-hop) to a destination MEP. They allow the transmitting node to discover vital connectivity data about the path, and allow the discovery of all MIPs along the path that belong to the same maintenance domain. For each visible MIP, traceroute messages indicate ingress action, relay action, and egress action. Traceroute messages are similar in concept to User Datagram Protocol (UDP) traceroute messages. From the Logical Inventory tree, you can troubleshoot MEPs using CFM ping, traceroute, MEP status, and MEP cross-check status. These commands, and all CFM commands, are described in Using CFM Configure and Enable Commands, page 16-10. Prime Network associates alarms with the corresponding MEP or global CFM logical inventory objects. Prime Network correlates MEP down, MEP up, MEP missing, ETH-AIS, and ETH-RDI events with root cause alarms and corresponding tickets that exist along the path between the MEP on the reporting network element and the network element hosting the remote MEP. To view CFM properties: Step 1 In Prime Network Vision, double-click the required device for CFM. Step 2 In the inventory window, choose Logical Inventory > CFM. Figure 16-1 shows an example of CFM in logical inventory. 16-5 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 16 Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties Viewing Connectivity Fault Management Properties Figure 16-1 CFM in Logical Inventory Table 16-3 describes the information displayed for CFM. Step 3 Click the Maintenance Intermediate Points tab to view MIP information. See Figure 16-2. Table 16-3 CFM Properties Field Description Cache Size CFM traceroute cache size in number of lines. Hold Time Configured hold time (in minutes) that is used to indicate to the receiver the validity of traceroute and loopback messages transmitted by the device. The default value is 2.5 times the transmit interval. Maximum Cache Size Maximum CFM traceroute cache size in number of lines. CFM Version CFM version, such as IEEE D8.1. Maintenance Domains Table Name Domain name. Level Unique level the domain is managed on. Values range from 0 to 7. ID Optional domain identifier. 16-6 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 16 Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties Viewing Connectivity Fault Management Properties Figure 16-2 CFM Maintenance Intermediate Points Tab Table 16-4 describes the information that is displayed in the Maintenance Intermediate Points table. Step 4 To view the details of a specific maintenance domain, do one of the following: • Choose Logical Inventory > CFM > domain. • Double-click the required entry in the Maintenance Domains table. Figure 16-3 shows an example of the information displayed for the maintenance domain. Table 16-4 CFM Maintenance Intermediate Point Properties Field Description Interface Interface configured as a MIP, hyperlinked to its entry in physical inventory. MAC Address MAC address of the interface. Inner VLANs Inner VLAN identifiers. VLANs VLANs associated with the interface. Auto Created Whether or not the MIP was automatically created: True or False. Level Unique level the domain is managed on. Values range from 0 to 7. 16-7 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 16 Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties Viewing Connectivity Fault Management Properties Figure 16-3 CFM Maintenance Domain Properties Table 16-5 describes the information that is displayed for CFM maintenance domains. Step 5 To view the properties for a maintenance association’s endpoints, do one of the following: • Choose Logical Inventory > CFM > domain > association. • In the Maintenance Associations table, double-click the required association. Table 16-5 CFM Maintenance Domain Properties Field Description Maintenance Domain Name Name of the domain. Level Level at which the domain is managed: 0-7. ID Optional maintenance domain identifier. Maintenance Associations Table Name Name of the maintenance association. Association Type Maintenance association type. Direction Direction of the maintenance association: Up or Down. Continuity Check Whether or not the continuity check is enabled: True or False. Continuity Check Interval Interval (in seconds) for checking continuity. Associated Entity Bridge, port, or pseudowire that the maintenance association uses for CFM. Click the hyperlinked entry to view the item in inventory. Cross Check Whether or not cross checking is enabled: True or False. Maximum MEPs Maximum number of maintenance endpoints (MEPs) that can be configured on the maintenance association. Inner VLAN Inner VLAN identifier. 16-8 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 16 Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties Viewing Connectivity Fault Management Properties Figure 16-4 shows the information displayed for the maintenance association endpoints. Figure 16-4 CFM Maintenance Association - Endpoint Properties Table 16-6 describes the information that is displayed for CFM maintenance associations and MIPs. Table 16-6 CFM Maintenance Association Properties Field Description Maintenance Association Name Name of the maintenance association. Association Type Maintenance association type, such as Bridge Domain. Direction Direction of the maintenance association: Up or Down. Continuity Check Whether or not the continuity check is enabled: True or False. Continuity Check Interval Interval (in seconds) for checking continuity. Cross Check Whether or not cross checking is enabled: True or False. Associated Entity Bridge that the maintenance association uses for CFM. Click the hyperlinked entry to view the bridge in logical inventory. Maximum MEPs Maximum number of MEPs that can be configured on the maintenance association. Inner VLANs Inner VLAN identifiers. Maintenance End Points Table ID Local identifier for the MEP. MAC Address MAC address that identifies the MEP. 16-9 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 16 Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties Viewing Connectivity Fault Management Properties Step 6 Click the Remote Maintenance End Points tab to view the information displayed for remote MEPs. See Figure 16-5. Figure 16-5 Remote Maintenance End Points Table Interface Interface on which the MEP is configured, hyperlinked to the respective EFP, VSI or interface in inventory. Continuity Check Status CFM continuity check status: MEP Active, MEP Inactive, MEP Enabled, MEP Disabled, or Unknown. Direction Direction of traffic on which the MEP is defined: Up, Down, or Unknown. Table 16-6 CFM Maintenance Association Properties (continued) Field Description 16-10 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 16 Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties Using CFM Configure and Enable Commands Table 16-7 describes the information presented for remote MEPs. Using CFM Configure and Enable Commands The following commands can be launched from the inventory by right-clicking a CFM node and selecting Commands. Before executing any commands, you can preview them and view the results. If desired, you can also schedule the commands. To find out if a device supports these commands, see the Cisco Prime Network 3.10 Supported Cisco VNEs. You can navigate from the MEP logical inventory to the interface or port channel on which the MEP is configured. Note You might be prompted to enter your device access credentials while executing a command. Once you have entered them, these credentials will be used for every subsequent execution of a command in the same GUI client session. If you want to change the credentials, click Edit Credentials. Edit Credentials button will not be available for SNMP commands or if the command is scheduled for a later time. Configure CFM Maintenance Domain A maintenance domain is a management space for the purpose of managing and administering a network. A single entity owns and operates a domain and is defined by the set of ports internal to it and at its boundary. Each maintenance domain can contain any number of maintenance associations. Each maintenance association identifies a service that can be uniquely identified within the maintenance domain. The CFM protocol runs within a particular maintenance association. Step 1 In the inventory window, expand the Logical Inventory tree. Step 2 Right-click the CFM node and choose Commands > Configure > Cisco > Maintenance Domain. Table 16-7 CFM Remote Maintenance End Points Table Field Description MEP ID Remote MEP identifier. Level Level at which the remote MEP is managed: 0-7. Status Status of the remote MEP, such as MEP Active. MAC Address MAC address of the remote MEP. Local MEP ID Numeric identifier assigned to the local MEP. Values range from 1 to 8191. Note If the remote MEP is in Up mode, the remote MEP is not associated to the local MEP. As a result, the Local MEP ID column is empty. 16-11 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 16 Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties Using CFM Configure and Enable Commands Step 3 Enter values for the following parameters. Step 4 Preview, schedule, or run the command. Configure CFM Global Parameters The Configure CFM Global Parameters enables CFM globally for a network element. Step 1 In the inventory window, expand the Logical Inventory tree. Step 2 Right-click the CFM node and choose Commands > Configure > Cisco > Global Parameters. Step 3 Enter values for the following parameters. Step 4 Preview, schedule, or run the command. Input Parameter Description Domain Name Name of the domain. Maintenance Level Maintenance level number. The range is from 0 to 7. A network administrator assigns a unique maintenance level to each domain. Levels and domain names are useful for defining the hierarchical relationship that exists among domains. The hierarchical relationship of domains parallel the structure of customer, service provider, and operator. The larger the domain, the higher the level value. For example, a customer domain would be larger than an operator domain. The customer domain may have a maintenance level of 7 and the operator domain may have a maintenance level of 0. Typically, operators have the smallest domains and customers the largest domains, with service provider domains between them in size. All levels of the hierarchy must operate together. MEP Archive Hold Time Maintenance endpoint archived hold time. The range is from 1 to 65535 minutes. A maintenance point is a demarcation point on an interface (port) that participates in CFM within a maintenance domain. Maintenance points on device ports act as filters that confine CFM frames within the bounds of a domain by dropping frames that do not belong to the correct level. Maintenance points must be explicitly configured on Cisco devices. Two classes of maintenance points exist: MEPs and maintenance intermediate points (MIPs). Input Parameter Description Trace Route Cache Size Number of cached lines. The range is from 1 to 4095. Using CFM, you can configure the device to transmit traceroute and loopback messages. This parameter sets the CFM traceroute cache size used by the CFM service. Trace Route Cache Hold Time Hold time. The range is from 1 to 65535 minutes. A CFM service is configurable with a hold-time value to indicate to the receiver the validity of the message. The default is 2.5 times the transmit interval. 16-12 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 16 Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties Using CFM Configure and Enable Commands Configure CFM Continuity Check To enable continuity check parameters: Step 1 In the inventory window, expand the Logical Inventory tree. Step 2 Right-click the CFM node and choose Commands > Enable > Cisco > Continuity Check. Step 3 Enter values for the following parameters. Step 4 Preview, schedule, or run the command. Configure CFM MIP The Configure CFM MIP command configures an operator-level maintenance intermediate point (MIP) for the domain-level ID. MIPs have the following characteristics: • Per-maintenance domain (level) for all S-VLANs enabled or allowed on a port. • Internal to a domain, not at the boundary. • CFM frames received from MEPs and other MIPs are cataloged and forwarded, using both the wire and the relay function. • All CFM frames at a lower level are stopped and dropped, independent of whether they originate from the wire or from relay function. • All CFM frames at a higher level are forwarded, independent of whether they arrive from the wire or from relay function. • Passive points respond only when triggered by CFM traceroute and loopback messages. • Bridge-brain MAC addresses are used. If the port on which a MIP is configured is blocked by Spanning-Tree Protocol (STP), the MIP cannot receive CFM messages or relay them toward the relay function side. The MIP can, however, receive and respond to CFM messages from the wire. Input Parameter Description Domain Name The domain name on which to enable the continuity check. Maintenance Level Maintenance level number. The range is from 0 to 7. Alternatively, you can choose any to specify all maintenance levels. VLANs for Cross-Check VLAN ID on which to apply the continuity check. The VLAN ID range is from 1 to 4094. Alternatively, you can choose any to specify all VLAN IDs. Service Name1 1. Applicable for Cisco ASR 9000 series that run on Cisco IOS XR software. The service name on which to enable the continuity check. Bridge Group Name1 The bridge group name on which to enable the continuity check. Bridge Domain Name1 The bridge domain name on which to enable the continuity check. Interval for CC Messages Interval, in seconds, for continuity check messages. The default value is 30 seconds. Loss Threshold Level for CC Packets The loss threshold level for CC packets. The value ranges from 2 to 225. The default value is 2. 16-13 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 16 Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties Using CFM Configure and Enable Commands A MIP has only one level associated with it, and the command-line interface (CLI) does not allow you to configure a MIP for a domain that does not exist. Note This command is not supported on the Cisco Carrier Packet Transport (CPT) System. Step 1 In the inventory window, expand the Logical Inventory tree. Step 2 Right-click the CFM node and choose Commands > Configure > Cisco > MIP. Step 3 Enter values for the following parameters. Step 4 Preview, schedule, or run the command. Configure CFM Service ID Use the Configure CFM Service ID command to configure the CFM service ID. Step 1 In the inventory window, expand the Logical Inventory tree. Step 2 Right-click the CFM node and choose Commands > Configure > Cisco > Service ID. The Service ID dialog box opens. Step 3 By default, the General tab is selected. Enter values for the following parameters. Input Parameter Description Interface Name A physical interface or a port channel to configure. Maintenance Level Number between 0-7. VLANs1 1. Applicable only for Cisco ME 3400 Series and Cisco ME 3750 Ethernet Access Switches running Cisco IOS Release 12.2 (52) SE and Cisco 7600 Series Routers running Cisco IOS Release 12.2(33)SRE VLAN ID on which to apply the remote maintenance point identifier (ID). The VLAN ID range is from 1 to 4094. Alternatively, you can choose any to specify all VLAN IDs. Note You can execute the any command only if the sub mode any is supported by the software image version of the network element. Inner VLAN2 2. Applicable only for Cisco ME 3400 Series and Cisco ME 3750 Ethernet Access Switches running Cisco IOS Release 12.2 (54) SE Check the check box if you have an inner VLAN tag. Inner VLANs2 Inner VLAN ID on which to apply the remote maintenance point ID. The VLAN ID range is from 1-4094. Input Parameter Description Domain Name Name of the domain. Maintenance Level Number between 0-7. Service VLAN ID ([1-4094]) Service VLAN ID. A customer service instance is an Ethernet virtual connection, which is identified by an S-VLAN within an Ethernet island. You can identify an S-VLAN by using a globally unique service ID. The Service VLAN ID range is from 1 to 4094. 16-14 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 16 Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties Using CFM Configure and Enable Commands Step 4 Preview, schedule, or run the command. Configure CFM MEP Use the Configure CFM MEP command to configure maintenance endpoints (MEPs), which have the following characteristics: • Per-maintenance domain (level) and service (S-VLAN or EVC) • At the edge of a domain, define the boundary • Within the bounds of a maintenance domain, confine CFM messages • When configured to do so, proactively transmit CFM continuity check messages (CCMs) • At the request of an administrator, transmit traceroute and loopback messages Note This command is not supported on the Cisco Carrier Packet Transport (CPT) System. Step 1 In the inventory window, expand the Logical Inventory tree. Step 2 Right-click the CFM node and choose Commands > Configure > Cisco > MEP. Step 3 Enter values for the following parameters. Inner VLAN 1 Check the check box if you have an inner VLAN tag. Inner VLANs1 Inner VLAN ID on which to apply the remote maintanance point ID. The VLAN ID range is from 1 to 4094. EVC Name The EVC name. 1. Applicable only for Cisco ME 3400 Series and Cisco ME 3750 Ethernet Access Switches running Cisco IOS Release 12.2 (54) SE and later. Input Parameter Description Input Parameter Description Domain Name Name of the domain. Interface Name Name of the interface. Specify a physical interface or a port channel to configure. Maintenance Level Maintenance level number. The range is from 0 to 7. 16-15 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 16 Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties Using CFM Configure and Enable Commands Step 4 You can preview, schedule, or run the command immediately. Enable CFM Continuity Check Use the Enable CFM Continuity Check command to enable continuity check parameters. Step 1 In the inventory window, expand the Logical Inventory tree. Step 2 Right-click the CFM node and choose Commands > Enable > Cisco > Continuity Check. Step 3 Enter values for the following parameters. Step 4 Preview, schedule, or run the command. Maintenance End Point Identifier Maintenance endpoint identifier, which must be unique for each VLAN (service instance). The MEP ID is a CFM identifier used to: • Identify a MEP in CFM communications. • Catalog CFM frames in the local CFM database. The MEP ID is significant throughout the CFM domain and the maintenance association. The range is from 1 to 8191. VLANs VLAN ID on which to apply the maintenance endpoint. The VLAN ID range is from 1 to 4095. Alternatively, you can choose any to specify all VLAN IDs. Note You can execute the any command only if the sub mode any is supported by the software image version of the network element. Input Parameter Description Input Parameter Description Domain Name The domain name on which to enable the continuity check. Maintenance Level Maintenance level number. The range is from 0 to 7. Alternatively, you can choose any to specify all maintenance levels. VLANs for Cross-Check VLAN ID on which to apply the continuity check. The VLAN ID range is from 1 to 4094. Alternatively, you can choose any to specify all VLAN IDs. Service Name1 1. Applicable for Cisco ASR 9000 series that run on Cisco IOS XR software. The service name on which to enable the continuity check. Bridge Group Name1 The bridge group name on which to enable the continuity check. Bridge Domain Name1 The bridge domain name on which to enable the continuity check. Interval for CC Messages Interval, in seconds, for continuity check messages. The default value is 30 seconds. Loss Threshold Level for CC Packets The loss threshold level for CC packets. The value ranges from 2 to 225. The default value is 2. 16-16 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 16 Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties Viewing Ethernet LMI Properties Enable CFM SNMP Server Traps Use the Enable CFM SNMP Server Traps command to enable Ethernet CFM continuity check traps and Ethernet CFM cross-check traps. Step 1 In the inventory window, expand the Logical Inventory tree. Step 2 Right-click the CFM node and choose Commands > Enable > Cisco > SNMP Server Traps. The command enables SNMP server traps and does not require any input parameters. Viewing Ethernet LMI Properties Ethernet Local Management Interface (E-LMI) is a protocol that operates between the customer edge (CE) network element and the provider edge (PE) network element. Ethernet LMI is a protocol between the CE network element and the provider edge (PE) network element. It runs only on the PE-CE UNI link and notifies the CE of connectivity status and configuration parameters of Ethernet services available on the CE port. Ethernet LMI interoperates with an OAM protocol, such as CFM, that runs within the provider network to collect OAM status. CFM runs at the provider maintenance level. Ethernet LMI relies on the OAM Ethernet Infrastructure (EI) to work with CFM for end-to-end status of EVCs across CFM domains. The IOS OAM manager streamlines interaction between OAM protocols, and handles the interaction between CFM and E-LMI. Ethernet LMI interaction with the OAM manager is unidirectional, running only from the OAM manager to E-LMI on the U-PE side of the switch. Information is exchanged either as a result of a request from E- LMI or triggered by the OAM manager when it receives notification of a change from the OAM protocol. Information that is relayed includes the EVC name and availability status, remote UNI name and status, and remote UNI counts. To summarize, E-LMI: • Runs only on the PE-CE User Network Interface (UNI) link. • Notifies the CE of connectivity status and configuration parameters of Ethernet services available on the CE port. To view Ethernet LMI properties: Step 1 In Prime Network Vision, double-click the device configured for Ethernet LMI. Step 2 In the inventory window, choose Logical Inventory > Ethernet LMI. Figure 16-6 shows an example of Ethernet LMI properties in logical inventory. 16-17 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 16 Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties Viewing Ethernet LMI Properties Figure 16-6 Ethernet LMI in Logical Inventory Table 16-8 describes the information displayed for Ethernet LMI. Table 16-8 Ethernet LMI Properties in Logical Inventory Field Description Globally Enabled Whether or not Ethernet LMI is enabled globally: True or False. Mode Ethernet LMI mode: CE or PE. Device EVCs Tab EVC Name Name of the EVC. EVC Type Type of EVC: Point-to-point or Multipoint. EVC Status EVC status: Active, Inactive, Not Defined, or Partially Active. Maintenance Association Hyperlinked entry to the maintenance association in CFM in logical inventory. For more information about maintenance associations, see Table 16-6. Active Remote UNI Count Number of active remote UNIs. Configured Remote UNI Count Number of configured remote UNIs. 16-18 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 16 Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties Viewing Ethernet LMI Properties Step 3 To view device EVC properties, double-click an EVC name in the Device EVCs tab. The Device EVC Properties window is displayed as shown in Figure 16-7. Figure 16-7 Device EVC Properties Window Table 16-9 describes the information displayed in the Device EVC Properties window. ELMI Interfaces Tab Interface Name Hyperlinked entry to the interface in physical inventory. For more information, see Step 4 in this procedure. T391 Frequency at which the customer equipment sends status inquiries. The range is 5-30 seconds, with a default of 10 seconds. T392 Frequency at which the metro Ethernet network verifies that status enquiries have been received. The range is 5-30 seconds, with a default of 15 seconds. A value of 0 (zero) indicates the timer is disabled. N391 Frequency at which the customer equipment polls the status of the UNI and all EVCs. The range is 1-65000 seconds, with a default of 360 seconds. N393 Error count for the metro Ethernet network. The range is 1-10, with a default of 4. Table 16-8 Ethernet LMI Properties in Logical Inventory (continued) Field Description 16-19 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 16 Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties Viewing Ethernet LMI Properties Step 4 To view properties for an Ethernet LMI interface in physical interface, click the required interface name in the ELMI Interfaces table. Table 16-10 describes the information displayed in the UNI Properties area in physical inventory. Table 16-9 Device EVC Properties in Logical Inventory Field Description EVC Name Name of the EVC. EVC Type Type of EVC: Point-to-point or Multipoint. EVC Status EVC status: Active, Inactive, Not Defined, or Partially Active. Maintenance Association Hyperlinked entry to the maintenance association in CFM in logical inventory. For more information about maintenance associations, see Table 16-6. Active Remote UNI Count Number of active remote UNIs. Configured Remote UNI Count Number of configured remote UNIs. UNI Interfaces Table UNI Id UNI identifier. UNI Status Status of the UNI: Up or Down. LMI Link Status Status of the LMI link: Up or Down. Interface Name Interface on which UNI is configured. Is UNI Local Whether or not UNI is local: True or False. Local Interface Hyperlinked entry to the interface in physical inventory. VLAN List Name of the VLAN associated with the UNI interface. Table 16-10 Ethernet LMI UNI Properties in Physical Inventory Field Description Service Multiplexing Enabled Whether or not the interface is configured for UNI multiplexing: True or False. Bundling Enabled Whether or not the interface is configured for UNI bundling: True or False. UNI Id UNI identifier. Bundling Type Type of bundling applied: All-to-One or None. This field appears only when a bundling type is set. 16-20 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 16 Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties Using E-LMI Configure and Enable Commands Using E-LMI Configure and Enable Commands The following commands can be launched from the inventory by right-clicking an E-LMI node and selecting Commands. Before executing any commands, you can preview them and view the results. If desired, you can also schedule the commands. To find out if a device supports these commands, see the Cisco Prime Network 3.10 Supported Cisco VNEs. In the GUI, parameters that are displayed in bold text are mandatory. Note You might be prompted to enter your device access credentials while executing a command. Once you have entered them, these credentials will be used for every subsequent execution of a command in the same GUI client session. If you want to change the credentials, click Edit Credentials. Edit Credentials button will not be available for SNMP commands or if the command is scheduled for a later time. Viewing Link OAM Properties Link OAM is an optional sublayer implemented in the OSI Data Link Layer between the Logical Link Control and MAC sublayers. Link (802.3AH) OAM (L-OAM) can be implemented on any full-duplex point-to-point or emulated point-to-point Ethernet link. The frames (OAM Protocol Data Units [OAMPDUs]) cannot propagate beyond a single hop within an Ethernet network and have modest bandwidth requirements (frame transmission rate is limited to a maximum of 10 frames per second). Table 16-11 E-LMI Commands Command Input Required and Notes Enable > Global E-LMI N/A; performed from command launch point. Not supported on Cisco IOS XR. Enable On Interface Interface name (if E-LMI is disabled globally, you can use this command to enable E-LMI on specific interfaces) Configure MultiPoint To MultiPoint or Point To Point EVC EVC name UNI count: The range of the Unified network interface(UNI) is 2 to 1024; the default is 2. If you enter a value of 2, you have the option to select point-to-multipoint service. If you configure a value of 3 or greater, the service is point-to-multipoint. VLANS to apply across check to: VLAN ID range from 1 to 4094. Domain name Configure UNI in an Interface Interface name UNI ID Configure Service Instance Vlan Id on Interface Interface name Service instance ID: Per-interface Ethernet service instance identifier that does not map to a VLAN (between1-8000). EVC name VLAN to EVC mapvalue: 1-4094, any, default, or untagged 16-21 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 16 Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties Viewing Link OAM Properties Link OAM processes include: • Discovery—Discovery is the first Link OAM process. During discovery, Link OAM identifies the devices at each end of the link and learns their OAM capabilities. • Link monitoring—Link OAM link monitoring includes: – Monitoring links and issuing notifications when error thresholds are exceeded or faults occur. – Collecting statistics on the number of frame errors (or percent of frames that have errors) and the number of coding symbol errors. • Remote MIB Variable Retrieval—Provides 802.3ah MIB polling and response (but not writing). • Remote Failure indication—Informs peers when a received path goes down. Because link connectivity faults caused by slowly deteriorating quality are difficult to detect, Link OAM communicates such failure conditions to its peer using OAMPDU flags. The failure conditions that can be communicated are a loss of signal in one direction on the link, an unrecoverable error (such as a power failure), or some other critical event. • Remote Loopback—Puts the peer device in (near-end) intrusive loopback mode using the OAMPDU loopback control. Statistics can be collected during the link testing. In loopback mode, every frame received is transmitted back unchanged on the same port (except for OAMPDUs, which are needed to maintain the OAM session). Loopback mode helps ensure the quality of links during installation or troubleshooting. Loopback mode can be configured so that the service provider device can put the customer device into loopback mode, but the customer device cannot put the service provider device in loopback mode. Prime Network Vision supports topology discovery based on Link OAM information and enables you to view Link OAM properties. For information on CFM and Ethernet LMI, see Viewing Connectivity Fault Management Properties, page 16-3 and Viewing Ethernet LMI Properties, page 16-16. To view Link OAM properties: Step 1 In Prime Network Vision, double-click the device configured for Link OAM. Step 2 In the inventory window, choose Logical Inventory > OAM. 16-22 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 16 Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties Viewing Link OAM Properties Figure 16-8 shows an example of Link OAM properties in logical inventory. Figure 16-8 Link OAM Properties in Logical Inventory Table 16-12 describes the information displayed for Link OAM. Table 16-12 Link OAM Properties in Logical Inventory Field Description Table Types Type of table. In this case, it is OAM. OAM Table Local Port Name of the OAM-supported interface, hyperlinked to the location in physical inventory. Local Port ID Local port identifier, such as FastEthernet1/0/9. Admin Status Administrative status of the interface. Port Status Status of the port. Remote MAC Address Remote client MAC address. 16-23 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 16 Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties Viewing Link OAM Properties Step 3 To view detailed information about an entry in the table, double-click the required entry. The Link OAM Data Properties window is displayed as shown in Figure 16-9. Figure 16-9 Link OAM Data Properties Window Table 16-13 describes the information that is displayed in the Link OAM Data Properties window. Table 16-13 Link OAM Data Properties Window Field Description Local Interface Local Port Name of the OAM-supported interface, hyperlinked to the location in physical inventory. Local Port ID Local port identifier. Admin Status Administrative status of the interface: Up or Down. Port Status Status of the port, such as Operational. PDU Max Rate (Frames/sec) Maximum transmission rate measured by the number of OAM PDUs per second; for example, 10 packets per second. PDU Min Rate (Seconds/frame) Minimum transmission rated measured by the number of seconds required for one OAM PDU; for example, 1 packet per 2 seconds. Link Timeout Number of seconds of inactivity on a link before the link is dropped. High Threshold Action Action that occurs when the high threshold for an error is exceeded. Link Fault Action Action that occurs when the signal is lost. 16-24 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 16 Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties Viewing Link OAM Properties Step 4 To view Link OAM status in physical inventory, choose Physical Inventory > chassis > slot > interface. The Link OAM administrative status is displayed as shown in Figure 16-10. Dying Gasp Action Action that occurs when an unrecoverable condition is encountered. Critical Event Action Action that occurs when an unspecified vendor-specific critical event occurs. Mode Mode of the interface: Active or Passive. Unidirection Status of unidirectional Ethernet on the local interface: Supported or Not supported. Link Monitor Status of link monitoring on the local interface: Supported or Not supported. Remote Loopback Status of remote loopback on the local interface: Supported or Not supported. Loopback Status Status of loopback on the local interface: Supported or No loopback. Remote Client MAC Address MAC address for the remote client. Vendor Vendor of the remote client. Mode Mode of the remote client: Active or Passive. Unidirection Status of unidirectional Ethernet on the remote client interface: Supported or Not supported. Link Monitor Status of link monitoring on the remote client interface: Supported or Not supported. Remote Loopback Status of loopback on the remote client interface: Supported or Not supported. Table 16-13 Link OAM Data Properties Window (continued) Field Description 16-25 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 16 Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties Using L-OAM Configuration, Assign, Enable, and Show Commands Figure 16-10 Link OAM Administrative Status in Physical Inventory Using L-OAM Configuration, Assign, Enable, and Show Commands The following commands can be launched from the inventory by right-clicking a L-OAM node and selecting Commands. Before executing any commands, you can preview them and view the results. If desired, you can also schedule the commands. To find out if a device supports these commands, see the Cisco Prime Network 3.10 Supported Cisco VNEs. Note You might be prompted to enter your device access credentials while executing a command. Once you have entered them, these credentials will be used for every subsequent execution of a command in the same GUI client session. If you want to change the credentials, click Edit Credentials. Edit Credentials button will not be available for SNMP commands or if the command is scheduled for a later time. Note In the GUI, parameters that are displayed in bold text are mandatory. 16-26 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 16 Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties Using L-OAM Configuration, Assign, Enable, and Show Commands Table 16-14 Link-OAM Commands Command Input Required and Notes Assign Template on Interface Interface name Template name Configure MultiPoint To MultiPoint or Point To Point EVC Template name Symbol-period threshold low: Between 1-65535 Symbol-period threshold high: Between 1-65535 Frame window: Between 10-600, where the value represents milliseconds in multiples of 100 (default is 100) Frame threshold low: Between 1-900 (default is 1) Frame threshold high: Between 1-900 (default is 1) Frame-period window: Between 100-65535, where the value represents a multiple of 10000 frames (default is 1000) Frame-period Threshold Low Frame-Period threshold high: Between 0-65535 Frame-seconds window: Between 100-9000, where the value represents a multiple of 100 milliseconds (default is 1000) Frame-seconds threshold low: Between 1-900 (default is 1) Frame-seconds threshold high: Between 1-900 Receive-Crc window: Between 10-1800, where the value represents a multiple of 100 milliseconds (default is 100) Receive-Crc threshold high: Between 1-65535 Transmit-Crc window: Between 10-1800 Transmit-Crc threshold high: Between 1-65535 Enable OAM on Interface Interface name, Template Name Disable OAM on Interface Interface name Enable E-LMI On Interface Interface name (if E-LMI is disabled globally, you can use this command to enable E-LMI on specific interfaces) Configure OAM Parameter on Interface Interface name Max-rate: Maximum number of OAM PDUs sent per second (1-10) Min-rate: Minimum transmission rate, in seconds, when one OAM PDU is sent per second (1-10) Mode: OAM client mode (active or passive). Remote loopback: Support or unsupport Ethernet remote loopback on the interface. Timeout range (2-30) Start Remote Loopback Interface name Stop Remote Loopback Interface name 16-27 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 16 Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties Using L-OAM Configuration, Assign, Enable, and Show Commands 16-28 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 16 Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties Using L-OAM Configuration, Assign, Enable, and Show Commands CHAPTER 17-1 Cisco Prime Network 3.10 User Guide OL-28065-01 17 Monitoring Y.1731 IPSLA Configuration The following topics provide an overview of the Y.1731 technology and describe how to view and monitor Y.1731 configurations in Prime Network Vision: • Y.1731 Technology - An Overview, page 17-1 • User Roles Required to Work with Y.1731 Probes, page 17-2 • Working with Y.1731 IPSLA Configurations, page 17-2 Y.1731 Technology - An Overview Y.1731 is an ITU-T recommendation that provides mechanisms for service-level Operation, Administration, and Maintenance (OAM) functionality in Ethernet networks. It covers mechanisms for Fault and Performance Management. Performance Management is the most sought-after functionality in this standard. In Prime Network, devices that are configured using Y.1731 are detected, scanned for configurations, and monitored. A device configured using Y.1731 has probes, which are root objects or containers that hold single or multiple instances of Service Level Agreement (SLA) probes configured by the user. In Prime Network, the Y.1731 technology is supported on the Cisco Aggregation Service Router (ASR) 9000 and Cisco Carrier Packet Transport (CPT) network elements. Y.1731 Performance Management Mechanisms The OAM functions for performance monitoring according to Y.1731 allow measurement of the following performance parameters. • Frame Loss Ratio—Expressed as a percentage. This ratio is defined as the number of frames not delivered divided by the total number of frames during a time interval. • Frame Delay—A one-way delay for a frame, where one-way frame delay is defined as the time elapsed since the start of transmission of the first bit of the frame by a source node until the reception of the last bit of the same frame by the destination node. • Frame Delay Variation—The measure of the variations in the frame delay between a pair of service frames. The service frames belong to the same CoS (Class of Service) instance on a point-to-point Ethernet (ETH) connection or multipoint ETH connectivity. • Throughput—The average rate of successful traffic delivery over a communication channel. Typically used under test conditions, such as out-of service tests, when there is no traffic for the tested Ethernet connection. 17-2 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 17 Monitoring Y.1731 IPSLA Configuration User Roles Required to Work with Y.1731 Probes User Roles Required to Work with Y.1731 Probes This topic identifies the roles that are required to work with Y.1731 probes. Prime Network determines whether you are authorized to perform a task as follows: • For GUI-based tasks (tasks that do not affect elements), authorization is based on the default permission that is assigned to your user account. • For element-based tasks (tasks that do affect elements), authorization is based on the default permission that is assigned to your account. That is, whether the element is in one of your assigned scopes and whether you meet the minimum security level for that scope. For more information on user authorization, see the topic on device scopes in the Cisco Prime Network 3.10 Administrator Guide. Working with Y.1731 IPSLA Configurations This topic contains the following sections: • Viewing the Y.1731 Probe Properties, page 17-2 • Configuring Y.1731 Probes, page 17-4 • Diagnosing Y.1731 Probes, page 17-13 Viewing the Y.1731 Probe Properties To view the Y.1731 probes and their properties for a device: Step 1 Right-click on the device and choose Inventory. Step 2 In the Inventory window, choose Logical Inventory > Probes > Y1731 Probes. A list of Y.1731 probes is displayed in the Y.1731 Probes content pane as shown in Figure 17-1. Table 17-1 Default Permission/Security Level Required for Y.1731 Probes Task Viewer Operator OperatorPlus Configurator Administrator View the Y.1731 probe properties X X X X X Configure Y.1731 probes — — — X X 17-3 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 17 Monitoring Y.1731 IPSLA Configuration Working with Y.1731 IPSLA Configurations Figure 17-1 Y.1731 Probes Content Pane Table 17-2 describes the fields that are displayed in the content pane. Table 17-2 Y.1731 Content Pane Field Name Description Profile Name The name of the profile created for performance monitoring of the SLA configuration. Source MEP The maintenance endpoint (MEP) interface ID where the probe is getting initiated. Source MAC Address The source interface MAC address where the probe is getting initiated. Destination The interface ID or MAC address, which will help the probe to reach its destination. OAM Domain The name of the OAM domain. Measurement Type The type of performance operation, which could be cfm-delay-measurement or cfm-loopback. Ethernet Virtual Connection The name or identifier of the ethernet virtual connection, which connects two User-Network Interfaces (UNI). This is applicable only for the Cisco CPT devices. Packet Size The size of the service packet. This includes padding size when required. Packets Per Burst The number of packets transmitted per burst. Burst Period The time taken to send the packets from the source to their destination. This period is usually specified in terms of seconds or milliseconds. 17-4 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 17 Monitoring Y.1731 IPSLA Configuration Working with Y.1731 IPSLA Configurations Step 3 Right-click on a probe and choose Properties to view its properties. Additionally, the following information is displayed in the Probe Properties window for a Cisco CPT device. Table 17-3 describes the additional fields that are displayed for a Cisco CPT device in the Probe Properties window. Configuring Y.1731 Probes You can configure Y.1731 probes using a certain set of commands. The following commands can be launched from the inventory by right-clicking the appropriate node and selecting Commands. Before executing any commands, you can preview them and view the results. If desired, you can also schedule the commands. To find out if a device supports these commands, see the Cisco Prime Network 3.10 Supported Cisco VNEs. The following commands facilitate the configuration of Y.1731 probes for a Cisco ASR9000 device: • Configure Probe Endpoint Association, page 17-5 • Configure Profile, page 17-5 • Create On Demand Probe Configuration, page 17-7 • Deassociate Profile, page 17-10 • Delete Profile, page 17-10 The following commands facilitate the configuration of Y.1731 probes for a Cisco CPT device: • Configure IP SLA Parameters, page 17-11 • Delete IP SLA, page 17-12 Table 17-3 Probe Properties Window Field Name Description Measurements Statistics Type The statistics type, which is Round Trip Delay or Round Trip Jitter. Aggregate Bin Count The aggregate count of bins to store the counter values of the result of each performance parameter. Note The counter value refers to the counter of number of results that fall within a particular range specified for each performance attribute. Aggregate Bin Boundaries The bin boundary for the bins. For Cisco CPT devices, bin boundary is specified as comma separated intervals; whereas for ASR9K devices, it is an integer. Bin boundaries are specified in terms of milliseconds. Bucket Size The number of buckets required to store the performance attribute results gathered during a specified period. By default, a separate bucket is created for each probe, which will contain the results relating to measurements made by the probe. 17-5 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 17 Monitoring Y.1731 IPSLA Configuration Working with Y.1731 IPSLA Configurations Configure Probe Endpoint Association To configure endpoint association of a probe: Step 1 In the inventory window, expand the Logical Inventory tree and choose the Probes > Y1731 Probes node. Step 2 Right-click and choose Commands > Configuration > Configure Probe EndPoint Association. The Configure Probe EndPoint Association dialog box opens. Step 3 By default, the General tab is selected. Provide values for the following parameters. Step 4 Preview, schedule, or execute the command. Configure Profile To configure a profile for the probe. Step 1 In the inventory window, expand the Logical Inventory tree and choose the Probes > Y1731 Probes node. Step 2 Right-click and choose Commands > Configuration > Configure Profile. The Configure Profile dialog box opens. Step 3 By default, the General tab is selected. Provide values for the following parameters: Input Parameter Description Interface The interface ID, which is either a MEPID or a MAC Address. OAM Domain The OAM domain. Service Name The name of the service. Source Maintenance Endpoint ID The identification of the source maintenance endpoint. Profile Name The name of the profile created for performance monitoring for Service Level Agreements configuration. Destination Type The destination type, which is either a MEPID or a MAC Address. Destination The destination MEPID or the MAC Address. Input Parameter Description Profile Name The name of the profile that must be configured. Operation Type The operation type as cfm-delay-measurement or cfm-loopback. Probe Type The probe type as burst or packet. Probe Schedule Type The schedule type for probes as every or once. Probe Schedule Value The value for the schedule type selected in the previous field. 17-6 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 17 Monitoring Y.1731 IPSLA Configuration Working with Y.1731 IPSLA Configurations Step 4 Select the SLA Statistics tab. Provide values for the following parameters: Probe Scheduled Units The units for the schedule type and value selected in the previous fields. Values are: • milliseconds • seconds • minutes • hours • none Number of Packets The number of packets transmitted from the source to the destination. Interval Period The time taken to send the packets from the source to their destination. Interval Period Units The unit of the interval period. Values are: • Milliseconds • Seconds • None Packet Size The size of the service packet (including padding size when required). Test Pattern The test pattern. Values are: • hex • pseudo-random • None Test Pattern Value The value for the selected test pattern. Priority Value The priority value. Input Parameter Description Statistics Type The statistics type. Values are: • one-way-delay-ds • one-way-delay-sd • one-way-jitter-ds • one-way-jitter-sd • round-trip-delay • round-trip-jitter Aggregate Period The aggregate period, which can be configure or none. Aggregate Bins The aggregate count of bins to store the counter values of the result of each performance parameter. Aggregate Width The aggregate width of each bin. Bucket Size The number of buckets required to store the performance attribute results gathered during a specified period. Input Parameter Description 17-7 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 17 Monitoring Y.1731 IPSLA Configuration Working with Y.1731 IPSLA Configurations Step 5 Select the SLA Schedule tab. Provide values for the following parameters: Step 6 Preview, schedule, or execute the command. Create On Demand Probe Configuration To create on demand probe configuration: Step 1 In the inventory window, expand the Logical Inventory tree and choose the Probes > Y1731 Probes node. Step 2 Right-click and choose Commands > Configuration > Create On Demand Probe Configuration. The Create On Demand Probe Configuration dialog box opens. Step 3 By default, the General tab is selected. Provide values for the following parameters: Bucket Size Units The units for the bucket size, which can be per-probe or probes. Bucket Archive The number of buckets archived. Input Parameter Description Schedule Time or Day The time or day for the SLA schedule. Schedule Time Units The units for the schedule. Values are: • hours • minutes • none Schedule At The time at which the SLA must be scheduled. Schedule for Duration The duration for which the SLA must be scheduled. Schedule for Units The units for the schedule. Values are: • seconds • minutes • hours • days • week • None Input Parameter Description Input Parameter Description Operation Type The type of operation, which can be cfm-delay-measurement or cfm-loopback. OAM Domain The OAM domain. 17-8 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 17 Monitoring Y.1731 IPSLA Configuration Working with Y.1731 IPSLA Configurations Step 4 Choose the Probe Statistics tab. Provide values for the following parameters: Source Interface [B/G/T/P Location] The source interface ID for a probe. Destination Type The destination type, which can be mac-address or mep-id. Destination Value The interface ID of the destination, which is either a MAC Address id or a MEPID. Packet Size The size of the service packet. This also includes padding size when required. Test Pattern The test pattern. Values are: • hex • pseudo-random • None Test pattern value The value of the selected test pattern. Priority Value The priority value. Probe Type The type of probe. Values are: • burst • packet • none Probe Schedule Type The schedule type for probes, which can be every or once. Probe Schedule Value The value for the schedule type selected in the previous field. Probe Scheduled Units The units for the schedule type and value selected in the previous fields. Values are: • minutes • hours • none Number of Packets The number of packets transmitted from the source to the destination. Interval Period The time taken to send the packets from the source to their destination. Input Parameter Description Statistics Type The statistics type. Values are: • one-way-delay-ds • one-way-delay-sd • one-way-jitter-ds • one-way-jitter-sd • round-trip-delay • round-trip-jitter Aggregate Period The aggregate period, which can be configure or none. Input Parameter Description 17-9 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 17 Monitoring Y.1731 IPSLA Configuration Working with Y.1731 IPSLA Configurations Step 5 Choose the Probe Schedule tab. Provide values for the following parameters: Aggregate Bins The aggregate count of bins to store the counter values of the result of each performance parameter. Aggregate Width The aggregate width of each bin. Bucket Properties The bucket type. Values are: • archive • size • none Archive/Bucket Size The number of buckets required to store the performance attribute results gathered during a specified period. Input Parameter Description Schedule Config The schedule to be used for the configuration. Values are: • now • at • in • None Schedule At The time at which the probe must be scheduled. Schedule At Date The date on which the probe must be scheduled. Schedule In The time period for which the probe must be scheduled. Schedule In Units The units to be used for the schedule. Values are: • seconds • minutes • None Schedule for Duration The duration for which the probe must be scheduled. Schedule for Units The units for the schedule duration. Values are: • seconds • minutes • None Repeat Probe Interval The interval during which the schedule must be repeated. Repeat Probe Units The units for the repeat schedule. Values are: • seconds • minutes • None Input Parameter Description 17-10 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 17 Monitoring Y.1731 IPSLA Configuration Working with Y.1731 IPSLA Configurations Step 6 Preview, schedule, or execute the command. Deassociate Profile To deassociate a profile: Step 1 In the inventory window, expand the Logical Inventory tree and choose the Probes > Y1731 Probes node. Step 2 Right-click and choose Commands > Configuration > Deassociate Profile. The Deassociate Profile dialog box opens. Step 3 By default, the General tab is selected. Provide values for the following parameters: Step 4 Preview, schedule, or execute the command. Delete Profile To delete a profile: Step 1 In the inventory window, expand the Logical Inventory tree and choose the Probes > Y1731 Probes node. Number of probes The number of probes that must be configured. Asynchronous Indicates whether the schedule is asynchronous. Values are: • enable • disable • None Input Parameter Description Input Parameter Description Profile Name The name of the profile created for performance monitoring of the SLA configuration. Interface Name The interface ID. Domain Name The name of the OAM domain. Service Name The name of the service. Source MEPID The source interface ID for a probe where the probe is getting initiated. Destination Type The destination type, which can be mac-address or mep-id. Destination Value The interface ID of the destination, which is either a MAC Address ID or a MEPID. 17-11 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 17 Monitoring Y.1731 IPSLA Configuration Working with Y.1731 IPSLA Configurations Step 2 Right-click and choose Commands > Configuration > Delete Profile. The Delete Profile dialog box opens. Step 3 By default, the General tab is selected. Provide values for the following parameters: Step 4 Preview, schedule, or execute the command. Configure IP SLA Parameters To configure an IP SLA profile for the probe. Step 1 In the inventory window, expand the Logical Inventory tree and choose the Probes > Y1731 Probes node. Step 2 Right-click and choose Commands > Configuration > Configure IP SLA Parameters. The Configure Profile dialog box opens. Step 3 By default, the General tab is selected. Provide values for the following parameters: Input Parameter Description Profile Name The name of the profile created for performance monitoring of SLA configuration. Measurement Type The measurement type, which can be cfm-delay-measurement or cfm-loopback. Input Parameter Description SLA ID The unique SLA ID. Measurement Type The measurement type, which can be cfm-delay-measurement or cfm-loopback. OAM Domain Name The name of the OAM domain. Ethernet Virtual Connection The name or identifier of the ethernet virtual connection, which connects two User-Network Interfaces (UNI). Target Maintenance End point id or Mac Address Type The target type, which can be Maintenance endpoint or Mac Address. Target Maintenance End point id or Mac Address The target maintenance endpoint ID or the Mac address, based on the type selected. Class of Service The class of service, which can be any value between 0 and 7. Source Maintenance End point id or Mac Address Type The source type, which can be Maintenance endpoint or Mac Address. Source Maintenance End point id or Mac Address The source maintenance endpoint ID or the Mac address, based on the type selected. Y1731 Frame Type The Y1731 frame type, which can be interval, offset, or size. 17-12 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 17 Monitoring Y.1731 IPSLA Configuration Working with Y.1731 IPSLA Configurations Step 4 Choose the SLA Schedule tab. Provide values for the following parameters: Step 5 Preview, schedule, or execute the command. Delete IP SLA To delete IP SLA: Step 1 In the inventory window, expand the Logical Inventory tree and choose the Probes > Y1731 Probes node. Step 2 Right-click and choose Commands > Configuration > Delete IP SLA. The Delete IP SLA dialog box opens. Y1731 Frame Parameters The frame parameter, based on the frame type selected. History Period The number of historical aggregated interval statistics to be retained, which can be any value between 0 and 10. Aggregate Period The duration for which individual delay measurements are aggregated into cumulative statistics. Distribution Type The distribution type, which can be delay or delay-variation. Distribution Value The distribution value, based on the distribution type selected. Distribution Boundaries [comma separated] The distribution boundaries separated by a comma. Max Delay in milliseconds The maximum delay that is allowed as a valid delay measurement. Owner Name The name of the operation owner. Input Parameter Description Life Type The schedule type for the two-way delay measurement on the sender, which can be forever, seconds, or None. Life Period The schedule period, based on the life type selected. Start Time Type The start time type for the schedule, which can be now, hh:mm [:ss], after {hh:mm:ss}, or None. Start Time The time when the schedule must start, based on the type selected. Month Day Format The month day format to be used for the schedule, which can be month-day, day-month, or None. Month Day Input The month day input format. Age out Period in seconds The age out period for the schedule. Recurring The option to execute the schedule repeatedly, which can be Disable, Enable, or None. Input Parameter Description 17-13 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 17 Monitoring Y.1731 IPSLA Configuration Working with Y.1731 IPSLA Configurations Step 3 By default, the General tab is selected. Provide values for the following parameters: Step 4 Preview, schedule, or execute the command. Diagnosing Y.1731 Probes The following commands facilitate diagnosing the Y.1731 probes for a Cisco ASR 9000 device: • Show SLA Operations Detail, page 17-13 • Show SLA Profiles, page 17-13 The following command facilitates diagnosing the Y.1731 probes for a Cisco CPT device: • Show IP SLA, page 17-14 Show SLA Operations Detail To view the details of the SLA operation: Step 1 In the inventory window, expand the Logical Inventory tree and choose the Probes > Y1731 Probes node. Step 2 Right-click and choose Commands > Diagnostics > Show SLA Operations Detail. The Show SLA Operations Detail dialog box opens. The command checks the operational details and does not require any input parameters. Step 3 To see the commands that will be applied on the device, click Preview. Step 4 To schedule the command, click the Scheduling tab. Step 5 To run the command, click Execute Now. You can view errors in the Result tab, if there are any. Step 6 To close the dialog box, click Close. Show SLA Profiles To view a list the SLA profiles: Step 1 In the inventory window, expand the Logical Inventory tree and choose the Probes > Y1731 Probes node. Step 2 Right-click and choose Commands > Diagnostics > Show SLA Profiles. The Show SLAProfiles dialog box opens. The command checks the details and does not require any input parameters. Input Parameter Description SLA ID The SLA ID that must be deleted. 17-14 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 17 Monitoring Y.1731 IPSLA Configuration Working with Y.1731 IPSLA Configurations Step 3 To see the commands that will be applied on the device, click Preview. Step 4 To schedule the command, click the Scheduling tab. Step 5 To run the command, click Execute Now. You can view errors in the Result tab, if there are any. Step 6 To close the dialog box, click Close. Show IP SLA To view the IP SLA schedule details: Step 1 In the inventory window, expand the Logical Inventory tree and choose the Probes > Y1731 Probes node. Step 2 Right-click and choose Commands > Diagnostics > Show IP SLA. The Show IP SLA dialog box opens. The command checks the details and does not require any input parameters. Step 3 To see the commands that will be applied on the device, click Preview. Step 4 To schedule the command, click the Scheduling tab. Step 5 To run the command, click Execute Now. You can view errors in the Result tab, if there are any. Step 6 To close the dialog box, click Close. CHAPTER 18-1 Cisco Prime Network 3.10 User Guide OL-28065-01 18 IPv6 and IPv6 VPN over MPLS Cisco Prime Network (Prime Network) supports IPv6 for: • Gateways, clients, and units using IPv6. • Communications between VNEs and devices in IPv6 environments, whether the device management IP address is IPv4 or IPv6. • Polling and notification using the following protocols over IPv6: – SNMP v1, SNMPv2c, and SNMPv3 – Telnet – SSHv2 – ICMP – XML (for Cisco IOS XR devices) – HTTP (for Cisco UCS devices) • All reports with devices that use IPv6 addresses. • Fault management, including event processing and service alarm generation. Prime Network supports correlation and path tracing for: • 6PE and native IPv6 networks. • IPv6 BGP address families. • IPv6 GRE tunnels. IPv6 VPN over MPLS, also known as 6VPE, uses the existing MPLS IPv4 core infrastructure for IPv6 transport to enable IPv6 sites to communicate over an MPLS IPv4 core network using MPLS label switch paths (LSPs). 6VPE relies on MP-BGP extensions in the IPv4 network configuration on the PE router to exchange IPv6 reachability information. Edge routers are configured to be dual-stacks running both IPv4 and IPv6, and use the IPv4-mapped IPv6 address for IPv6 prefix reachability exchange. In 6VPE environments, Prime Network supports: • Modeling of OSPFv3 routes between PE and CE devices. • IPv6 addresses for BGP neighbors for MP-BGP. • Correlation and path tracing. This chapter contains the following topics: • User Roles Required to Work with IPv6 and 6VPE, page 18-2 • Viewing IPv6 Information, page 18-2 18-2 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 18 IPv6 and IPv6 VPN over MPLS User Roles Required to Work with IPv6 and 6VPE User Roles Required to Work with IPv6 and 6VPE This topic identifies the roles that are required to work with IPv6 and 6VPE in Prime Network Vision. Prime Network determines whether you are authorized to perform a task as follows: • For GUI-based tasks (tasks that do not affect elements), authorization is based on the default permission that is assigned to your user account. • For element-based tasks (tasks that do affect elements), authorization is based on the default permission that is assigned to your account. That is, whether the element is in one of your assigned scopes and whether you meet the minimum security level for that scope. For more information on user authorization, see the Cisco Prime Network 3.10 Administrator Guide. The following tables identify the tasks that you can perform: • Table 18-1 identifies the tasks that you can perform if a selected element is not in one of your assigned scopes. • Table 18-2 identifies the tasks that you can perform if a selected element is in one of your assigned scopes. By default, users with the Administrator role have access to all managed elements. To change the Administrator user scope, see the topic on device scopes in the Cisco Prime Network 3.10 Administrator Guide. Viewing IPv6 Information Prime Network Vision displays IPv6 addresses when they are configured on PE and CE routers in the IP interface table. IPv6 addresses are: • Displayed in the Prime Network Vision map pane for IPv6 links. • Displayed in logical and physical inventory for routing and interface information, including IP, PPP, and High-Level Data Link Control (HDLC). • Used in Cisco PathTracer to trace paths and present path trace results. Table 18-1 Default Permission/Security Level Required for Viewing IPv6 Properties - Element Not in User’s Scope Task Viewer Operator OperatorPlus Configurator Administrator View IPv6 properties — — — — X Table 18-2 Default Permission/Security Level Required for Viewing IPv6 Properties - Element in User’s Scope Task Viewer Operator OperatorPlus Configurator Administrator View IPv6 properties X X X X X 18-3 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 18 IPv6 and IPv6 VPN over MPLS Viewing IPv6 Information Table 18-3 describes where IPv6 information appears in logical and physical inventory. Table 18-3 IPv6 Information in Inventory Inventory Location Description Logical Inventory 6rd Tunnels The Tunnel Edges table displays IPv6 addresses and the IPv6 prefixes that are used to translate IPv4 addresses to IPv6 addresses. For more information, see Viewing 6rd Tunnel Properties, page 19-48. Access Lists • The Type field displays IPv6 for IPv6 access lists. • If an IPv6 access list is configured, the Access List Properties window displays IPv6 addresses in the Source, Destination, Source Wildcard, and Destination Wildcard fields. Carrier Grade NAT Carrier Grade NAT service types include 6rd and XLAT. For more information, see Viewing Carrier Grade NAT Properties in Logical Inventory, page 14-2. GRE Tunnels The IP Address field supports IPv6 addresses. For more information, see Viewing MPLS Pseudowire over GRE Properties, page 21-32. IS-IS IS-IS properties support: • IPv6 address families in the Metrics tab. • IPv6 addresses in the Neighbors tab and the IS-IS Neighbor Properties window. For more information, see Viewing IS-IS Properties, page 13-111. MPBGPs • IP address family identifiers indicate the BGP peer address family: IPv4, IPv6, Layer 2 VPN, VPNv4, or VPNv6. • MP-BGP BGP neighbor entries display IPv6 addresses. For information, see Viewing MP-BGP Information, page 19-47. OSPFv3 IPv6 addresses are displayed for OSPF neighbor interface addresses, OSPF interface internet addresses, OSPF neighbor properties window, and OSPF interface properties window. For more information, see Viewing OSPF Properties, page 13-114. Routing Entities • IPv6 addresses appear in the IP Interfaces tab, the IPv6 Routing tab, and the interface properties window. • IPv6 addresses are displayed in the NDP Table tab and the ARP Entry Properties window. • VRRP groups using IPv6 display IPv6 addresses in the IP Interfaces Properties window in the VRRP group tab. For more information, see Viewing Routing Entities, page 19-32. VRFs IPv6 addresses appear in the IPv6 tab, Sites tab, VRF Properties window, and IP Interface Properties window. For more information, see Viewing VRF Properties, page 19-27. 18-4 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 18 IPv6 and IPv6 VPN over MPLS Viewing IPv6 Information The IP addresses that appear depend on whether the interface has only IPv4 addresses, only IPv6 addresses, or both IPv4 and IPv6 addresses, as shown in Table 18-4. Note the following when working with IPv6 addresses: • MPLS label switching entries and Label Switching Entities (LSEs) do not display IPv6 addresses. However, the Neighbor Discovery Protocol (NDP) table does display IPv6 addresses. • Prime Network supports all the textual presentations of address prefixes. However, Prime Network Vision displays both the IP address and the subnet prefix, for example: 12AB::CD30:123:4567:89AB:CDEF, 12AB:0:0:CD30::/60 Note Interfaces or subinterfaces that do not have IP addresses are not discovered and therefore are not shown in Prime Network Vision. Figure 18-1 shows a port inventory view of a port with IPv4 and IPv6 addresses. In this example, one IPv4 address and multiple IPv6 addresses are provisioned on the interface. • The primary IPv4 address appears in the interface table and properties window. If secondary IPv4 addresses were provisioned on the interface, they would appear in the properties window. • IPv6 addresses provisioned on the interface appear in the properties window and Sub Interfaces tab. Physical Inventory Port IPv6 addresses appear in the Subinterfaces tab and interface properties popup window. Table 18-3 IPv6 Information in Inventory (continued) Inventory Location Description Table 18-4 IP Addresses Displayed in the Interface Table and Properties Window Addresses Interface Table Properties Window IPv4 only Primary IPv4 address The primary IPv4 address and any secondary IPv4 addresses. IPv6 only Lowest IPv6 address All IPv6 addresses. IPv6 and IPv4 Primary IPv4 address All IPv4 and IPv6 addresses. 18-5 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 18 IPv6 and IPv6 VPN over MPLS Viewing IPv6 Information Figure 18-1 Port with IPv4 and IPv6 Addresses Figure 18-2 shows a port with only IPv6 addresses provisioned. In this example, the lowest IPv6 address is shown in the subinterface table, and all IPv6 addresses are shown in the interface properties window. 18-6 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 18 IPv6 and IPv6 VPN over MPLS Viewing IPv6 Information Figure 18-2 Port with IPv6 Addresses CHAPTER 19-1 Cisco Prime Network 3.10 User Guide OL-28065-01 19 Monitoring MPLS Services The following topics describe how to view and manage aspects of Multiprotocol Label Switching (MPLS) services using Cisco Prime Network Vision (Prime Network Vision), including the MPLS service view, business configuration, and maps. The topics also describe the device inventory specific to MPLS VPNs, including routing entities, label switched entities (LSEs), BGP neighbors, Multiprotocol BGP (MP-BGP), VRF instances, pseudowires, and TE tunnels. Topics include: • User Roles Required to Work with MPLS Networks, page 19-1 • Working with MPLS-TP Tunnels, page 19-4 • Viewing VPNs, page 19-18 • Managing VPNs, page 19-21 • Working with VPN Overlays, page 19-24 • Monitoring MPLS Services, page 19-26 • MPLS-TP Commands, page 19-56 User Roles Required to Work with MPLS Networks This topic identifies the roles that are required to work with MPLS networks. Prime Network determines whether you are authorized to perform a task as follows: • For GUI-based tasks (tasks that do not affect elements), authorization is based on the default permission that is assigned to your user account. • For element-based tasks (tasks that do affect elements), authorization is based on the default permission that is assigned to your account. That is, whether the element is in one of your assigned scopes and whether you meet the minimum security level for that scope. For more information on user authorization, see the Cisco Prime Network 3.10 Administrator Guide. The following tables identify the tasks that you can perform: • Table 19-1 identifies the tasks that you can perform if a selected element is not in one of your assigned scopes. • Table 19-2 identifies the tasks that you can perform if a selected element is in one of your assigned scopes. By default, users with the Administrator role have access to all managed elements. To change the Administrator user scope, see the topic on device scopes in the Cisco Prime Network 3.10 Administrator Guide. 19-2 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 19 Monitoring MPLS Services User Roles Required to Work with MPLS Networks Table 19-1 Default Permission/Security Level Required for Working with MPLS Networks - Element Not in User’s Scope Task Viewer Operator OperatorPlus Configurator Administrator Working with Elements Add tunnels to VPNs — X X X X Add VPNs to a map — — X X X Create VPNs — — X X X Move virtual routers between VPNs — X X X X Remove tunnels from VPNs X X X X X Remove VPNs from a map — — X X X Viewing Element Properties View 6RD properties — — — — X View BFD properties — — — — X View cross-VRF routing entries — — — — X View LSE properties — — — — X View MP-BGP information — — — — X View MPLS TE tunnel information — — — — X View MPLS-TP information — — — — X View port configurations — — — — X View pseudowire end-to-end emulation tunnels —— — — X View rate limit information — — — — X View the ARP table — — — — X View the NDP table — — — — X View VPN properties X X X X X View VPNs X X X X X View VRF egress and ingress adjacents —— — — X View VRF properties — — — — X Working with Overlays Add VPN overlays X X X X X Display or hide VPN overlays X X X X X Remove VPN overlays X X X X X 19-3 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 19 Monitoring MPLS Services User Roles Required to Work with MPLS Networks Table 19-2 Default Permission/Security Level Required for Working with MPLS Networks - Element in User’s Scope Task Viewer Operator OperatorPlus Configurator Administrator VPNs and VRFs Add tunnels to VPNs — X X X X Add VPNs to a map — — X X X Create VPNs — — X X X Display VRF egress and ingress adjacents —— — — X Move virtual routers between VPNs — X X X X Remove tunnels from VPNs X X X X X Remove VPNs from a map — — X X X View VPN properties X X X X X View VPNs X X X X X View VRF properties — — — — X VPN Overlays Add VPN overlays X X X X X Display or hide VPN overlays X X X X X Remove VPN overlays X X X X X Routing Entities View the ARP table X X X X X View the NDP table X X X X X View rate limit information X X X X X Other View 6RD properties X X X X X View BFD properties X X X X X View cross-VRF routing entries X X X X X View LSE properties X X X X X View MP-BGP information X X X X X View MPLS TE tunnel information X X X X X View MPLS-TP information X X X X X View port configurations X X X X X View pseudowire end-to-end emulation tunnels XX X X X 19-4 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 19 Monitoring MPLS Services Working with MPLS-TP Tunnels Working with MPLS-TP Tunnels MPLS-Transport Profile (MPLS-TP) is considered to be the next generation transport for those using SONET/SDH TDM technologies as they migrate to packet-switching technology. Although still under definition by the IETF, MPLS-TP provides: • Predetermined and long-lived connections. • Emphasis on manageability and deterministic behavior. • Fast fault detection and recovery. • Inband OAM. MPLS-TP features include: • Manually provisioned MPLS-TP LSPs. • Reserved bandwidth for static MPLS-TP LSPs. • One-to-one path protection for MPLS-TP LSPs. • Working/Protected LSP switchover. • Continuity Check (CC), Proactive Continuity Verification (CV), and Remote Defect Indication (RDI) based on BFD. • New fault OAM functions resulting from the MPLS-TP standardization effort. Prime Network automatically discovers network MPLS-TP tunnels from end to end, including LSPs, tunnel endpoints, and bandwidth. Network LSPs contain LSP endpoints and midpoints and are identified as working or protected. Prime Network links the MPLS-TP tunnel components appropriately, provides a visual representation in Prime Network Vision maps, and displays the properties in logical inventory. Prime Network employs warm start technology when rebooting. That is, when rebooting, Prime Network compares existing MPLS-TP tunnel information to topology changes that occur while Prime Network is down and updates MPLS-TP tunnel accordingly when Prime Network returns to operation. The following options are available for working with MPLS-TP tunnels in Prime Network Vision: • Adding an MPLS-TP Tunnel, page 19-5 • Viewing MPLS-TP Tunnel Properties, page 19-7 • Viewing LSPs Configured on an Ethernet Link, page 19-11 • Viewing LSP Endpoint Redundancy Service Properties, page 19-13 • Applying an MPLS-TP Tunnel Overlay, page 19-16 • Viewing MPLS-TP BFD session properties—See Viewing BFD Session Properties, page 19-50. 19-5 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 19 Monitoring MPLS Services Working with MPLS-TP Tunnels Adding an MPLS-TP Tunnel Prime Network Vision automatically discovers MPLS-TP tunnels, endpoints, and midpoints and enables you to add MPLP-TP tunnels to maps. To add an MPLS-TP tunnel to a map: Step 1 In Prime Network Vision, display the map to which you want to add the MPLS-TP tunnel. Step 2 Do either of the following: • From the File menu, choose Add to Map > MPLS-TP Tunnel. • In the main toolbar, click Add to Map, then choose Add to Map > MPLS-TP Tunnel. The Add MPLS-TP Tunnel dialog box is displayed. Step 3 Do either of the following: • Choose a search category, enter a search string, then click Go to narrow search results to a range of MPLS-TP tunnels or a specific MPLS-TP tunnel. Search categories include: – Description – Name – System Name • Choose Show All to display all the MPLS-TP tunnels. Step 4 Select the MPLS-TP tunnel that you want to add to the map. Step 5 Click OK. The MPLS-TP tunnel is added to the map and to the navigation pane. In Figure 19-1: • The devices are on the left side of the map, and the MPLS-TP tunnel is displayed in a thumbnail on the right. • The devices are connected to each other and to the MPLS-TP tunnel via tunnels. • Physical links connect the devices to the Working and Protected LSPs. • A redundancy service badge is displayed next to the Protected LSP in the navigation and map panes. • In the thumbnail: – The tunnel endpoints are connected to each other via a tunnel. – A physical link connects the Working and Protected LSPs. – Business links connect the Working and Protected LSPs to each endpoint. 19-6 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 19 Monitoring MPLS Services Working with MPLS-TP Tunnels Figure 19-1 MPLS-TP Tunnel in Prime Network Vision Map If an LSP is in lockout state, it is displayed with the lock badge ( ). By expanding all aggregations in the MPLS-TP tunnel (see Figure 19-2), you can see components and links in the MPLS-TP tunnel, including: • MPLS-TP tunnel endpoints • LSP endpoints • LSP midpoints Figure 19-2 MPLS-TP Tunnel Expanded If an LSP is configured for redundancy service, a redundancy service badge is applied to the secondary (backup) LSP in the navigation and map panes in the navigation and map panes. 19-7 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 19 Monitoring MPLS Services Working with MPLS-TP Tunnels For more information about LSP redundancy service, see Viewing LSP Endpoint Redundancy Service Properties, page 19-13. Viewing MPLS-TP Tunnel Properties Prime Network Vision discovers and displays MPLS-TP attributes in the MPLS-TP branch in logical inventory as described in this topic. Additional information about MPLS-TP tunnel properties are available in the following branches: • Routing Entities—See Viewing Routing Entities, page 19-32. • LSEs—See Viewing Label Switched Entity Properties, page 19-41. • Pseudowires— See Viewing Pseudowire End-to-End Emulation Tunnels, page 19-53. To view MPLS-TP tunnel properties: Step 1 Right-click the required device in Prime Network Vision and choose Inventory. Step 2 In the logical inventory window, choose Logical Inventory > MPLS-TP > MPLS-TP Global. The routing information is displayed as shown in Figure 19-3. Figure 19-3 MPLS-TP Tunnel Properties in Logical Inventory Table 19-3 describes the information that is available for MPLS-TP tunnels. The information that is displayed depends on the configuration. 19-8 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 19 Monitoring MPLS Services Working with MPLS-TP Tunnels Table 19-3 MPLS-TP Tunnel Properties in Logical Inventory Field Description Global ID Globally unique Attachment Interface Identifier (AII) for MPLS-TP derived from the Autonomous System Number (ASN) of the system hosting the PEs. Router ID MPLS-TP source node identifier for this element in the form of an IPv4 address. Protection Mode Whether the transmitting endpoint is in revertive or nonrevertive mode: • Revertive—If the protection mode is revertive and a failed path is restored, the traffic automatically returns, or reverts, to the original path. • Nonrevertive—If the protection mode is nonrevertive and a failed path is restored, the traffic does not return to the original path. That is, the traffic does not revert to the original path. Redundancy Mode Level of redundancy for the MPLS-TP tunnel: 1:1, 1+1, or 1:N. MPLS-TP Tunnel Endpoints Tab ID Tunnel endpoint identifier as a Tunnel-tp interface on the selected network element. Tunnel ID Unique tunnel identifier. Admin Status Administrative status of the tunnel: Up or Down. Oper Status Operational status of the tunnel: Up or Down. Bandwidth (kbps) Configured bandwidth (in Kb/s) for the tunnel. Description Tunnel description. TP Enabled Links Tab Link ID Identifier assigned to the MPLS-TP interface. Interface Hyperlink to the interface in physical inventory. Next Hop IP address of the next hop in the path. LSP End Points Tab LSP ID LSP identifier, derived from both endpoint identifiers and using the format src-node-ID::src-tunnel-number::dest-node-ID::dest-tunnel-number where: • src-node-ID represents the identifier of the node originating the signal exchange. • src-tunnel-number represents source tunnel identifier. • dest-node-ID represents the identifier of the target node. • dest-tunnel-number represents the destination tunnel identifier. LSP Type Indicates whether the LSP is active (Working) or backup (Protect). In Label Incoming label identifier. Out Label Outgoing label identifier. Out Interface Outgoing interface hyperlinked to the relevant entry in physical inventory. Bandwidth (kbps) Bandwidth specification in Kb/s. Role (Oper Status) Role of the LSP endpoint (Active or Standby) with the operational status (UP or DOWN). 19-9 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 19 Monitoring MPLS Services Working with MPLS-TP Tunnels Step 3 To view additional MPLS-TP tunnel endpoint properties, double-click the required entry in the MPLS-TP Tunnel Endpoints table. The MPLS-TP Tunnel Properties window is displayed as shown in Figure 19-4. LSP Mid Points Tab LSP ID LSP identifier, derived from both endpoint identifiers and using the format src-node-ID::src-tunnel-number::dest-node-ID::dest-tunnel-number where: • src-node-ID represents the identifier of the node originating the signal exchange. • src-tunnel-number represents source tunnel identifier. • dest-node-ID represents the identifier of the target node. • dest-tunnel-number represents the destination tunnel identifier. LSP Type Indicates whether the LSP is active (Working) or backup (Protect). Forward In Label Incoming label identifier in the forward direction (source to destination). Forward Out Label Label selected by the next hop device in the forward direction. Reverse In Label Incoming label identifier in the reverse direction (destination to source). Reverse Out Label Label selected by the next hop device in the reverse direction. Forward Out Interface Outgoing interface in the forward direction, hyperlinked to its entry in physical inventory. Forward Bandwidth (kbps) Bandwidth specification in Kb/s for the forward direction. Reverse Out Link ID Link identifier assigned to the outgoing interface in the reverse direction. Reverse Out Interface Outgoing interface in the reverse direction, hyperlinked to its entry in physical inventory. Reverse Bandwidth Bandwidth specification in Kb/s for the reverse direction. Internal ID Identifier associated with the parent entity of the link. Using an internal identifier ensures that individual LSP links do not participate in multiple network LSPs. Table 19-3 MPLS-TP Tunnel Properties in Logical Inventory (continued) Field Description 19-10 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 19 Monitoring MPLS Services Working with MPLS-TP Tunnels Figure 19-4 MPLS-TP Tunnel Properties Window Table 19-4 describes the information available in the top portion of the MPLS-TP Tunnel Properties window. For information about the tabs that are displayed, see Table 19-3. Table 19-4 MPLS-TP Tunnel Properties Window Field Description Tunnel ID Unique tunnel identifier. Peer Tunnel ID Unique identifier of peer tunnel. Bandwidth (kbps) Configured bandwidth (in Kb/s) for the tunnel. Admin Status Administrative status of the tunnel: Up or Down. Oper Status Operational status of the tunnel: Up or Down. Local Info MPLS-TP source node identifier for this element in the form of an IPv4 address. Peer Info MPLS-TP peer node identifier in the form of an IPv4 address. Global ID Globally unique Attachment Interface Identifier (AII) for MPLS-TP derived from the Autonomous System Number (ASN) of the system hosting the PEs. Peer Global ID Globally unique AII for the peer. Working LSP Number Number assigned to the working LSP. By default, the working LSP number is 0 and the protected LSP number is 1. 19-11 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 19 Monitoring MPLS Services Working with MPLS-TP Tunnels Viewing LSPs Configured on an Ethernet Link A single Ethernet link can support a number of LSPs. Prime Network Vision enables you to view all LSPs on a single Ethernet link and to identify the source and destination labels. To view LSPs configured on an Ethernet link: Step 1 In the map view, right-click the required link and choose Properties. Step 2 In the link properties window, choose the required Ethernet link. The link properties window refreshes and displays the Labels button as shown in Figure 19-5. Protect LSP Number Number assigned to the protected LSP. By default, the working LSP number is 0 and the protected LSP number is 1. BFD Template BFD template associated with this MPLS-TP tunnel. Working LSP BFD State Configured state of the working LSP BFD template: Up or Down. Protect LSP BFD State Configured state of the protected LSP BFD template: Up or Down. Working LSP Fault OAM Indicates that a fault has been detected on the working LSP. Protect LSP Fault OAM Indicates that a fault has been detected on the protected LSP. Tunnel Name Tunnel name. Adjacent Hyperlink to the adjacent endpoint in logical inventory. Table 19-4 MPLS-TP Tunnel Properties Window (continued) Field Description 19-12 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 19 Monitoring MPLS Services Working with MPLS-TP Tunnels Figure 19-5 Link Properties Window with All Labels Button Step 3 Click Labels. The All Labels window is displayed as shown in Figure 19-6 with the LSP sources and destinations. 19-13 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 19 Monitoring MPLS Services Working with MPLS-TP Tunnels Figure 19-6 All Labels Table Step 4 To identify a specific path, click an outgoing label in the Source table. The corresponding in label is selected in the Destination table. Viewing LSP Endpoint Redundancy Service Properties If an LSP endpoint in an MPLS-TP tunnel is configured for redundancy service, a redundancy service badge is applied to the secondary (backup) LSP endpoint in the navigation and map panes in Prime Network Vision. Additional redundancy service details are provided in the LSP endpoint properties window and the inventory window for the element on which the MPLS-TP tunnel is configured. To view LSP endpoint redundancy service properties: Step 1 To determine if an LSP endpoint on an MPLS-TP tunnel is configured for redundancy service, expand the required MPLS-TP tunnel in the navigation or map pane. If the LSP endpoint is configured for redundancy service, the redundancy service badge is displayed in the navigation and map panes as shown in Figure 19-7. 19-14 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 19 Monitoring MPLS Services Working with MPLS-TP Tunnels Figure 19-7 LSP Endpoint with Redundancy Service Badge Step 2 To view properties for the LSP endpoint, navigate to and right-click the required endpoint in the map or navigation pane, and choose Properties. The LSP endpoint properties window is displayed as shown in Figure 19-8. Figure 19-8 LSP Endpoint Properties Window Table 19-5 describes the information displayed in the LSP Endpoint Properties window. 19-15 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 19 Monitoring MPLS Services Working with MPLS-TP Tunnels Step 3 To view LSP endpoint redundancy status in inventory, double-click the element on which the MPLS-TP tunnel is configured. Step 4 Choose Logical Inventory > MPLS-TP > MPLS-TP Global > LSP End Points. Step 5 The LSP End Points tab contains the following information related to LSP redundancy service (see Figure 19-9): • Whether the LSP endpoint is Working or Protected. • The LSP endpoint role, either Active or Standby. • The operational status of the LSP endpoint, either Up or Down. Table 19-5 LSP Endpoint Properties Window Field Description LSP Type Indicates whether the LSP is active (Working) or backup (Protected). LSP ID LSP identifier, derived from both endpoint identifiers and using the format src-node-ID::src-tunnel-number::dest-node-ID::dest-tunnel-number where: • src-node-ID represents the identifier of the node originating the signal exchange. • src-tunnel-number represents source tunnel identifier. • dest-node-ID represents the identifier of the target node. • dest-tunnel-number represents the destination tunnel identifier. In Label Incoming label identifier. Out Label Outgoing label identifier. Bandwidth (kbps) Bandwidth specification in Kb/s. Out Link ID Link identifier assigned to the outgoing interface. Out Interface Outgoing interface hyperlinked to the relevant entry in physical inventory. Role (Oper Status) Role of the LSP endpoint (Active or Standby) with the operational status (UP or DOWN) 19-16 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 19 Monitoring MPLS Services Working with MPLS-TP Tunnels Figure 19-9 LSP End Points Tab in Logical Inventory Applying an MPLS-TP Tunnel Overlay You can select and display an overlay of a specific MPLS-TP tunnel on top of the devices displayed in a map view. The overlay is a snapshot of the network that visualizes the flows between the sites and tunnel peers. When an MPLS-TP tunnel is selected in the map, the following elements are highlighted in the map: • Elements on which TP endpoints and LSPs are configured. • Links that carry TP traffic. All elements and links that are not part of the MPLS-TP tunnel are dimmed. To apply an MPLS-TP tunnel overlay: Step 1 In Prime Network Vision, display the network map on which you want to apply an overlay. Step 2 From the main toolbar, click Choose Overlay Type and choose MPLS-TP tunnel. The Select MPLS-TP tunnel Overlay dialog box is displayed. Step 3 Do one of the following: • Choose a search category, enter a search string, then click Go to narrow the search results to a range of MPLS-TP tunnels or a specific MPLS-TP tunnel. Search categories include: – Description – Name – System Name 19-17 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 19 Monitoring MPLS Services Working with MPLS-TP Tunnels The search condition is “contains.” Search strings are case-insensitive. For example, if you choose the Name category and enter “net,” Prime Network Vision displays MPLS-TP tunnels that have “net” in their names whether net appears at the beginning of the name, the middle, or at the end: for example, Ethernet. • Choose Show All to display all MPLS-TP tunnels. Step 4 Select the MPLS-TP tunnel overlay you want to apply to the map. The elements and links used by the selected MPLS-TP tunnel are highlighted in the network map, and the MPLS-TP tunnel name is displayed in the window title bar as shown in Figure 19-10. Figure 19-10 MPLS-TP Tunnel Overlay Note An overlay is a snapshot taken at a specific point in time and does not reflect changes that occur in the service. As a result, the information in an overlay can become stale. To update the overlay, click Refresh Overlay in the main toolbar. 19-18 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 19 Monitoring MPLS Services Viewing VPNs Viewing VPNs Figure 19-11 shows a VPN displayed in the Prime Network Vision map view. In this example, the VPN is selected in the navigation pane, so the VPN details, such as virtual routers and IP interfaces, are not shown in the map view. Figure 19-11 VPN in Prime Network Vision Map View 1 VPN in the navigation tree 4 VPN in the map view 2 Sites 5 VPN links 3 Virtual routers 19-19 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 19 Monitoring MPLS Services Viewing VPNs Figure 19-12 shows a VPN with details, including virtual routers and sites, in the Prime Network Vision map view. Figure 19-12 VPN in Prime Network Vision Map View with VRFs and Sites The Prime Network Vision navigation pane displays the VPN business elements in a tree-and-branch representation. Each business element is represented by an icon in a color that reflects the highest alarm severity. The icon might also have a management state badge or alarm. For more information about icon severity colors and badges, see Prime Network Vision Status Indicators, page 2-16. 1 Virtual routers 2 Sites 19-20 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 19 Monitoring MPLS Services Viewing VPNs Table 19-6 shows the VPN icons in the Prime Network Vision map view. The highest level of the navigation pane displays the root or map name. The branches display the VPN and aggregated business elements as well as their names. The Layer 3 VPN sub-branch displays the virtual routers and sites contained in the VPN along with the names of the business elements. In addition, CE devices can be displayed in the Layer 2 and Layer 3 VPN sub-branches. If you select an aggregated business element in the navigation pane, the map view displays the business elements contained within the aggregated business element. The Prime Network Vision map view displays the VPN business elements and aggregated business elements loaded in the map view, along with the names of the business elements. In addition, the map view displays the VPN topology (between the virtual routers in the VPNs) and the topology and associations between other business elements. After you select the root in the navigation pane, the map view displays all the VPNs. Prime Network Vision presents tickets related to the map in the ticket area, which allows you to view and manage the VPN tickets. Viewing Additional VPN Properties Prime Network Vision allows you to select any element in the navigation pane or map view and view additional underlying properties. To view additional properties for an object, either double-click it or right-click it and choose Properties. Table 19-7 shows the additional properties available for VPN entities. Table 19-6 VPN Icons in Prime Network Vision Map View Icon Description Root (map name) or aggregation VPN Virtual router Site Table 19-7 Displaying Additional VPN Properties Object Option For Additional Information VPN • Double-click a VPN to view the participating VRFs, sites, and network elements in the navigation pane and map view. • Right-click a VPN and choose Properties to view the VPN Properties window. Viewing VPN Properties, page 19-26 VRF Double-click a VRF to view the VRF properties window. Viewing VRF Properties, page 19-27 19-21 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 19 Monitoring MPLS Services Managing VPNs Managing VPNs The following topics describe: • Creating a VPN, page 19-21 • Adding a VPN to a Map, page 19-22 • Removing a VPN from a Map, page 19-23 • Moving a Virtual Router Between VPNs, page 19-23 Creating a VPN You can change business configurations by manually creating VPNs. The VPNs that are manually created do not contain virtual routers and sites. To create a VPN: Step 1 In the Prime Network Vision navigation pane, select the map root. Step 2 From the File menu, choose Add to Map > VPN > New. Step 3 In the Create VPN dialog box, enter the following: • Name—A unique name for the new VPN. Note VPN business element names are case sensitive. • Icon—To use a custom icon for the VPN, click the button next to the Icon field and navigate to the icon file. Note If a path is not specified to an icon, the default VPN icon is used (for more information about icons, see Table 19-6 on page 19-20). • Description—(Optional) An additional VPN description. Step 4 Click OK. The new VPN is added to the VPN list in the Add VPN dialog box. Site Double-click a site to view the IP Interface Properties window Viewing Site Properties, page 19-27 Link Double-click a link to view the link properties window. The properties that are depend on the link type. Chapter 6, “Working with Links” Table 19-7 Displaying Additional VPN Properties (continued) Object Option For Additional Information 19-22 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 19 Monitoring MPLS Services Managing VPNs For more information about loading the newly created VPN in the service view map, see Adding a VPN to a Map, page 19-22. Adding a VPN to a Map You can add a VPN to a map view if the VPN was previously created by a user or discovered by Prime Network Vision and are not currently displayed in the map. Note Adding a VPN affects other users if they are working with the same map. To add an existing VPN to a map: Step 1 In Prime Network Vision, display the map to which you want to add the VPN. Step 2 Do either of the following: • From the File menu, choose Add to Map > VPN > Existing. • In the main toolbar, click Add to Map, then choose Add to Map > VPN > Existing. The Add VPN dialog box is displayed. Step 3 Do either of the following: • Choose a search category, enter a search string, then click Go to narrow search results to a range of VPNs or a specific VPN. Search categories include: – Description – Name The search condition is “contains.” Search strings are case-insensitive. For example, if you choose the Name category and enter “net,” Prime Network Vision displays VPNs that have “net” in their names whether at the beginning of the name, the middle, or the end. • Choose Show All to display all the VPNs. Step 4 Select the VPN that you want to add to the map. Tip Press Shift or Ctrl to choose multiple adjoining or nonadjoining VPNs. Step 5 Click OK. The VPN is displayed in the navigation pane and the selected map or subnetwork in the Prime Network Vision window content pane. In addition, any tickets are displayed in the ticket area. 19-23 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 19 Monitoring MPLS Services Managing VPNs Removing a VPN from a Map You can remove one or more VPNs from the current active map. This change does not affect other maps. Removing a VPN from a map does not remove it from the Prime Network Vision database. The VPN will appear in the Add VPN dialog box, so you can add it back to the map at any time. When removing VPNs from maps, keep the following in mind: • Removing a VPN affects other users if they are working with the same map view. • This option does not change the business configuration or database. • You cannot remove virtual routers or sites from the map without removing the VPN. To remove a VPN, in the Prime Network Vision pane or map view, right-click the VPN and choose Remove from Map. The VPN is removed from the map view along with all VPN elements, such as connected CE devices. Remote VPNs (extranets) are not removed. Note If the routing information changes after an overlay is applied, the changes do not appear in the current overlay. Click Refresh Overlay to update the routing information. Moving a Virtual Router Between VPNs You can move a virtual router (including its sites) from one VPN to another after you create a VPN and add it to the service view map. Note Moving a virtual router moves all of its sites as well. To move a virtual router: Step 1 In the Prime Network Vision navigation pane or map, right-click the virtual router and choose Edit > Move selected. Step 2 Right-click the required VPN in the navigation pane or map to where you want to move the virtual router and choose Edit > Move here. Caution Moving a virtual router from one VPN to another affects all users who have the virtual router loaded in their service view map. The virtual router and its sites are displayed under the selected VPN in the navigation pane and in the map. 19-24 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 19 Monitoring MPLS Services Working with VPN Overlays Working with VPN Overlays The following topics describe: • Applying VPN Overlays, page 19-24 • Managing a VPN Overlay Display in the Map View, page 19-25 • Displaying VPN Callouts in a VPN Overlay, page 19-25 Applying VPN Overlays You can select and display an overlay of a specific VPN on top of the devices displayed in a map view. The overlay is a snapshot of the network that visualizes the flows between the sites and tunnel peers. When one network VPN is selected in the network map, the PE routers, MPLS routers, and physical links that carry the LSP used by the VPN are highlighted in the network map. All the devices and links that are not part of the VPN are dimmed. The VPN service overlay allows you to isolate the parts of a network that are being used by a particular service. This information can then be used for troubleshooting. For example, the overlay can highlight configuration or design problems when bottlenecks occur and all the site interlinks use the same link. To apply a VPN overlay: Step 1 In Prime Network Vision, display the network map on which you want to apply an overlay. Step 2 From the main toolbar, click Choose Overlay Type and choose VPN. The Select VPN Overlay dialog box is displayed. Step 3 Do one of the following: • Choose a search category, enter a search string, then click Go to narrow the search results to a range of VPNs or a specific VPN. Search categories include: – Description – Name The search condition is “contains.” Search strings are case-insensitive. For example, if you choose the Name category and enter “net,” Prime Network Vision displays VPNs that have “net” in their names whether net appears at the beginning of the name, the middle, or at the end: for example, Ethernet. • Choose Show All to display all the VPNs. Step 4 Select the VPN overlay that you want to apply to the map. The PE routers, MPLS routers, and physical links used by the selected VPN are highlighted in the network map. The VPN name is displayed in the title of the window. Note An overlay is a snapshot taken at a specific point in time and does not reflect changes that occur in the service. As a result, the information in an overlay can become stale. To update the overlay, click Refresh Overlay in the main toolbar. 19-25 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 19 Monitoring MPLS Services Working with VPN Overlays Managing a VPN Overlay Display in the Map View After a VPN overlay is applied to a map, you can manage its display by using the overlay tools in the main toolbar: • To display the overlay, click Show Overlay on the main toolbar. • To hide an active overlay, click Hide Overlay on the main toolbar. Note The Show Overlay button is a toggle. When clicked, the overlay is displayed. When clicked again, the overlay is hidden. • To remove the VPN overlay, choose Show Overlay Type > None. Displaying VPN Callouts in a VPN Overlay You can display or hide the callouts for VPN links displayed in a VPN overlay to show the details of the sites that are interlinked through the selected links. The callouts (see Figure 19-13) enable you to view the VPN traffic links for a specific link (either bidirectional or unidirectional). Note The link must be displayed in the VPN overlay and not dimmed for you to display the link callouts. Figure 19-13 Callouts Window 1 Link details and direction. In this example, the link is from P-North to PE-West. 3 Details of sites using the link and interlinks. In this example, the site PE-West is linked to all sites on PE-South. 2 Details of the sites using the link and interlinks. In this example, the site PE-88 is linked to site PE-West. 4 Link details and the direction. In this example, the link is from PE-West to P-North. 19-26 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 19 Monitoring MPLS Services Monitoring MPLS Services To display or hide the callouts: Step 1 In the Prime Network Vision window, display the map view with the VPN overlay. Step 2 Right-click the required link in the map view and choose Show Callouts. Step 3 To hide the callouts, right-click the link in the map view that is displaying the callouts and choose Hide Callouts. Monitoring MPLS Services The following topics provide details for viewing MPLS services and technologies: • Viewing VPN Properties, page 19-26 • Viewing Site Properties, page 19-27 • Viewing VRF Properties, page 19-27 • Viewing VRF Egress and Ingress Adjacents, page 19-31 • Viewing Routing Entities, page 19-32 • Viewing Label Switched Entity Properties, page 19-41 • Viewing MP-BGP Information, page 19-47 • Viewing BFD Session Properties, page 19-50 • Viewing Cross-VRF Routing Entries, page 19-52 • Viewing Pseudowire End-to-End Emulation Tunnels, page 19-53 • Viewing MPLS TE Tunnel Information, page 19-55 Viewing VPN Properties To view the properties of a VPN: Step 1 In the Prime Network Vision navigation pane or map view, do either of the following: • If the VPN icon is of the largest size, click the Properties button. • Right-click the VPN and choose Properties. The VPN Properties window displays the following information: • Name—Name of the VPN. • ID—Unique identifier assigned to the VPN. Step 2 Click Close to close the VPN Properties dialog box. 19-27 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 19 Monitoring MPLS Services Monitoring MPLS Services Viewing Site Properties Prime Network Vision enables you to view site properties, including the interfaces that are configured on the PE device. The displayed properties reflect the configuration that Prime Network Vision automatically discovered for the device. To view site properties, in the Prime Network Vision navigation pane or map view, right-click the required site and choose Properties. Table 19-8 describes the information that is displayed in the Router IP Interface Properties window: Viewing VRF Properties Prime Network Vision enables you to view VRF properties, including the VRF route distinguisher, import and export route targets, and any provisioned sites and VRF routes. To view VRF properties, do either of the following in map view: • Double-click the element configured for VRFs. • Expand the required VPN and double-click the virtual router. Table 19-8 Router IP Interface Properties Window for Sites Field Description Name Name of the site, such as FastEthernet4/1.252. State Interface state, either Up or Down. IP Address IP address of the interface. Mask Network mask. Interface Description Description applied to the interface. Associated Entity Element and interface associated with the site, hyperlinked to its entry in physical inventory. Addresses Table Subnet IP address and subnet mask. Note If the site is an IPv6 VPN over MPLS with IPv6 addresses provisioned, the IPv6 addresses are displayed. For more information, see Viewing IPv6 Information, page 18-2. Type Address type, such as Primary, Secondary, or IPv6 Unicast. 19-28 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 19 Monitoring MPLS Services Monitoring MPLS Services The VRF properties window is displayed as shown in Figure 19-14. Figure 19-14 VRF Properties The VRF Properties window contains the VRF routing table for the device. The table is a collection of routes that are available or reachable to all the destinations or networks in the VRF. The forwarding table also contains MPLS encapsulation information. Table 19-9 describes the information displayed in the VRF Properties window. Note The VRF Properties window only displays properties and attributes that are provisioned in the VRF. You might not see all the fields and tabs described in Table 19-9. Table 19-9 VRF Properties Field Description Route Distinguisher Route distinguisher configured in the VRF. Name VRF name. Description Description of the VRF. IPv4 Tab Export Route Targets IPv4 export route targets contained by the VRF. Import Route Targets IPv4 import route targets contained by the VRF. Route Maps Route maps for the VRF. 19-29 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 19 Monitoring MPLS Services Monitoring MPLS Services IPv6 Tab Export Route Targets IPv6 export route targets contained by the VRF. Import Route Targets IPv6 import route targets contained by the VRF. Route Maps Route maps for the VRF. Routing Tables Destination Destination of the specific network. Prefix Length Length of the network prefix in bits. Next Hop Next routing hop. Outgoing Interface Name of the outgoing interface. Type Route type: Direct (local), Indirect, or Static. Routing Protocol Routing protocol used to communicate with the other sites and VRFs: BGP or local. BGP Next Hop Border Gateway Protocol (BGP) next hop. This is the PE address from which to continue to get to a specific address. This field is empty when the routing entry goes to the CE. Bottom In Label Innermost label that is expected when MPLS traffic is received. Bottom Out Label Innermost label sent with MPLS traffic. Outer Label Outermost or top label in the stack used for MPLS traffic. MRoute_Table Source Address The source IP address from where the multicast information is sent. Group Address The group IP address of the multicast. Flags The flag information pertaining to the multicast. Up Time The amount of time the interface has been active. Protocol The protocol information, which can be 4 or 6. Sites Tab Name Site name. IP Address IP address of the interface. Mask Subnet mask. State State of the subinterface: Up or Down. Associated Entity Element and interface associated with the site, hyperlinked to its entry in physical inventory. Description Interface description. Input Access List Access list applied to the inbound traffic. Output Access List Access list applied to the outbound traffic. Table 19-9 VRF Properties (continued) Field Description 19-30 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 19 Monitoring MPLS Services Monitoring MPLS Services Viewing VRF Multicast Configuration details To view global multicast configuration details for a VRF: Step 1 Right-click on the required device and select Inventory. Step 2 In the Inventory window, choose Logical Inventory > VRFs > vrf (where vrf is the required VRF) > IPV4VRF Multicast Configuration or IPV6VRF Multicast Configuration. The route policies configured on the device are displayed in the content pane. Table 19-10 describes the information that is displayed in the Router IP Interface Properties window: Rate Limits If a rate limit is configured on an IP interface, the limit is shown as an IP interface property. This option is checked when a rate limit is defined on the IP interface, meaning the access list is a rate limit access list. IP interface traffic is measured and includes the average rate, normal burst size, excess burst size, conform action, and exceed action. Note Double-clicking a row displays the properties of the IP interface. When a rate limit is configured on the IP interface, the Rate Limits tab is displayed. For more information about rate limits, see Viewing Rate Limit Information, page 19-38. Note The Input Access, Output Access, and Rate Limits parameters apply only to Cisco IOS devices. IP Sec Map Name IP Security (IPsec) map name. Site Name Name of the business element to which the interface is attached. Table 19-9 VRF Properties (continued) Field Description Table 19-10 Global Multicast Configuration Details Field Description VPN ID The VPN ID configured for the VRF. RoutePolicy The name of the multicast route policy. BgpAD The BgpAd enabled on the device. MdtSourceif The Multicast Distribution Tree (MDT) source interface. MdtPartioned The MDT partitioned permission. NSF The non-stop forwarding (NSF) information configured for the VRF. MdtAddress The MDT address. MdtData The MDT data that can be handled. Address Family The address family, which can be IPV4 or IPV6. RP Address The rendezvous point (RP) address configured for the VRF. 19-31 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 19 Monitoring MPLS Services Monitoring MPLS Services Using Commands to Work With VRF The following commands can be launched from the inventory by right-clicking the VRF and choosing Commands > Configuration. Before executing any commands, you can preview them and view the results. If desired, you can also schedule the commands. To find out if a device supports these commands, see the Cisco Prime Network 3.10 Supported Cisco VNEs. Note You might be prompted to enter your device access credentials while executing a command. Once you have entered them, these credentials will be used for every subsequent execution of a command in the same GUI client session. If you want to change the credentials, click Edit Credentials. Edit Credentials button will not be available for SNMP commands or if the command is scheduled for a later time. Viewing VRF Egress and Ingress Adjacents Prime Network Vision enables you to view the exporting and importing neighbors by displaying the VRF egress and ingress adjacents. In addition, you can view the connectivity between the VRFs for the route targets and view their properties. For example, if VRF A retrieved route target import X, you can view all VRFs that export X as a route target whether it is in the same or another VPN. To display the VRF egress and ingress adjacents, you can use either an element configured for VRFs or a virtual router: • To use an element configured for VRFs: a. Double-click the element configured for VRFs. b. In the inventory window, choose Logical Inventory > VRFs > vrf where vrf is the required VRF. c. Right-click the required VRF and choose Show VRF Egress Adjacents or Show VRF Ingress Adjacents. • To use a virtual router, right-click the required VRF in the navigation pane, and choose Show VRF Egress Adjacents or Show VRF Ingress Adjacents. Table 19-12 describes the information displayed in the Adjacents window. Table 19-11 VRF Configuration Commands Command Type Command Inputs Required and Notes Configuration Modify VRF General tab: Delete Router BGP, Router BGP Route Distinguisher tab: Route Distinguisher Type, IP (IPv4), ASN, RT Route Target tab: Delete Route Target (Import), IP Import (IPv4), ASN Import, RT Import, Delete Route Target (Export), IP Export (IPv4), ASN Export, RT Export, Delete Route Target (Both), IP Both (IPv4), ASN Both, RT Both Delete VRF Click Execute Now to delete the VRF. 19-32 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 19 Monitoring MPLS Services Monitoring MPLS Services Viewing Routing Entities To view routing entities: Step 1 Right-click the required device in Prime Network Vision and choose Inventory. Step 2 In the logical inventory window, choose Logical Inventory > Routing Entities > Routing Entity. The routing information is displayed as shown in Figure 19-15. Figure 19-15 Routing Entity Table Table 19-13 describes the information that is displayed in the Routing Entity table. Table 19-12 VRF Adjacents Properties Window Field Description Name VRF name. Route Distinguisher Route distinguisher configured in the VRF. VRF V6 Table IPv6 route distinguisher if IPv6 is configured. Table 19-13 Routing Entity Table Field Description Name Name of the routing entity. 19-33 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 19 Monitoring MPLS Services Monitoring MPLS Services IP Interfaces Tab Name Site name. IP Address IP address of the interface. Mask Network mask. State State of the subinterface: Up or Down. Associated Entity Interface associated with the routing entity, hyperlinked to its location in physical inventory. Description Description of the interface. Input Access List If an input access list is assigned to an IP interface, the list is shown as an IP interface property, and a hyperlink highlights the related access list in the Access List table. When an access list is assigned to the inbound traffic on an IP interface, the actions assigned to the packet are performed. VRRP Group If a VRRP group is configured on an IP interface, the information is shown as an IP interface property. This option is checked when a rate limit is defined on the IP interface. Note Double-clicking a row displays the properties of the IP interface. When a VRRP group is configured on an IP interface, the VRRP Groups tab is displayed in the IP Interface Properties window. For more information, see Viewing VRRP Information, page 19-39. Output Access List If an output access list is assigned to an IP interface, the list is shown as an IP interface property, and a hyperlink highlights the related access list in the Access List table. When an access list is assigned to the outbound traffic on an IP interface, the actions assigned to the packet are performed. Rate Limits If a rate limit is configured on an IP interface, the limit is shown as an IP interface property. This option is checked when a rate limit is defined on the IP interface, meaning the access list is a rate limit access list. IP interface traffic is measured and includes the average rate, normal burst size, excess burst size, conform action, and exceed action. Note Double-clicking a row displays the properties of the IP interface. When a rate limit is configured on the IP interface, the Rate Limits tab is displayed. For more information, see Viewing Rate Limit Information, page 19-38. Note The Input Access, Output Access, and Rate Limits parameters apply only to Cisco IOS devices. IP Sec Map Name IP Security (IPsec) crypto map name. Site Name Name of the business element to which the interface is attached. IPv4 and IPv6 Routing Table Tabs Destination Destination of the specific network. Outgoing If Name Name of the outgoing interface. Type Routing type: Direct, Indirect, Static, Other, Invalid, or Unknown. Table 19-13 Routing Entity Table (continued) Field Description 19-34 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 19 Monitoring MPLS Services Monitoring MPLS Services Using Commands to Configure IP Interfaces The following commands can be launched from the inventory by right-clicking the routing entity and choosing Commands > Configuration. Before executing any commands, you can preview them and view the results. If desired, you can also schedule the commands. To find out if a device supports these commands, see the Cisco Prime Network 3.10 Supported Cisco VNEs. Note You might be prompted to enter your device access credentials while executing a command. Once you have entered them, these credentials will be used for every subsequent execution of a command in the same GUI client session. If you want to change the credentials, click Edit Credentials. Edit Credentials button will not be available for SNMP commands or if the command is scheduled for a later time. Next Hop IP address from which to continue to get to a specific address. This field is empty when the routing entry goes to a PE router. Prefix Length Length of the network prefix in bits. Route Protocol Type Routing protocol used to communicate with other routers. IPv4 and IPv6 Multicast Routing Tabs Source Address The source IP address from where the multicast information is sent. Group Address The group IP address of the multicast. Flags The flag information pertaining to the multicast. Up Time The amount of time the interface has been active. Protocol The protocol information, which can be 4 or 6. Table 19-13 Routing Entity Table (continued) Field Description 19-35 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 19 Monitoring MPLS Services Monitoring MPLS Services Viewing the ARP Table To view the ARP table: Step 1 Right-click the required device in Prime Network Vision and choose Inventory. Step 2 In the logical inventory window, choose Logical Inventory > Routing Entities > Routing Entity > ARP. Table 19-15 describes the information that is displayed in the ARP table. Table 19-14 IP Interface Commands Command Type Command Inputs Required and Notes Configuration Create Interface Interface Name, Primary IP Address (IPV4), Primary Network Bits, Primary Subnet Mask (IPV4), Secondary IP Address (IPV4), Secondary Network Bits, Secondary Subnet Mask (IPV4), Description Name, VRF Name, BFD Interval, Minimum Receive Interval, Multiplier Modify Interface Secondary IP Address (IPV4), Secondary Network Bits, Secondary Subnet Mask (IPV4), Delete Description Name, Description Name, Delete VRF Name, VRF Name, Delete BFD Interval, BFD Interval, Interface Name, Minimum Receive Interval, Multiplier Delete Interface Click Execute Now to delete the IP interface. Configure Secondary IP Address IP Address, Network Bits, Subnet Mask Delete Secondary IP Address IP Address 19-36 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 19 Monitoring MPLS Services Monitoring MPLS Services Viewing the NDP Table Neighbor Discovery Protocol (NDP) is used with IPv6 to discover other nodes, determine the link layer addresses of other nodes, find available routers, and maintain reachability information about the paths to other active neighbor nodes. NDP functionality includes: • Router discovery • Autoconfiguration of addresses (stateless address autoconfiguration [SLAAC]) • IPv6 address resolution (replaces Address Resolution Protocol [ARP]) • Neighbor reachability (neighbor unreachability detection [NUD]) • Duplicate address detection (DAD) • Redirection To view the NDP table: Step 1 Right-click the required device in Prime Network Vision and choose Inventory. Step 2 In the logical inventory window, choose Logical Inventory > Routing Entities > Routing Entity > ARP Entity. Step 3 Click the NDP Table tab. Figure 19-16 shows an example of the NDP Table tab. Table 19-15 ARP Table Field Description MAC Interface MAC address. Interface Interface name. IP Address Interface IP address. State Interface state: • Dynamic—The entry was learned by the device according to network traffic. • Static—The entry was learned by a local interface or from a user configuring a static route. • Other—The entry was learned by another method not explicitly defined. • Invalid—In SNMP, this type is used to remove an ARP entry from the table. 19-37 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 19 Monitoring MPLS Services Monitoring MPLS Services Figure 19-16 NDP Table in Logical Inventory Table 19-16 describes the information displayed for NDP. 19-38 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 19 Monitoring MPLS Services Monitoring MPLS Services Viewing Rate Limit Information To view rate limit information: Step 1 Right-click the required element in Prime Network Vision and choose Inventory. Step 2 In the logical inventory window, choose Logical Inventory > Routing Entities > Routing Entity. Step 3 In the IP Interfaces tab, double-click the required interface to view the IP interface properties. If a rate limit is configured on the IP interface, the Rate Limits tab is displayed. Note Rate limit information is relevant only for Cisco IOS devices. Table 19-16 NDP Table Field Description MAC Interface MAC address. Interface Interface name. IP Address Interface IPv6 address. Type Entry type: • ICMP (Incomplete)—Address resolution is being performed on the entry. A neighbor solicitation (NS) message has been sent to the solicited-node multicast address of the target, but the corresponding neighbor advertisement (NA) message has not yet been received. • REACH (Reachable)—Positive confirmation was received via an NA that the forward path to the neighbor was functioning properly. While in REACH state, the device takes no special action as packets are sent. • STALE—Too much time has elapsed since the last positive confirmation was received that the forward path was functioning properly. While in STALE state, the device takes no action until a packet is sent. • DELAY—Too much time has elapsed since the last positive confirmation was received that the forward path was functioning properly. If no reachability confirmation is received within a specified amount of time, the device sends an NS message and changes the state to PROBE. • PROBE—A reachability confirmation is actively sought by resending neighbor solicitation messages until a reachability confirmation is received. 19-39 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 19 Monitoring MPLS Services Monitoring MPLS Services Table 19-17 describes the information that is displayed in the Rate Limits tab of the IP Interface Properties dialog box. Viewing VRRP Information Virtual Router Redundancy Protocol (VRRP) is a non-proprietary redundancy protocol that is designed to increase the availability of the static default gateway servicing hosts on the same subnet. This increased reliability is achieved by advertising a virtual router (a representation of master and backup routers acting as a group) as a default gateway to the hosts instead of one physical router. Two or more physical routers are then configured to stand for the virtual router, with only one doing the actual routing at any given time. If the current physical router that is routing the data on behalf of the virtual router fails, another physical router automatically replaces it. The physical router that forwards data on behalf of the virtual router is called the master router; physical routers standing by to take over for the master router if needed are called backup routers. To view VRRP information: Step 1 Double-click the required element in Prime Network Vision. Step 2 In logical inventory, choose Logical Inventory > Routing Entities > Routing Entity. Step 3 In the IP Interfaces tab, double-click the required interface to view the IP interface properties. If VRRP is configured on the IP interface, the VRRP Groups tab is displayed. Table 19-17 Rate Limits Information Field Description Type Rate limit direction, either Input or Output. Max Burst Excess burst size in bytes. Normal Burst Normal burst size in bytes. Bit Per Second Average rate in bits per second. Conform Action Action that can be performed on the packet if it conforms to the specified rate limit (rule), for example, continue, drop, change a bit, or transmit. Exceed Action Action that can be performed on the packet if it exceeds the specified rate limit (rule), for example, continue, drop, change a bit, or transmit. Access List Hyperlink that highlights the related access list in the Access List table. 19-40 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 19 Monitoring MPLS Services Monitoring MPLS Services Figure 19-17 VRRP Properties in IP Interface Properties Window Table 19-18 describes the information in the VRRP Groups tab. Table 19-18 VRRP Group Properties Field Description Group Number Number of the VRRP group associated with the interface. Priority Value that determines the role each VRRP router plays and what happens if the master virtual router fails. Values are 1 through 254, with lower numbers having priority over higher numbers. Master IP Address IP address of the VRRP group, taken from the physical Ethernet address of the master virtual router. Admin State Administrative status of the VRRP group: Up or Down. Operation State State of the VRRP group: Master or Backup. Preempt Mode Whether or not the router is to take over as the master virtual router for a VRRP group if it has a higher priority than the current master virtual router: Enabled or Disabled. Virtual IP Address IP address of the virtual router. Virtual MAC Address MAC address of the virtual router. Advertisement Interval Amount of time (in seconds) between successive advertisements by the master virtual router. 19-41 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 19 Monitoring MPLS Services Monitoring MPLS Services Viewing Label Switched Entity Properties Logical inventory can display any or all of the following tabs for label switched entities, depending on the configuration: • Label Switching Table—Describes the MPLS label switching entries used for traversing MPLS core networks. • LDP Neighbors—Details all MPLS interface peers that use the Label Distribution Protocol (LDP). LDP enables neighboring provider (P) or PE routers acting as label switch routers (LSRs) in an MPLS-aware network to exchange label prefix binding information, which is required to forwarding traffic. The LSRs discover potential peers in the network with which they can establish LDP sessions in order to negotiate and exchange the labels (addresses) to be used for forwarding packets. Two LDP peer discovery types are supported: – Basic discovery—Used to discover directly connected LDP LSRs. An LSR sends hello messages to the all-routers-on-this-subnet multicast address, on interfaces for which LDP has been configured. – Extended discovery—Used between indirectly connected LDP LSRs. An LSR sends targeted hello messages to specific IP addresses. Targeted sessions are configured because the routers are not physically connected, and broadcasting would not reach the peers. The IP addresses of both peers are required for extended discovery. If two LSRs are connected with two separate interfaces, two LDP discoveries are performed. • MPLS Interfaces—Contains information on MPLS interfaces and whether traffic engineering tunnels are configured on an interface. • MPLS Label Range—Identifies whether MPLS uses static or dynamic routing, and the label range. • Traffic Engineering LSPs—Describes the MPLS traffic engineering Label Switched Paths (LSPs) provisioned on the switch entity. MPLS traffic engineering LSP, an extension to MPLS TE, provides flexibility when configuring LSP attributes for MPLS TE tunnels. • VRF Table—Describes MPLS paths that terminate locally at a VRF. To view information for label switched entities: Step 1 Double-click the required device in Prime Network Vision. Step 2 In the logical inventory window, choose Logical Inventory > LSEs > Label Switching. Table 19-19 describes the information that is displayed for label switched entities. Table 19-19 Label Switching Properties in Logical Inventory Field Description Local LDP ID Local Label Distribution Protocol (LDP) identifier. LDP Process State State of the LDP process, such as Running, Down, or Unknown. MPLS Interfaces ID Identifier for MPLS interface, as a combination of IP address and interface name. Distribution Protocol Type Distribution protocol used: Null, LDP, TDP (Tag Distribution Protocol), RSVP, or TDP and LDP. 19-42 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 19 Monitoring MPLS Services Monitoring MPLS Services MPLS TE Properties Whether or not traffic engineering (TE) properties are configured on the interface: • Checked—MPLS TE properties are configured on the interface. • Unchecked—MPLS TE properties are not configured on the interface. Discovery Protocols Discovery protocols used on the interface. Label Switching Table Incoming Label Incoming MPLS label identifier. Action Type of switching action: Null, Pop, Swap, Aggregate, Untagged, or Act. If an action is defined as Pop, an outgoing label is not required. If an action is defined as Untagged, an outgoing label is not present. Outgoing Label Outgoing label. Out Interface Name of the outgoing interface, displayed as a hyperlink to the port subinterface in physical inventory. IP Destination Destination IP address. Destination Mask Subnet mask of the destination. Next Hop IP address of the next hop in the path. The IP address is used for resolving the MAC address of the next MPLS interface that you want to reach. VRF Table Incoming Label Incoming VRF label identifier. Action Type of switching action: Null, Pop, Swap, Aggregate, Untagged, or Act. VRF VRF name, hyperlinked to its location in logical inventory. IP Destination Destination IP address. Destination Mask Subnet mask of the destination. Next Hop IP address of the next hop in the path. The IP address is used for resolving the MAC address of the next MPLS interface that you want to reach. Out Interface Name of the outgoing interface, displayed as a hyperlink to the port subinterface in physical inventory. Traffic Engineering LSPs LSP Name Label switched path (LSP) name. LSP Type Segment type: Head, Midpoint, or Tail. Source Address Source IP address. Destination Address Destination IP address. In Label Incoming label, if not a head segment. In Interface Incoming interface, if not a head segment. Out Interface Outgoing interface, if not a tail segment. Table 19-19 Label Switching Properties in Logical Inventory (continued) Field Description 19-43 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 19 Monitoring MPLS Services Monitoring MPLS Services Out Label Outgoing label, if not a tail segment. Average Bandwidth (Kbps) Current bandwidth (in Kb/s) used to automatically allocate the tunnel’s bandwidth. LSP ID LSP identifier. Burst (Kbps) Tunnel bandwidth burst rate, in Kb/s. Peak (Kbps) Tunnel bandwidth peak rate, in Kb/s. FRR TE Tunnel Fast Reroute (FRR) TE tunnel name, hyperlinked to the routing entity in logical inventory. FRR TE Tunnel State State of the FRR TE tunnel: • Active—A failure exists in the primary tunnel and the backup is in use. • Not Configured—The primary tunnel has no designated backup tunnel. • Ready—The primary tunnel is in working condition. MPLS Label Range MPLS Label Type Type of MPLS label: Dynamic or Static. Minimum Label Value Lowest acceptable MPLS label in the range. Maximum Label Value Highest acceptable MPLS label in the range. LDP Neighbors LDP ID Identifier of the LDP peer. Transport IP Address IP address advertised by the peer in the hello message or the hello source address. Session State Current state of the session: Transient, Initialized, Open Rec, Open Sent, or Operational. Protocol Type Protocol used by the peer to establish the session: LDP, TDP, or Unknown. Label Distribution Method Method of label distribution: Downstream, Downstream On Demand, Downstream Unsolicited, or Unknown. Session Keepalive Interval Length of time (in milliseconds) between keepalive messages. Session Hold Time The amount of time (in milliseconds) that an LDP session can be maintained with an LDP peer, without receiving LDP traffic or an LDP keepalive message from the peer. Discovery Sources Whether the peer has one or more discovery sources: • Checked—Has one or more discovery sources. • Unchecked—Has no discovery sources. Note To see the discovery sources in the LDP Neighbor Properties window, double-click the row of the peer in the table. Table 19-19 Label Switching Properties in Logical Inventory (continued) Field Description 19-44 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 19 Monitoring MPLS Services Monitoring MPLS Services Step 3 Double-click an entry in any of the tables to view additional properties for that entry. Multicast Label Switching Multicast Label Distribution protocol (mLDP) provides extensions to the Label Distribution Protocol (LDP) for the setup of point-to-multipoint (P2MP) and multipoint-to-multipoint (MP2MP) Label Switched Paths (LSPs) in MultiProtocol Label Switching (MPLS) networks. A P2MP LSP allows traffic from a single root (or ingress) node to be delivered to a number of leaf (or egress) nodes. A MP2MP LSP allows traffic from multiple ingress nodes to be delivered to multiple egress nodes. Only a single copy of the packet will be sent on any link traversed by a multipoint LSP. Container is the holder of MPLS MLDP databases and neighbors instances for Multicast. Viewing MLDP Database Information To view the MLDP database information: Step 1 Double-click the required device in Prime Network Vision. Step 2 In the logical inventory window, choose Logical Inventory > LSEs > Label Switching > Multicast Label Switching > Databases. The database information is displayed in the MLDP Databases content pane. Step 3 Select a database from the content pane, right-click and choose the Properties option. The MLDP Database Properties dialog box is displayed. You can click on the tabs to view more details. Table 19-21 describes the information that is displayed for MLDP Database Properties dialog box. Table 19-20 Additional Properties Available from Label Switching in Logical Inventory Double-click an entry in this tab... To display this window... Label Switching Table Label Switching Properties LDP Neighbors LDP Peer Properties MPLS Interfaces MPLS Link Information - MPLS Properties MPLS Label Range MPLS Label Range Properties Traffic Engineering LSPs Tunnel Properties VRF Table MPLS Aggregate Entry Properties 19-45 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 19 Monitoring MPLS Services Monitoring MPLS Services Viewing the MLDP Neighbors Information To view information of MLDP neighbors: Step 1 Double-click the required device in Prime Network Vision. Step 2 In the logical inventory window, choose Logical Inventory > LSEs > Label Switching > Multicast Label Switching > MLDP Neighbors. The MLDP peer information is displayed in the MLDP Peers content pane. Step 3 Select a peer id from the content pane, right-click and choose the Properties option. The Peer ID Properties dialog box is displayed. Table 19-22 describes the information that is displayed for Peer ID Properties dialog box. Table 19-21 MLDP Database Properties Dialog Box Field Description LSM ID The unique ID assigned to a LSP. Tunnel Type The tunnel type. FEC Root The root IP address of the MDT. Opaque Value The stream information that uniquely identifies the tree to the root. To receive label switched multicast packets, the Egress Provider Edge (PE) indicates to the upstream router (the next hop closest to the root) which label it uses for the multicast source by applying the label mapping message. Is Root Indicates whether Forwarding Equivalence Class (FEC) is the root. Downstream Clients Tab Egress Interface Name The egress interface name. Associated Entity The entity associated with the LSP. Click this link to view the associated entity details. Uptime The amount of time from when the interface is active. Table ID The unique Table ID of the label through which the packet was received. Ingress State The status of the ingress interface, which can be Enabled or Disabled. PPMP State The status of the Point-to-Point Multipoint, which can be Enabled or Disabled. Local Label The label used to identify the label stack of the route within the local VPN network. 19-46 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 19 Monitoring MPLS Services Monitoring MPLS Services Table 19-22 Peer ID Properties Dialog Box Field Description Peer ID The IP address of the MLDP peer. Capabilities The capabilities supported by the LDP LSR. MLDP GR Indicates whether graceful restart is enabled for the LDP. Note LDP graceful restart provides a control plane mechanism to ensure high availability and allows detection and recovery from failure conditions while preserving Non Stop Forwarding (NSF) services. Path Count The number of LSP’s configured. Uptime The amount of time from when the peer id is working. Peer Paths tab IP Address The IP address of the MLDP peer. Interface Name The interface name. Associated Entity The link to the associated entity, which when clicked will highlight the associated Default routing entity record under the Routing Entity node. Protocol The protocol type used for communication. Peer Adjacent List IP Address The IP address of the MLDP peer. Interface Name The interface name. Associated Entity The link to the associated entity, which when clicked will highlight the associated Default routing entity record under the Routing Entity node. 19-47 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 19 Monitoring MPLS Services Monitoring MPLS Services Viewing MP-BGP Information The MP-BGP branch displays information about a router’s BGP neighbors and cross-connect VRFs. Note If there are multiple MP-BGP links between two devices, Prime Network displays each link in the content pane map view. To view MP-BGP information: Step 1 Right-click the required device in Prime Network Vision and choose Inventory. Step 2 In the logical inventory window, choose Logical Inventory > MPBGPs > MPBGP. Table 19-23 describes the information that is displayed for MP-BGP. Table 19-23 MP-BGP Information in Logical Inventory Field Description Local AS Identifier of the autonomous system (AS) to which the router belongs. BGP Identifier BGP identifier, represented as an IP address. Cross VRFs Tab VRF Name Name of the VRF. Cross VRF Routing Entries Group of cross VRFs that share a single destination. BGP Neighbors Tab Peer AS Identifier of the AS to which the remote peer belongs. Peer State State of the remote peer: Active, Connect, Established, Open Confirm, Open Sent, or Null. Peer Address Remote peer IP address. AFI Address family identifier: IPv4, IPv6, L2VPN, VPNv4, or VPNv6. AF Peer State Address family peer state: Established or Idle. Peer BGP ID Identifier of the remote peer, represented as an IP address. Local BGP ID Local peer IP address. VRF Name Remote peer VRF name. BGP Neighbor Type Neighbor type: Null, Client, or Non Client. Hold Time (secs) Established hold time in seconds. Keepalive (secs) Established keepalive time in seconds. BGP Neighbor Entry BGP neighbor IP address. 19-48 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 19 Monitoring MPLS Services Monitoring MPLS Services Using Commands to Work With MP-BGP The following commands can be launched from the inventory by right-clicking the MP-BGP and choosing Commands > Configuration. Before executing any commands, you can preview them and view the results. If desired, you can also schedule the commands. To find out if a device supports these commands, see the Cisco Prime Network 3.10 Supported Cisco VNEs. Note You might be prompted to enter your device access credentials while executing a command. Once you have entered them, these credentials will be used for every subsequent execution of a command in the same GUI client session. If you want to change the credentials, click Edit Credentials. Edit Credentials button will not be available for SNMP commands or if the command is scheduled for a later time. Viewing 6rd Tunnel Properties IPv6 rapid deployment (6rd) is a mechanism that allows stateless tunneling of IPv6 over IPv4. From Prime Network Vision 3.8, 6rd is supported on the following devices: • Cisco 7600 series devices • Cisco ASR 1000 series devices Table 19-24 MP-BGP Commands Command Type Command Inputs Required and Notes Configuration Create BGP Router AS Number, Router Id (IPV4) Modify BGP Router Delete Router Id, Router Id (IPV4) Delete BGP Router Click Execute Now to delete the BGP router. Create BGP Address Family Address Family, VRF Name, Remote IP Address, Redistribution Protocol, Route-Map Name Modify BGP Address Family AS Number, Address Family, VRF Name, Delete Neighbor AF, Enable Neighbor AF, Delete Redistribution Protocol, Redistribution Protocol, Route-Map Name Delete BGP Address Family AS Number Create BGP Neighbor Remote IP Address, Remote AS Number, Fall Over BFD, Fall Over Multihop, Update Source IP Address, SRP Activated Soft Clear Modify BGP Neighbor AS Number, Delete Fall Over BFD, Fall Over BFD, Fall Over Multihop, Delete Update Source, Update Source IP Address, Delete SRP Activated Soft Clear, SRP Activated Soft Clear Delete BGP Neighbor AS Number 19-49 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 19 Monitoring MPLS Services Monitoring MPLS Services To view 6rd tunnel properties: Step 1 In Prime Network Vision, double-click the required device. Step 2 In the inventory window, choose Logical Inventory > 6rd Tunnels. The 6rd tunnel properties are displayed as shown in Figure 19-18. Figure 19-18 6rd Tunnel Properties in Logical Inventory Table 19-25 describes the information displayed for 6rd tunnels. 19-50 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 19 Monitoring MPLS Services Monitoring MPLS Services Viewing BFD Session Properties Bidirectional Forwarding Detection (BFD) is used to detect communication failures between two elements, or endpoints, that are connected by a link, such as a virtual circuit, tunnel, or LSP. BFD establishes sessions between the two endpoints over the link. If more than one link exists, BFD establishes a session for each link. Prime Network Vision supports BFD with the following protocols: BGP, IPv4 (static), IPv6 (static), IS-IS, LAG (Ether channel), MPLS TE, MPLS-TP, and OSPF. To view BFD session properties that are configured on an element: Step 1 In Prime Network Vision, double-click the required device. Step 2 In the inventory window, choose Logical Inventory > Bidirectional Forwarding Detection. The properties for BFD sessions are displayed as shown in Figure 19-19. Table 19-25 6rd Tunnel Properties in Logical Inventory Field Description Tunnel Name 6rd tunnel name. IPv6 Prefix IPv6 prefix used to translate the IPv4 address to an IPv6 address. Source Address Tunnel IPv4 source IP address. Tunnel SubMode Tunnel type: • 6rd—Static IPv6 interface. • 6to4—IPv6 address with the prefix embedding the tunnel source IPv4 address. • Auto-tunnel—IPv4-compatible IPv6 tunnel. • ISATAP—Overlay tunnel using an Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) address. Prefix Length IPv4 prefix length used to derive the delegated IPv6 prefix. Suffix Length IPv4 suffix length used to derive the delegated IPv6 prefix. MTU Maximum transmission unit (MTU) configured on the 6rd IPv4 tunnel. 19-51 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 19 Monitoring MPLS Services Monitoring MPLS Services Figure 19-19 BFD Session Properties Table 19-26 describes the information displayed for BFD sessions. Table 19-26 BFD Session Properties Field Description Process Process name, such as Bidirectional Forwarding Detection. Process State Process state, such as Running. BFD Sessions Table Source IP Source IP address of the session. Destination IP Destination IP address of the session. State Session state, such as Up or Down. Interface Interface used for BFD communications, hyperlinked to the routing entity in logical inventory. Registered Protocols Routing protocol being monitored for communication failures, such as BGP or OSPF. 19-52 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 19 Monitoring MPLS Services Monitoring MPLS Services For MPLS-TP BFD sessions, the information in Table 19-27 is displayed. Step 3 To view additional properties, double-click the required entry in the Sessions table. Table 19-28 describes the information that is displayed in the Session Properties window. Viewing Cross-VRF Routing Entries Cross-VRF routing entries display routing information learned from the BGP neighbors (BGP knowledge base). To view properties for cross-VRF routing entries: Step 1 Right-click the required device in Prime Network Vision and choose Inventory. Table 19-27 MPLS-TP BFD Session Properties in Logical Inventory Field Description Process Process name: Bidirectional Forwarding Detection. Process State Process state, such as Running. MPLS-TP BFD Sessions Table Interface Interface used for BFD communications, hyperlinked to the routing entity in logical inventory. LSP Type Type of LSP: Working or Protected. State Session state: Up or Down. Registered Protocols Routing protocol being monitored for communication failures: MPLS-TP. Interface Name Table 19-28 Session Properties Window Field Description Source IP Source IP address of the session. Destination IP Destination IP address of the session. State Session state: Up or Down. Interface Hyperlink to the routing entity in logical inventory. Registered Protocols Routing protocol being monitored for communication failures. Protocols Table Protocol Protocol used for this session. Interval Length of time (in milliseconds) to wait between packets that are sent to the neighbor. Multiplier Number of times a packet is missed before the neighbor is declared down. 19-53 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 19 Monitoring MPLS Services Monitoring MPLS Services Step 2 In the logical inventory window, choose Logical Inventory > MPBGPs > MPBGP. Step 3 Click the Cross VRFs tab. Step 4 Double-click the required entry in the list of cross-VRFs. The Cross VRF Properties window is displayed, containing the information described in Table 19-29. Viewing Pseudowire End-to-End Emulation Tunnels The Pseudowires branch in logical inventory displays a list of the Layer 2 tunnel edge properties (per edge), including tunnel status and VC labels. To view pseudowire properties: Step 1 Right-click the required device in Prime Network Vision and choose Inventory. Step 2 In the logical inventory window, choose Logical Inventory > Pseudowires. The Tunnel Edges table is displayed and contains the information described in Table 19-30. Table 19-29 Cross-VRF Properties Window Field Description Name Cross-VRF name. Cross VRF Routing Entries Table Destination IP address of the destination network. Prefix Length of the network prefix in bits. Next Hop IP address of the next hop in the path. Out Going VRF Outgoing VRF identifier, hyperlinked to its entry in logical inventory. Out Tag Outgoing virtual router tag, such as 50 or no tag. In Tag Incoming virtual router tag, such as 97 or no tag. 19-54 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 19 Monitoring MPLS Services Monitoring MPLS Services Table 19-30 Pseudowires Branch Tunnel Edges Table Field Description Local Interface Name of the subinterface or port. Strings, such as Aggregation Group, EFP, VLAN, and VSI, are included in the interface name, and the entry is hyperlinked to the relevant entry in logical or physical inventory: • Aggregation groups are linked to Ethernet Link Aggregation in logical inventory. • ATM interfaces are linked to the port in physical inventory and the ATM interface. • ATM VCs are linked to the port in physical inventory and the Port IP Properties table. • CEM groups are linked to the port in physical inventory and the CEM Group table. • EFPs are linked to the port in physical inventory and the EFPs table. • IMA groups are linked to IMA Groups in logical inventory. • Local switching entities are linked to Local Switching Entity in logical inventory. • VLANs are linked to Bridges in logical inventory. • VSIs are linked to the VSI entry in logical inventory. VC ID Tunnel identifier, hyperlinked to the PTP Layer 2 MPLS Tunnel Properties window. Peer Details of the selected peer, hyperlinked to the peer pseudowire tunnel in logical inventory. Status Operational state of the tunnel: Up or Down. Pseudowire Role If the pseudowire is in a redundancy configuration, indicates whether its role is as the primary or secondary pseudowire in the configuration. If the pseudowire is not configured for redundancy, this field is blank. Preferred Path Tunnel Path to be used for MPLS pseudowire traffic. Local Router IP IP address of this tunnel edge, which is used as the MPLS router identifier. Peer Router IP IP address of the peer tunnel edge, which is used as the MPLS router identifier. Pseudowire Type Type of pseudowire, such as Ethernet, Ethernet Tagged, CESoPSN Basic, PPP, or SAToP. Local MTU Size, in bytes, of the MTU on the local interface. Remote MTU Size, in bytes, of the MTU on the remote interface. Local VC Label MPLS label that is used by this router to identify or access the tunnel. It is inserted into the MPLS label stack by the local router. Peer VC Label MPLS label that is used by this router to identify or access the tunnel. It is inserted into the MPLS label stack by the peer router. Signaling Protocol Protocol used by MPLS to build the tunnel, for example, LDP or TDP. 19-55 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 19 Monitoring MPLS Services Monitoring MPLS Services Viewing MPLS TE Tunnel Information Prime Network Vision automatically discovers MPLS TE tunnels and enables you to view MPLS TE tunnel information in inventory. To view MPLS TE tunnel information: Step 1 Right-click the required device in Prime Network Vision and choose Inventory. Step 2 In the logical inventory window, choose Logical Inventory > Traffic Engineering Tunnels. Table 19-31 describes the information that is displayed in the Tunnel Edges table. Table 19-31 Tunnel Edges Table Field Description Name Name of the TE tunnel; for Cisco devices it is the interface name. Tunnel Type Whether the tunnel is Point-to-Point or Point-to-Multipoint. Tunnel Destination IP address of the device in which the tunnel ends. Administrative Status Administrative state of the tunnel: Up or Down. Operational Status Operational state of the tunnel: Up or Down. Outgoing Label TE tunnel’s MPLS label distinguishing the LSP selection in the next device. Description Description of the tunnel. Outgoing Interface Interface through which the tunnel exits the device. Bandwidth (KBps) Bandwidth specification for this tunnel in Kb/s. Setup Priority Tunnel priority upon path setup. Hold Priority Tunnel priority after path setup. Affinity Tunnel preferential bits for specific links. Affinity Mask Tunnel affinity bits that should be compared to the link attribute bits. Auto Route Whether or not destinations behind the tunnel are routed through the tunnel: Enabled or disabled. Lockdown Whether or not the tunnel can be rerouted: • Enabled—The tunnel cannot be rerouted. • Disabled—The tunnel can be rerouted. Path Option Tunnel path option: • Dynamic—The tunnel is routed along the ordinary routing decisions after taking into account the tunnel constraints such as attributes, priority, and bandwidth. • Explicit—The route is explicitly mapped with the included and excluded links. Average Rate (Kbps) Average bandwidth for this tunnel (in Kb/s). 19-56 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 19 Monitoring MPLS Services MPLS-TP Commands The Traffic Engineering LSPs tab in the LSEs branch in logical inventory displays TE tunnel LSP information. For details about the information displayed for TE tunnel LSPs, see Traffic Engineering LSPs, page 19-42. MPLS-TP Commands The following commands can be launched from the inventory by right-clicking the appropriate node and selecting MPLS-TP Global > Commands > Configuration. Before executing any commands, you can preview them and view the results. If desired, you can also schedule the commands. To find out if a device supports these commands, see the Cisco Prime Network 3.10 Supported Cisco VNEs. Keep the following in mind: • LSP Path Lockout can be accessed at both the tunnel level and endpoint level. If you run the command at the tunnel level, you must indicate whether the Lsp is protected or working. • To run the Global Configuration, BFD Configuration, and Link Configuration commands on the Cisco Carrier Packet Transport (CPT) System, right-click the device in the Prime Network Vision List or Map View, and click Logical Inventory > CPT Context Container. Burst (Kbps) Burst flow specification (in Kb/s) for this tunnel. Peak Rate (Kbps) Peak flow specification (in Kb/s) for this tunnel. LSP ID LSP identifier. Policy Class Value of Policy Based Tunnel Selection (PBTS) configured. Values range from 1-7. FRR TE Fast Reroute (FRR) status: Enabled or Disabled. Type Table 19-31 Tunnel Edges Table (continued) Field Description Table 19-32 MPLS-TP Commands Command Input Required and Notes Tunnel Ping and Tunnel Trace Tunnel ID and the LSP path. LSP Ping and LSP Trace These actions are performed at the command the launch point. LSP Lockout LSP path. LSP Path Lockout and LSP Path No Lockout Tunnel ID, LSP path, Lockout. The LSP Path No Lockout only requires an LSP path. Add Global Configuration, Update Global Configuration, and Remove Global Configuration Router-id, Global-id, Fault OAM refresh timer value, Wait before restoring timer value. The remove operation is performed at the command the launch point. 19-57 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 19 Monitoring MPLS Services MPLS-TP Commands Locking/Unlocking MPLS-TP Tunnels in Bulk An MPLS-TP network has one or multiple LSPs running between endpoint devices. If you want to shutdown one of the interfaces in the network, the MPLS-TP packet must be diverted through an alternative LSP. This can be achieved by locking the interface. The MPLS-TP bulk lockout/unlock option in Prime Network allows you to lock or unlock multiple MPLS-TP tunnels on different VNEs at the same time. Before attempting to lock or unlock a tunnel, ensure that MPLS-TP tunnels have been configured for the link. Also, ensure that you have the appropriate rights (Configurator and above) to lock or unlock a tunnel. Locking an MPLS-TP Tunnels To lock MPLS-TP tunnels in bulk: Step 1 In the map view, right-click the required link and choose Properties. Step 2 In the link properties window, right-click on the required physical link and choose the Show MPLS-TP tunnels option. The MPLS-TP tunnels’ commands dialog box is displayed, which lists all the tunnels in the selected link. Step 3 In the MPLS-TP tunnels’ commands dialog box, choose the tunnels that you want to lock and select the Lock Out option in the Commands field. Step 4 Click Execute Now. You are prompted to confirm the lockout operation. Step 5 Click Yes to confirm. A message is displayed confirming that the selected tunnels have been locked. The status of the tunnel is automatically updated as Lockout(UP) after this operation. BFD Global Configuration BFD minimum interval and multiplier. Only supported on Cisco ASR 9000. Add Link Configuration and Remove Link Configuration MPLS-TP link number, Next hop router address. Only the link number is require for the remove operation. Add BFD Template Configuration and Remove BFD Template Configuration Template type and name, interval type and value, For compute hold down Check/UnCheck Multiplier, multiplier value. The remove operation requires a template type and name. Show BFD Template and Show BFD Template at Tunnel Show BFD Template requires a template name. The Show BFD Template at Tunnel is performed at the command launch point. Add Label Range Configuration and Remove Label Range Configuration Minimum and maximum values for dynamic and static labels. The remove operation is performed at the command the launch point. Not supported on Cisco IOS. Table 19-32 MPLS-TP Commands (continued) Command Input Required and Notes 19-58 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 19 Monitoring MPLS Services MPLS-TP Commands Unlocking an MPLS-TP Tunnels To unlock MPLS-TP tunnels in bulk: Step 1 In the map view, right-click the required link and choose Properties. Step 2 In the link properties window, right-click on the required physical link and choose the Show MPLS-TP tunnels option. The MPLS-TP tunnels’ commands dialog box is displayed, which lists all the tunnels in the selected link. Step 3 In the MPLS-TP tunnels’ commands dialog box, select the locked tunnels that you want to unlock and select the Unlock option in the Commands field. Step 4 Click Execute Now. You are prompted to confirm the unlock operation. Step 5 Click Yes to confirm. A message is displayed confirming that the selected tunnels have been unlocked. The status of the tunnels is automatically updated as Active(UP) after this operation. Note If you attempt to unlock a tunnel that is not locked, a message is displayed indicating that there are no valid tunnels to perform the unlock operation. CHAPTER 20-1 Cisco Prime Network 3.10 User Guide OL-28065-01 20 Viewing IP and MPLS Multicast Configurations These topics provide an overview of the IP Multicast technology and describe how to view IP and multicast configurations in Prime Network Vision: • IP and MPLS Multicast Configuration - An Overview, page 20-1 • User Roles Required to View IP and Multicast Configurations, page 20-2 • Viewing the Multicast Configurations, page 20-2 IP and MPLS Multicast Configuration - An Overview IP Multicast is a bandwidth-conserving technology that reduces traffic by simultaneously delivering a single stream of information to thousands of corporate recipients and homes. Applications that take advantage of multicast include video conferences, corporate communications, distance learning, and distribution of software, stock quotes, and news. IP Multicast delivers source traffic to multiple receivers without adding any additional burden on the source or the receivers while using the least network bandwidth of any competing technology. Multicast packets are replicated in the network by Cisco routers enabled with Protocol Independent Multicast (PIM), Multicast Label Distribution Protocol (MLDP) and other supporting multicast protocols resulting in the most efficient delivery of data to multiple receivers possible. Multicast is based on the concept of a group. An arbitrary group of receivers expresses an interest in receiving a particular data stream. This group does not have any physical or geographical boundaries—the hosts can be located anywhere on the Internet. Hosts that are interested in receiving data flowing to a particular group must join the group using Internet Group Management Protocol (IGMP). Hosts must be a member of the group to receive the data stream. In Prime Network, IP and multicast support is available for the following network elements: • Cisco Aggregation Service Router (ASR) 9000 series network elements • Cisco Carrier Routing System (CRS) network elements • Cisco Gigabit Switch Router (GSR) network elements 20-2 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 20 Viewing IP and MPLS Multicast Configurations User Roles Required to View IP and Multicast Configurations User Roles Required to View IP and Multicast Configurations This topic identifies the roles that are required to work with IP and Multicast Support. Prime Network determines whether you are authorized to perform a task as follows: • For GUI-based tasks (tasks that do not affect elements), authorization is based on the default permission that is assigned to your user account. • For element-based tasks (tasks that do affect elements), authorization is based on the default permission that is assigned to your account. That is, whether the element is in one of your assigned scopes and whether you meet the minimum security level for that scope. For more information on user authorization, see the topic on device scopes in the Cisco Prime Network 3.10 Administrator Guide. Viewing the Multicast Configurations This topic contains the following sections: • Viewing Multicast Node, page 20-2 • Viewing Multicast Protocols, page 20-4 • Multicast Label Switching, page 20-9 • Multicast Routing Entities, page 20-10 Viewing Multicast Node To view the Multicast node: Step 1 Right-click on the required device and choose the Inventory option. Step 2 In the Inventory window, choose Logical Inventory > Multicast. The Route Policies and Multicast Global Interfaces tabs are displayed in the content pane as show in Figure 20-1. You can click on the tabs to view more details. Table 20-1 Default Permission/Security Level Required for IP and Multicast Support Task Viewer Operator OperatorPlus Configurator Administrator View multicast configuration details X X X X X View Multicast Label Switch details X X X X X View Routing entities X X X X X View VRF Properties X X X X X 20-3 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 20 Viewing IP and MPLS Multicast Configurations Viewing the Multicast Configurations Figure 20-1 Multicast Content Pane Table 20-2 describes the fields that are displayed in the Route Policies tab. Table 20-2 Route Policies Tab Field Name Description Name The name of the multicast route policy. Core Tree Type The type of the Multicast Distribution Tree (MDT) core tree configured in the route policy. Values are: • MLDP-Default • MLDP-Inband • MLDP-Partitioned-MP2MP • MLDP-Partitioned-P2MP • PIM-Default • RSVP-TE-Partitioned-P2MP Multicast Global Interfaces Tab Interface Name The name of the multicast enabled logical or physical interface. Associated Entity The link to the associated routing entity, which when clicked will highlight the associated Default routing entity record under the Routing Entity node. 20-4 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 20 Viewing IP and MPLS Multicast Configurations Viewing the Multicast Configurations Viewing Multicast Protocols The following Multicast protocols are available in Prime Network: • Address Family (IPv4)—See Viewing the Address Family (IPv4) Profile, page 20-4. • Address Family (IPv6)—See Viewing the Address Family (IPv6) Profile, page 20-5. • IGMP—Viewing the IGMP profile, page 20-5. • PIM—Viewing the PIM Profile, page 20-7. Viewing the Address Family (IPv4) Profile To view the Address Family (IPv4) profile: Step 1 Right-click on the required device and choose the Inventory option. Step 2 In the Inventory window, choose Logical Inventory > Multicast > Address Family (IPV4). The profile details are displayed in the content pane. Table 20-3 describes the fields that are displayed in the Address Family (IPV4) profile. Table 20-3 Address Family (IPV4) Profile Field Name Description MDT Source Interface The source interface to set the multicast VPN data. Note This interface can identify the root of the MDT in the service provider network. This interface and its corresponding address is used to update all Multicast VPN (MVPN) peers through multiprotocol Border Gateway Protocol (BGP). MDT Static The interface used for transporting MDT data. Interface All Indicates whether the multicast routing and protocols are enabled on the interfaces. Note You must enable the interfaces using the Interface command in the multicast-routing configuration mode. NSF Status Indicates whether the non-stop forwarding capability is enabled for all the relevant components. Note If this feature is enabled, then multicast forwarding will not stop on failure of the control plane multicast routing components. Address Family The address family, which in this instance is IPV4. MDT MLDP Indicates whether the Multicast Distribution Tree (MDT) Multipoint Extensions to Label Distribution Protocol (MLDP) in-band signalling is enabled. 20-5 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 20 Viewing IP and MPLS Multicast Configurations Viewing the Multicast Configurations Viewing the Address Family (IPv6) Profile To view the Address Family (IPv6) profile: Step 1 Right-click on the required device and choose the Inventory option. Step 2 In the Inventory window, choose Logical Inventory > Multicast > Address Family (IPV6). The profile details are displayed in the content pane. Table 20-4 describes the fields that are displayed in the Address Family (IPV6) profile. Viewing the IGMP profile The IGMP runs between hosts and their immediately neighboring multicast routers. The mechanisms of the protocol allow a host to inform its local router that it wishes to receive transmissions addressed to a specific multicast group. Also, routers periodically query the LAN to determine if known group members are still active. If there is more than one router on the LAN performing IP multicasting, one of the routers is elected querier and assumes the responsibility of querying the LAN for group members. Based on the group membership information learned from the IGMP, a router is able to determine which (if any) multicast traffic needs to be forwarded to each of its leaf sub networks. Multicast routers use this information, in conjunction with a multicast routing protocol, to support IP multicasting across the Internet. Table 20-4 Address Family (IPV6) profile Field Name Description Interface All Indicates whether the multicast routing and protocols are enabled on the interface. Note You must enable the interfaces using the Interface command in the multicast-routing configuration mode. NSF Status Indicates whether the non-stop forwarding capability is enabled for all the relevant components. Note If this feature is enabled, then multicast forwarding will not stop if the control plane multicast routing components fail. Address Family The address family, which in this instance is IPV6. MDT MLDP Indicates whether the Multicast Distribution Tree (MDT) Multipoint Extensions to Label Distribution Protocol (MLDP) in-band signalling is enabled. MDT Static The interface used for transporting MDT data. MDT Source Interface The source interface to set the multicast VPN data. Note This interface can identify the root of the MDT in the service provider network. This interface and its corresponding address is used to update all Multicast VPN (MVPN) peers through multiprotocol Border Gateway Protocol (BGP). 20-6 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 20 Viewing IP and MPLS Multicast Configurations Viewing the Multicast Configurations There are three versions of IGMP: • IGMP Version 1 • IGMP Version 2 • IGMP Version 3 To view the IGMP profile: Step 1 Right-click on the required device and choose the Inventory option. Step 2 In the Inventory window, choose Logical Inventory > Multicast > IGMP. The IGMP details are displayed in the content pane. You can click on the tabs to view more details. Table 20-5 describes the fields that are displayed in the IGMP profile. Table 20-5 IGMP Profile Details Field Name Description NSF Status The non-stop forwarding status, which can be Normal or Non-Stop Forwarding Activated. Note The Non-Stop Forwarding Activated status implies that recovery of an IGMP failure is in progress. Interfaces Tab Interface Name The name of the interface. Associated Entity The link to the associated entity, which when clicked will highlight the associated Default routing entity record under the Routing Entity node. Interface Address The internet address of the interface. VRF The VRF to which the interface belongs. This is a link, which when clicked will take you to the relevant record under the VRF node. IGMP Status Indicates whether IGMP is enabled or disabled on the interface. IGMP Version The IGMP version installed on the interface. Groups Tab Group Address The address of the multicast group. Interface Name The name of the interface used to reach the group. Associated Entity The associated entity for the IGMP profile. Click this link to view the related record under the Subscriber Access Point node. VRF The VPN Routing and Forwarding (VRF) to which the interface belongs. This is a link, which when clicked will take you to the relevant record under the VRF node. Up Time The period from when the multicast group is available. This information is displayed in terms of hours, minutes, and seconds. Expires The duration after which the multicast group will be removed from the IGMP groups table. This information is displayed in terms of hours, minutes, and seconds. Last Reporter The most recent host that has reported being a member of the multicast group. 20-7 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 20 Viewing IP and MPLS Multicast Configurations Viewing the Multicast Configurations Viewing the PIM Profile PIM is a family of multicast routing protocols for Internet Protocol (IP) networks that provide one-to-many and many-to-many distribution of data over a LAN, WAN or the Internet. It is termed protocol-independent because PIM does not include its own topology discovery mechanism, but instead uses routing information supplied by other traditional routing protocols such as the Routing Information Protocol, Open Shortest Path First, Border Gateway Protocol and Multicast Source Discovery Protocol. There are four variants of PIM: • PIM Sparse Mode (PIM-SM) • PIM Dense Mode (PIM-DM) • Bidirectional PIM • PIM source-specific multicast (PIM-SSM) Although PIM is called a multicast routing protocol, it actually uses the unicast routing table to perform the Reverse Path Forwarding (RPF) check function instead of building up a completely unrelated multicast routing table. PIM does not send and receive multicast routing updates between routers like other routing protocols. To view the PIM profile: Step 1 Right-click on the required device and choose the Inventory option. Step 2 In the Inventory window, choose Logical Inventory > Multicast > PIM. The profile details are displayed in the content pane. You can click on the tabs to view more details. Table 20-6 describes the fields that are displayed in the PIM profile. Group Ranges Tab Group Range The multicast group range in CDIR format, which is basically the Multicast Group IP address followed by the CDIR prefix. Protocol The PIM protocol that is used by the IGMP group range. Table 20-5 IGMP Profile Details (continued) Field Name Description Table 20-6 PIM Profile Details Field Name Description NSF Status The non-stop forwarding status, which can be Normal or Non-Stop Forwarding Activated. Note The Non-Stop Forwarding Activated status implies that recovery of an IGMP failure is in progress. Interfaces Tab Interface Name The name or ID of the interface on which PIM is enabled. Associated Entity The link to the associated entity, which when clicked will highlight the associated Default routing entity record under the Routing Entity node. 20-8 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 20 Viewing IP and MPLS Multicast Configurations Viewing the Multicast Configurations IP Address The IP address of the interface. VRF The name of the VRF associated to the interface. This is a link, which when clicked will take you to the relevant record under the VRF node. PIM Status Indicates whether the PIM is enabled (ON) or disabled (OFF) on the interface. Hello Interval The frequency at which PIM hello messages are sent over the PIM enabled interfaces. These messages are sent at regular intervals by routers on all the PIM enabled interfaces. The router sends these messages to advertise their existence as a PIM router on the subnet. Designated Router The IP address of the designated router on the LAN. Note Serial lines do not have a designated router. Hence, the IP address is displayed as 0.0.0.0. If the interface on the router is the designated router, then the words “This system” is displayed. If not, then the IP address of the external neighbor is displayed. Designated Router Priority The priority of the designated router, which is advertised by the neighbor in the hello messages. This value in this field will range from 0 to 4294967295 Rendezvous Points Tab RP Address The address of the interface serving as a rendezvous point for the group range or list. A Rendezvous Point (RP) is a router in a multicast network domain that acts as a shared root for a multicast shared tree. Any number of routers can be configured to work as RPs and they can be configured to cover different group ranges. For correct operation, every multicast router within a Protocol Independent Multicast (PIM) domain must be able to map a particular multicast group address to the same RP. Mode The PIM protocol mode for which the router is advertised as a rendezvous point. The mode can be PIM-SM or bidirectional PIM. Scope The number of candidate announcement messages sent out from the rendezvous point. Priority The value of the candidate rendezvous point priority. Uptime The amount of time from when the rendezvous point is available. Group List The IP access list number or name of the group prefixes that are advertised in association with the rendezvous point address. RP Type The type of rendezvous point, which can be BSR or Auto RP. Note The Bootstrap Router (BSR) is a mechanism for a router to learn RP information. It ensures that all routers in the PIM domain have the same RP cache as the BSR. Auto-RP is a mechanism to automate distribution of RP information in a multicast network. The Auto-RP mechanism operates using two basic components, the candidate RPs and the RP mapping agents. Table 20-6 PIM Profile Details (continued) Field Name Description 20-9 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 20 Viewing IP and MPLS Multicast Configurations Viewing the Multicast Configurations Multicast Label Switching Prime Network provides multicast support for MPLS services. For more information on multicast label switching, see Multicast Label Switching, page 19-44. Topology Tab Source Address The IP address of the source of the multicast entry. In case the IP address is not available, a “*” or 0.0.0.0 is displayed here. Group Address The multicast group address or prefix for which the entry is associated with. PIM Mode The PIM mode of the topology entry, which can be Sparse, Source Specific, Dense, or Bidirectional. Tree Type The MDT tree type for the route entry, which can be Shortest Path Tree or Rendezvous Point Tree. Uptime The amount of time from which the topology is available. This value is displayed in terms of seconds. RP Address The Rendezvous Point address. This value is displayed only if the PIM Mode is SM or Bidirectional. Join Prune Status Indicates whether a join or prune message is sent to the RPF neighbor for the route. RPF The IP address and interface ID, along with the MoFFR information, of the Reverse Path Forwarding for the topology. Flags The comma separated flag information for this topology. Neighbors Tab Neighbor IP Address The IP address of the neighbor. Interface Name The interface name on which the neighbor can be reached. Associated Entity The link to the associated entity, which when clicked will highlight the associated Default routing entity record under the Routing Entity node. VRF The name of the VRF. Flags The flags that provide information about various states of the neighbor. Designated Router Priority The priority of the PIM interface for DR election. The default value is 1. UpTime The amount of time from which the interface is available. Table 20-6 PIM Profile Details (continued) Field Name Description 20-10 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 20 Viewing IP and MPLS Multicast Configurations Viewing the Multicast Configurations Multicast Routing Entities Prime Network provides multicast support for routing entities. If you have configured multicast route information for a VRF, Prime Network displays a separate tab for the related VRF wherein you can view the multicast routing information. For details on multicast routing entities, see Viewing Routing Entities, page 19-32 and Viewing VRF Properties, page 19-27. CHAPTER 21-1 Cisco Prime Network 3.10 User Guide OL-28065-01 21 Monitoring MToP Services The following topics describe Mobile Transport over Packet (MToP) services and the properties available in Cisco Prime Network Vision (Prime Network Vision): • User Roles Required to Work with MToP, page 21-1 • Viewing SAToP Pseudowire Type in Logical Inventory, page 21-2 • Viewing CESoPSN Pseudowire Type in Logical Inventory, page 21-3 • Viewing Virtual Connection Properties, page 21-5 • Viewing IMA Group Properties, page 21-13 • Viewing TDM Properties, page 21-17 • Viewing Channelization Properties, page 21-18 • Viewing MLPPP Properties, page 21-27 • Viewing MLPPP Link Properties, page 21-30 • Viewing MPLS Pseudowire over GRE Properties, page 21-32 • Network Clock Service Overview, page 21-35 • Viewing CEM and Virtual CEM Properties, page 21-50 • Using SONET Configure, Clear, and Show Commands, page 21-54 User Roles Required to Work with MToP This topic identifies the roles that are required to work with MToP in Prime Network Vision. Prime Network determines whether you are authorized to perform a task as follows: • For GUI-based tasks (tasks that do not affect elements), authorization is based on the default permission that is assigned to your user account. • For element-based tasks (tasks that do affect elements), authorization is based on the default permission that is assigned to your account. That is, whether the element is in one of your assigned scopes and whether you meet the minimum security level for that scope. For more information on user authorization, see the Cisco Prime Network 3.10 Administrator Guide. 21-2 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 21 Monitoring MToP Services Viewing SAToP Pseudowire Type in Logical Inventory The following tables identify the tasks that you can perform: • Table 21-1 identifies the tasks that you can perform if a selected element is not in one of your assigned scopes. • Table 21-2 identifies the tasks that you can perform if a selected element is in one of your assigned scopes. By default, users with the Administrator role have access to all managed elements. To change the Administrator user scope, see the topic on device scopes in the Cisco Prime Network 3.10 Administrator Guide. Viewing SAToP Pseudowire Type in Logical Inventory Structure-Agnostic Time Division Multiplexing (TDM) over Packet (SAToP) enables the encapsulation of TDM bit-streams (T1, E1, T3, or E3) as pseudowires over PSNs. As a structure-agnostic protocol, SAToP disregards any structure that might be imposed on the signals and TDM framing is not allowed. To view the SAToP pseudowire type in logical inventory: Step 1 In Prime Network Vision, right-click the device on which SAToP is configured, then choose Inventory. Step 2 In the inventory window, choose Logical Inventory > Pseudowires. Step 3 In the Tunnel Edges table, select the required entry and scroll horizontally until you see the Pseudowire Type column. See Figure 21-1. Note You can also view this information by right-clicking the entry in the table and choosing Properties. Table 21-1 Default Permission/Security Level Required for Viewing MToP Properties - Element Not in User’s Scope Task Viewer Operator OperatorPlus Configurator Administrator View MToP properties — — — — X Using SONET Configure, Clear, and Show Commands ——— X X Table 21-2 Default Permission/Security Level Required for Viewing MToP Properties - Element in User’s Scope Task Viewer Operator OperatorPlus Configurator Administrator View MToP properties X X X X X Using SONET Configure, Clear, and Show Commands ——— X X 21-3 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 21 Monitoring MToP Services Viewing CESoPSN Pseudowire Type in Logical Inventory Figure 21-1 SAToP Pseudowire Type in Logical Inventory Step 4 To view the physical inventory for the port, click the hypertext port link. Viewing CESoPSN Pseudowire Type in Logical Inventory Circuit Emulation Services over PSN (CESoPSN) is a method for encapsulating structured (NxDS0) TDM signals as pseudowires over packet-switching networks, complementary to SAToP. By emulating NxDS0 circuits, CESoPSN: • Saves PSN bandwidth. • Supports DS0-level grooming and distributed cross-connect applications. 21-4 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 21 Monitoring MToP Services Viewing CESoPSN Pseudowire Type in Logical Inventory To view TDM properties for Circuit Emulation (CEM) groups in Prime Network Vision: Step 1 In Prime Network Vision, right-click the device on which CESoPSN is configured, then choose Inventory. Step 2 In the inventory window, choose Logical Inventory > Pseudowires. Step 3 In the Tunnel Edges table, select the required entry and scroll horizontally until you see the Pseudowire Type column. See Figure 21-2. Note You can also view this information by right-clicking the entry in the table and choosing Properties. Figure 21-2 CESoPSN Pseudowire Type in Logical Inventory Step 4 To view the physical inventory for the port, click the hypertext port link. 21-5 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 21 Monitoring MToP Services Viewing Virtual Connection Properties Viewing Virtual Connection Properties The following topics describe how to view properties related to virtual connections: • Viewing ATM Virtual Connection Cross-Connects, page 21-6 • Viewing ATM VPI and VCI Properties, page 21-10 • Viewing Encapsulation Information, page 21-11 Buttons for viewing these properties are available at the top of the physical inventory window for the selected interface, as shown in Figure 21-3. Figure 21-3 ATM-Related Properties Available in Physical Inventory 21-6 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 21 Monitoring MToP Services Viewing Virtual Connection Properties Viewing ATM Virtual Connection Cross-Connects ATM networks are based on virtual connections over a high-bandwidth medium. By using cross-connects to interconnect virtual path or virtual channel links, it is possible to build an end-to-end virtual connection. An ATM cross-connect can be mapped at either of the following levels: • Virtual path—Cross-connecting two virtual paths maps one Virtual Path Identifier (VPI) on one port to another VPI on the same port or a different port. • Virtual channel—Cross-connecting at the virtual channel level maps a Virtual Channel Identifier (VCI) of one virtual channel to another VCI on the same virtual path or a different virtual path. Cross-connect tables translate the VPI and VCI connection identifiers in incoming ATM cells to the VPI and VCI combinations in outgoing ATM cells. For information about viewing VPI and VCI properties, see Viewing ATM VPI and VCI Properties, page 21-10. 1 Poll Now button Polls the VNE for updated status. 2 Show VC Table button Displays virtual circuit (VC) information for the selected port. For more information, see Viewing ATM VPI and VCI Properties, page 21-10. 3 Show Cross Connect button Displays cross-connect information for incoming and outgoing ports. For more information, see Viewing ATM Virtual Connection Cross-Connects, page 21-6. 4 Show Encapsulation button Displays encapsulation information for incoming and outgoing traffic for the selected item. For more information, see Viewing Encapsulation Information, page 21-11. 5 Disable/Enable Sending Alarms button Enables you to manage the alarms on a port. For more information, see Working with Ports, page 3-23. 6 Port Utilization Graph button Displays the selected port traffic statistics: Rx/Tx Rate and Rx/Tx Rate History. For more information, see Generating the Port Utilization Graph, page 3-27. — Show DLCI Table button (not displayed) Displays data-link connection identifier (DCLI) information for the selected port. 21-7 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 21 Monitoring MToP Services Viewing Virtual Connection Properties To view ATM virtual connection cross-connects: Step 1 In Prime Network Vision, right-click the required device, then choose Inventory. Step 2 Open the VC Cross Connect table in either of the following ways: • In the inventory window, choose Logical Inventory > VC Switching Entities > VC Switching Entity. The Cross-Connect Table is displayed in the content pane as shown in Figure 21-4. • In the inventory window: a. Choose Physical Inventory > Chassis > Slot > Subslot > Port. b. Click the Show Cross Connect button. The VC Cross Connections window is displayed and contains the same information as the Cross-Connect Table in logical inventory. Step 3 Select an entry and scroll horizontally until you see the required information. Figure 21-4 ATM Virtual Connection Cross-Connect Properties Table 21-3 identifies the properties that are displayed for ATM VC cross-connects. 21-8 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 21 Monitoring MToP Services Viewing Virtual Connection Properties Table 21-3 ATM Virtual Connection Cross-Connect Properties Field Description In Port Incoming port for the cross-connect. In VC Incoming virtual connection for the cross-connect. You can view additional details about the virtual connection in the following ways: • Click the hyperlinked entry to view the VC table. • Right-click the entry, then choose Properties to view information about the incoming and outgoing VCIs, VPI, service category, and traffic descriptors. Out Port Outgoing port for the cross-connect. Out VC Outgoing virtual connection for the cross-connect. You can view additional details about the virtual connection in the following ways: • Click the hyperlinked entry to view the VC table. • Right-click the entry, then choose Properties to view information about the incoming and outgoing VCIs, VPI, service category, and traffic descriptors. In VC Ingress Traffic Descriptor ATM traffic parameters and service categories for the incoming traffic on the incoming VC cross-connect. For information on VC traffic descriptors, see Table 21-4. In VC Egress Traffic Descriptor ATM traffic parameters and service categories for the outgoing traffic on the incoming VC cross-connect. For information on VC traffic descriptors, see Table 21-4. Out VC Egress Traffic Descriptor ATM traffic parameters and service categories for the outgoing traffic on the outgoing VC cross-connect. For information on VC traffic descriptors, see Table 21-4. Out VC Ingress Traffic Descriptor ATM traffic parameters and service categories for the incoming traffic on the outgoing VC cross-connect. For information on VC traffic descriptors, see Table 21-4. 21-9 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 21 Monitoring MToP Services Viewing Virtual Connection Properties Table 21-4 Virtual Connection Traffic Descriptors Value Description ABR Available bit rate (ABR) supports nonreal-time applications that tolerate high cell delay, and can adapt cell rates according to changing network resource availability to prevent cell loss. CBR Constant bit rate (CBR) supports real-time applications that request a static amount of bandwidth that is continuously available for the duration of the connection. CDVT Cell Delay Variation Tolerance (CDVT) specifies an acceptable deviation in cell times for a PVC that is transmitting above the PCR. For a given cell interarrival time expected by the ATM switch, CDVT allows for some variance in the transmission rate. CLP Cell loss priority (CLP) indicates the likelihood of a cell being dropped to ease network congestion. MBS Maximum Burst Size (MBS) specifies the number of cells that the edge device can transmit up to the PCR for a limited period of time without penalty for violation of the traffic contract. MCR Minimum Cell Rate (MCR) specifies the cell rate (cells per second) at which the edge device is always allowed to transmit. PCR Peak Cell Rate (PCR) specifies the cell rate (cells per second) that the edge device cannot exceed. PDR CLP0+1: 1536 Packet delivery ratio (PDR) for all cells (both CLP1 and CLP0 cells) on the circuit. SCR Sustainable Cell Rate (SCR) specifies the upper boundary for the average rate at which the edge device can transmit cells without loss. UBR Unspecified Bit Rate (UBR) supports nonreal-time applications that tolerate both high cell delay and cell loss on the network. UBR+ Unspecified bit rate plus (UBR+) supports nonreal-time applications that tolerate both high cell delay and cell loss on the network, but request a minimum guaranteed cell rate. nrt-VBR Nonreal-time variable bit rate (nrt-VBR) supports nonreal-time applications with bursty transmission characteristics that tolerate high cell delay, but require low cell loss. rt-VBR rt-VBR—Real-time variable bit rate (rt-VBR) supports real-time applications that have bursty transmission characteristics. 21-10 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 21 Monitoring MToP Services Viewing Virtual Connection Properties Viewing ATM VPI and VCI Properties If you know the interface or link configured for virtual connection cross-connects, you can view ATM VPI and VCI properties from the physical inventory window or from the link properties window. To view ATM VPI and VCI properties, open the VC Table window in either of the following ways: • To open the VC Table window from physical inventory: a. In the map view, double-click the element configured for virtual connection cross-connects. b. In the inventory window, choose Physical Inventory > Chassis > Slot > Subslot > Port. c. Click Show VC Table. • To view the VC Table window from the link properties window: a. In the map or links view, right-click the required ATM link and choose Properties. b. In the link properties window, click Calculate VCs. c. After the screen refreshes, click either Show Configured or Show Misconfigured to view the virtual connection cross-connects. The VC Table window is displayed, as shown in Figure 21-5. Figure 21-5 VC Table Table 21-5 describes the information displayed in the VC Table window. 21-11 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 21 Monitoring MToP Services Viewing Virtual Connection Properties Viewing Encapsulation Information To view virtual connection encapsulation information: Step 1 In Prime Network Vision, double-click the element configured for virtual connection encapsulation. Step 2 In the inventory window, choose Physical Inventory > Chassis > Slot > Subslot > Port. Step 3 Click the Show Encapsulation button. The VC Encapsulation window is displayed as shown in Figure 21-6. Table 21-5 VC Table Properties Field Description VPI Virtual Path Identifier for the selected port. VCI Virtual Channel Identifier for the selected port. Admin Status Administrative state of the connection: Up, Down, or Unknown. Oper Status Operational state of the connection: Up, Down, or Unknown. Ingress Traffic Descriptor Traffic parameters and service categories for the incoming traffic. For information on VC traffic descriptors, see Table 21-4. Egress Traffic Descriptor Traffic parameters and service categories for the outgoing traffic. For information on VC traffic descriptors, see Table 21-4. Shaping Profile Traffic shape profile used for the virtual connection. Type ATM traffic descriptor type for the virtual connection. Interface Name Interface name, such as ATM1/1/16. 21-12 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 21 Monitoring MToP Services Viewing Virtual Connection Properties Figure 21-6 VC Encapsulation Properties Table 21-6 describes the information displayed in the VC Encapsulation window. Table 21-6 VC Encapsulation Properties Field Description VC Virtual connection identifier, such as VC:7/4. Type Type of encapsulation, such as Point-to-Point Protocol (PPP) over ATM (PPPoA) or ATM adaption layer Type 5 (AAL5). Binding Information Information tied to the virtual connection, such as a username. Binding Status Binding state: Bound or Unbound. VC Egress Traffic Descriptor Traffic parameters and service categories for the outgoing traffic. For information on VC traffic descriptors, see Table 21-4. VC Ingress Traffic Descriptor Traffic parameters and service categories for the incoming traffic. For information on VC traffic descriptors, see Table 21-4. Discovery Protocols Discovery protocol used for the VC. 21-13 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 21 Monitoring MToP Services Viewing IMA Group Properties Viewing IMA Group Properties To view IMA group properties: Step 1 In Prime Network Vision, double-click the required device. Step 2 In the inventory window, choose Logical Inventory > IMA Groups > group. IMA group properties and the IMA Members table are displayed in the content pane as shown in Figure 21-7. Figure 21-7 IMA Group Properties Table 21-7 describes the information displayed for the IMA group. Table 21-7 IMA Group Properties Field Description Active Bandwidth Active bandwidth of the IMA group. Admin Status Administrative status of the IMA group. Clock Mode Clock mode the IMA group is using: • Common—Common transmit clocking (CTC). • Independent—Independent transmit clocking (ITC). Configured Bandwidth Total bandwidth of the IMA group, which is the sum of all individual links in the group. 21-14 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 21 Monitoring MToP Services Viewing IMA Group Properties Description IMA group interface name. Frame Length Length of the IMA group transmit frames, in the number of cells: 32, 64, 128, or 256. A small frame length causes more overhead but loses less data if a problem occurs. We recommend a frame length of 128 cells. Group Number IMA group number. Group State IMA group status, in the order of usual appearance: • Startup—The near end is waiting to receive indication that the far end is in Startup. The IMA group moves to the Startup-Ack state when it can communicate with the far end and has recorded IMA identifier, group symmetry, and other IMA group parameters. • Startup ACK—Both sides of the link are enabled. • Config Aborted—The far end has unacceptable configuration parameters, such as an unsupported IMA frame size, an incompatible group symmetry, or an unsupported IMA version. • Insufficient Links—The near end has accepted the far end group parameters, but the far end does not have sufficient links to move into the Operational state. • Operational—The group is not inhibited and has sufficient links in both directions. The IMA interface can receive ATM layer cells and pass them from the IMA sublayer to the ATM layer. • Blocked—The group is blocked, even though sufficient links are active in both directions. IMA Version IMA version configured, either 1.0 or 1.1. Minimum Number of Rx Links Minimum number of Rx links needed for the IMA group to be operational. Minimum Number of Tx Links Minimum number of Tx links needed for the IMA group to be operational. Number of Active Links Number of DS1 (E1 or T1) links that are active in the group. Number of Configured Links Number of DS1 (E1 or T1) links that are configured in the IMA group. Table 21-7 IMA Group Properties (continued) Field Description 21-15 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 21 Monitoring MToP Services Viewing IMA Group Properties Description IMA group interface name. Frame Length Length of the IMA group transmit frames, in the number of cells: 32, 64, 128, or 256. A small frame length causes more overhead but loses less data if a problem occurs. We recommend a frame length of 128 cells. Group Number IMA group number. Group State IMA group status, in the order of usual appearance: • Startup—The near end is waiting to receive indication that the far end is in Startup. The IMA group moves to the Startup-Ack state when it can communicate with the far end and has recorded IMA identifier, group symmetry, and other IMA group parameters. • Startup ACK—Both sides of the link are enabled. • Config Aborted—The far end has unacceptable configuration parameters, such as an unsupported IMA frame size, an incompatible group symmetry, or an unsupported IMA version. • Insufficient Links—The near end has accepted the far end group parameters, but the far end does not have sufficient links to move into the Operational state. • Operational—The group is not inhibited and has sufficient links in both directions. The IMA interface can receive ATM layer cells and pass them from the IMA sublayer to the ATM layer. • Blocked—The group is blocked, even though sufficient links are active in both directions. IMA Version IMA version configured, either 1.0 or 1.1. Minimum Number of Rx Links Minimum number of Rx links needed for the IMA group to be operational. Minimum Number of Tx Links Minimum number of Tx links needed for the IMA group to be operational. Number of Active Links Number of DS1 (E1 or T1) links that are active in the group. Number of Configured Links Number of DS1 (E1 or T1) links that are configured in the IMA group. Table 21-7 IMA Group Properties (continued) Field Description 21-16 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 21 Monitoring MToP Services Viewing IMA Group Properties Table 21-8 describes the information displayed in the IMA Members table. Step 3 In the IMA Members table, click a hyperlinked port entry to view the port properties in physical inventory. See Figure 21-8. The information that is displayed for the port in physical inventory depends on the type of connection, such as SONET or ATM. Oper Status Operational state of the IMA group interface: • Dormant—The interface is dormant. • Down—The interface is down. • Not Present—An interface component is missing. • Testing—The interface is in test mode. • Unknown—The interface has an unknown operational status. • Up—The interface is up. Port Type Type of port, such as ATM IMA. Table 21-7 IMA Group Properties (continued) Field Description Table 21-8 IMA Members Table Column Description Admin Status Administrative status of the IMA member. Channelization Channelization that occurs through the path, such as STS1-> VTG-> VT15. Information is displayed in this field only if the T1 or E1 path was channelized. If the line was not channelized, this field is not displayed. For example, if the IMA group is configured on a T1 or E1 card, this field is not displayed. Clocking Source of the clocking mechanism: Internal or Line. Description Type of channelization, such as Synchronous Transport Signal 1 (STS-1) or Synchronous Transport Module level 1 (STM-1). Oper Status Operational state of the IMA member: Physical Port Hyperlinked entry to the port in physical inventory. Port Type Type of port, such as E1 or T1. 21-17 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 21 Monitoring MToP Services Viewing TDM Properties Figure 21-8 ATM IMA Port in Physical Inventory Viewing TDM Properties TDM is a mechanism for combining two or more slower-speed data streams into a single high-speed communication channel. In this model, data from multiple sources is divided into segments that are transmitted in a defined sequence. Each incoming data stream is allocated a timeslot of a fixed length, and the data from each stream is transmitted in turn. For example, data from data stream 1 is transmitted during timeslot 1, data from data stream 2 is transmitted during timeslot 2, and so on. After each incoming stream has transmitted data, the cycle begins again with data stream 1. The transmission order is maintained so that the input streams can be reassembled at the destination. 21-18 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 21 Monitoring MToP Services Viewing Channelization Properties MToP encapsulates TDM streams for delivery over packet-switching networks (PSNs) using the following methods: • SAToP—A method for encapsulating TDM bit-streams (T1, E1, T3, or E3) as pseudowires over PSNs. • CESoPSN—A method for encapsulating structured (NxDS0) TDM signals as pseudowires over PSNs. For T1 or E1 entries, the TDM properties presented in Table 21-9 are displayed in physical inventory in addition to the existing T1 or E1 properties. Viewing Channelization Properties Prime Network Vision supports the channelization of SONET/SDH and T3 lines. When a line is channelized, it is logically divided into smaller bandwidth channels called paths. These paths (referred to as high order paths or HOPs) can, in turn, contain low order paths, or LOPs. The sum of the bandwidth on all paths cannot exceed the line bandwidth. The following topics describe how to view channelization properties for SONET/SDH and T3 lines: • Viewing SONET/SDH Channelization Properties, page 21-19 • Viewing T3 DS1 and DS3 Channelization Properties, page 21-22 Table 21-9 TDM-Specific Properties for DS1 (T1 or E1) in Physical Interfaces Field Description International Bit Whether or not the international bit is used by the controller: • 0—The international bit is not used. • 1—The international bit is used. This property applies only to E1. National Bits Whether or not the national reserve bits (sa4, sa5, sa6, sa7, and sa8) are used by the controller: • 0—The national reserve bits are not used. • 1—The national reserve bits are used. This property applies only to E1. Line Code Line encoding method for the DS1 link: • For E1, the options are Alternate Mark Inversion (AMI) and high-density bipolar of order 3 (HDB3). • For T1, the options are AMI and bipolar with 8 zero substitution (B8ZS). Cable Length For T1 ports in short-haul mode, the length of the cable in feet. 21-19 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 21 Monitoring MToP Services Viewing Channelization Properties Viewing SONET/SDH Channelization Properties SONET and SDH use the same concepts for channelization, but the terminology differs. Table 21-10 describes the equivalent terms for SONET and SDH channelization. The information displayed in Prime Network Vision reflects whether SONET or SDH is configured on the interface. To view SONET/SDH channelization properties: Step 1 In Prime Network Vision, right-click the required device, then choose Inventory. Step 2 Choose Physical Inventory > Chassis > slot > subslot > SONET/SDH-interface. The properties for SONET/SDH and OC-3 are displayed in the content pane. See Figure 21-9. Figure 21-9 SONET/SDH Interface in Physical Inventory Table 21-10 SONET and SDH Channelization Terminology Concept SONET Term SDH Term Frame Synchronous Transport Signal level N (STS-N) Synchronous Transport Module level N (STM-N) HOP channel STS-1 Administrative Unit (AU-n) Lower-order channels Virtual Tributary (VT) Tributary Unit Group (TUG) LOP payloads DS1, DS3, or E1 21-20 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 21 Monitoring MToP Services Viewing Channelization Properties Table 21-11 describes the information that is displayed for SONET/SDH and OC3 in the content pane. Step 3 To view additional information about a channelized path, double-click the required entry in the Description column. The SONET/SDH High Order Path Properties window is displayed as shown in Figure 21-10. Table 21-11 SONET/SDH and OC3 Properties Field Description SONET/SDH High Order Path (HOP) Area Description SONET/SDH path description including the interface and high order path. Double-click an entry to view additional details about the path. Channelization Type of channelization, such as STS-1 or STM-1. Admin Status Administrative status of the HOP. Oper Status Operational status of the HOP. OC3 Area Admin Status Administrative status of the OC-3 line. Oper Status Operational status of the OC-3 line. Port Type Type of port. Last Changed Date and time of the last status change of the line. Scrambling Any scrambling that has been applied to the SONET payload. Maximum Speed Maximum bandwidth for the line. Loopback Loopback setting configured on the line. Port Description Description of the port defined by the user. Clocking Clocking configured on the line. Specific Type Specific type of line; in this case, OC3. Internal Port Whether or not the line includes an internal port: True or False. Ss Ctps Table Size Size of the SONET/SDH Connection Termination Point (CTP) table. 21-21 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 21 Monitoring MToP Services Viewing Channelization Properties Figure 21-10 SONET/SDH High Order Path Properties Window Table 21-12 describes the information displayed in SONET/SDH High Order Path Properties window. Table 21-12 SONET/SDH High Order Path Properties Field Description Description SONET/SDH path description including the interface and high order path. Double-click an entry to view additional details about the path. Channelization Type of channelization, such as Synchronous Transport Signal 1 (STS-1) or Synchronous Transport Module level 1 (STM-1). Admin Status Administrative status of the HOP. Oper Status Operational status of the HOP. Port Type Type of port. Last Changed Date and time of the last status change of the path. Maximum Speed Maximum bandwidth for the line. MTU MTU for the path. Applique Type Sub-STS-1 facility applied to this path. In this example, the facility applied is Virtual Tributary 1.5 (VT1.5). Sending Alarms Whether or not the path is sending alarms: True or False. 21-22 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 21 Monitoring MToP Services Viewing Channelization Properties Viewing T3 DS1 and DS3 Channelization Properties To view T3 DS1 and DS3 channelization properties: Step 1 In Prime Network Vision, right-click the required device, then choose Inventory. Step 2 Choose Physical Inventory > Chassis > slot > subslot > T3-interface. Figure 21-11 shows DS1 channelization properties for T3 in physical inventory. Low Order Path Tab Description Description of the low order path down to the T1 level, including the channel types (such as STS-1, VTG, or VT) and channel allocated. Physical Port Hyperlinked entry to the port in physical inventory. Channelization Channelization that occurs through the path, such as STS1-> VTG-> VT15. Admin Status Administrative status of the path. Oper Status Operational status of the path. Clocking Source of the clocking mechanism: Internal or Line. Supported Alarms Tab Name Supported alarm. Enable Whether the alarm is enabled or disabled. Table 21-12 SONET/SDH High Order Path Properties (continued) Field Description 21-23 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 21 Monitoring MToP Services Viewing Channelization Properties Figure 21-11 T3 DS1 Channelization Properties in Physical Inventory Table 21-13 describes the information that is displayed for Channelized DS1 and DS3 in the content pane. Table 21-13 Channelized DS1 and DS3 Properties Field Description Channelized DS1 Table Description Path description including the physical interface and the channel number. Double-click an entry to view additional details about the path. Physical Port Physical port for the channelized line. Channelization Type of channelization, such as channelized T3 (CT3) to T1. Admin Status Administrative status of the channelized line. Oper Status Operational status of the channelized line. VDC For devices with multiple virtual contexts, the context associated with the channelized line. Clocking Clocking configured on the line: Internal or Line. 21-24 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 21 Monitoring MToP Services Viewing Channelization Properties Step 3 To view additional information about a DS1channelized path, double-click the required entry in the Channelized DS1 table. Figure 21-12 shows the information that is displayed in the Channelized DS1 PDH Properties window. DS3 Area Admin Status Administrative status of the DS3 line. Oper Status Operational status of the DS3 line. Port Type Type of port. Last Changed Date and time of the last status change of the line. Maximum Speed Maximum bandwidth for the line. Port Description Description of the port configured on the interface. Recovered Clocking ID Recovered clock identifier, if known. Scrambling Any scrambling that has been applied to the SONET payload. Framing Type of framing applied to the line. Loopback Loopback setting configured on the line. Clocking Clocking configured on the line: Internal or Line. Alarm State Alarm state of the DS3 line: • Clear—The alarm state is clear. • AIS—Alarm Indication Signal (AIS). • LOS—Loss of signal (LOS) alarm. • AIS_LOS—AIS loss of signal alarm. • LOF—Loss of frame (LOF) alarm. • AIS_LOF—AIS loss of frame alarm. • LOS_LOF—Loss of signal and loss of frame alarm. • AIS_LOS_LOF—AIS loss of signal and loss of frame alarm. • Unknown—Unknown alarm. Internal Port Whether or not the line includes an internal port: True or False. Line Code Line coding applied to the line. Table 21-13 Channelized DS1 and DS3 Properties (continued) Field Description 21-25 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 21 Monitoring MToP Services Viewing Channelization Properties Figure 21-12 Channelized DS1 PDH Properties Window Table 21-14 describes the information that is displayed in the Channelized DS1 PDH Properties window. Table 21-14 Channelized DS1 PDH Properties Window Field Description Location Area Description Path description including the physical interface and the channel number. Channelization Type of channelization used on the line, such as CT3-> T1. Admin Status Administrative status of the channelized line. Oper Status Operational status of the channelized line. 21-26 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 21 Monitoring MToP Services Viewing Channelization Properties Alarm State Alarm state of the DS1 line: • Clear—The alarm state is clear. • AIS—Alarm Indication Signal (AIS). • LOS—Loss of signal (LOS) alarm. • AIS_LOS—AIS loss of signal alarm. • LOF—Loss of frame (LOF) alarm. • AIS_LOF—AIS loss of frame alarm. • LOS_LOF—Loss of signal and loss of frame alarm. • AIS_LOS_LOF—AIS loss of signal and loss of frame alarm. • Unknown—Unknown alarm. Sending Alarms Whether or not the line is sending alarms: True or False. Maximum Speed Maximum bandwidth for the line. Framing Type of framing applied to the line. Line Code Line coding applied to the line. Loopback Loopback setting configured on the line. Clocking Clocking configured on the line: Internal or Line. Recovered Clock ID Recovered clock identifier, if known. Group Table This table appears only if a DS0 bundle is configured on a channelized DS1 line. The properties that are displayed pertain to the DS0 bundle. Group Name of the DS0 bundle. Time Slots Range of timeslots (DS0 channels) allotted to the group. Oper Status Operational status of the group. Encapsulation Type of encapsulation used, such as High-Level Data Link Control (HDLC). Admin Status Administrative status of the group. ID DS0 bundle identifier. Table 21-14 Channelized DS1 PDH Properties Window (continued) Field Description 21-27 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 21 Monitoring MToP Services Viewing MLPPP Properties Viewing MLPPP Properties Multilink PPP (MLPPP) is a protocol that connects multiple links between two systems as needed to provide bandwidth when needed. MLPPP packets are fragmented, and the fragments are sent at the same time over multiple point-to-point links to the same remote address. MLPPP provides bandwidth on demand and reduces transmission latency across WAN links. To view MLPPP properties: Step 1 In Prime Network Vision, right-click the required device, then choose Inventory. Step 2 In the inventory window, choose Logical Inventory > MLPPP. See Figure 21-13. Figure 21-13 MLPPP Properties in Logical Inventory 21-28 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 21 Monitoring MToP Services Viewing MLPPP Properties Table 21-15 describes the information that is displayed for MLPPP. Step 3 To view properties for individual MLPPP bundles, double-click the hyperlinked entry in the MLPPP Bundle table. The MLPPP Properties window is displayed as shown in Figure 21-14. Figure 21-14 MLPPP Bundle Properties Window Table 21-15 MLPPP Properties Field Description Type Type of properties; in this case, MLPPP. MLPPP Bundle Table MLPPP MLPPP bundle name, hyperlinked to the MLPPP Properties window. Name MLPPP interface name. Group MLPPP group to which the bundle belongs. Active Link Number of active interfaces participating in MLPPP. Admin Status Administrative status of the MLPPP bundle: Up or Down. Operational Status Administrative status of the MLPPP bundle: Up or Down. LCP Status Link Control Protocol (LCP) status of the MLPPP bundle: Closed, Open, Started, or Unknown. 21-29 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 21 Monitoring MToP Services Viewing MLPPP Properties Table 21-16 describes the information that is displayed in the MLPPP Properties window. Table 21-16 MLPPP Bundle and Member Properties Field Description MLPPP MLPPP bundle name, hyperlinked to MLPPP in logical inventory. Name MLPPP interface name. Group Group to which the MLPPP bundle belongs. Active Link Number of active interfaces participating in MLPPP. Admin Status Administrative status of the MLPPP bundle: Up or Down. Operational Status Operational status of the MLPPP bundle: Up or Down. LCP Status Link Control Protocol (LCP) status of the MLPPP bundle: Closed, Open, Started, or Unknown. Minimum Configured Link Minimum number of configured links for an MLPPP bundle. Maximum Configured Link Maximum number of configured links for an MLPPP bundle. Bandwidth Bandwidth allocated to the MLPPP bundle. MTU Size of the Maximum Transmission Unit (MTU), from 1 to 2147483647 bytes. Keepalive Status of the keepalive function: Set, Not Set, or Unknown. Keepalive Time If keepalive is enabled, the amount of time, in seconds, to wait before sending a keepalive message. Interleave Enabled Whether or not interleaving of small fragments is enabled. Fragment Disable Whether fragmentation is enabled or disabled: True or False. Fragment Delay Maximum size, in units of time, for packet fragments on an MLPPP bundle. Values range from 1 to 999. Fragment Maximum Maximum number of MLPPP bundle fragments. Keepalive Retry Number of times that the device sends keepalive packets without response before closing the MLPPP bundle protocol. Values range from 2 to 254. Load Threshold Minimum load threshold for the MLPPP bundle. If the traffic load falls below the threshold, the link is removed. 21-30 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 21 Monitoring MToP Services Viewing MLPPP Link Properties Step 4 To view the interface properties in physical inventory, double-click the required entry in the ID column. Viewing MLPPP Link Properties An MLPPP link is a link that connects two MLPPP devices. To view MLPPP link properties: Step 1 In the Prime Network Vision map view, select a link connected to two MLPPP devices and open the link quick view window as shown in Figure 21-15. Figure 21-15 MLPPP Link in Link Quick View Step 2 In the link quick view window, click Properties. MLPPP Members Table ID MLPPP bundle member identifier, hyperlinked to the interface in physical inventory. Type No value is displayed in this field. Binding Information Binding information to which the interface is associated. The value is null. Binding Status No value is displayed in this field. Discovery Protocols Discovery protocol used on the interface. Table 21-16 MLPPP Bundle and Member Properties (continued) Field Description 21-31 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 21 Monitoring MToP Services Viewing MLPPP Link Properties Step 3 In the link properties window, select the MLPPP link. The link properties are displayed as shown in Figure 21-16. Figure 21-16 MLPPP Link Properties Table 21-17 describes the information that is displayed for the MLPPP link. Table 21-17 MLPPP Link Properties Field Description General Properties Link Type Link protocol. In this case, MLPPP. Type Type of link: Dynamic or Static. Bi Directional Whether the link is bidirectional: True or False. MLPPP Properties Properties are displayed for both ends of the MLPPP link. MLPPP Interface configured for MLPPP, hyperlinked to the entry in physical inventory. Group MLPPP group to which the interface belongs. Active Link Number of active interfaces participating in the MLPPP link for each device. Admin Status Administrative status of the interface: Up or Down. Operational Status Operational status of the interface: Up or Down. LCP Status LCP status of the MLPPP interface: Closed, Open, Started, or Unknown. 21-32 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 21 Monitoring MToP Services Viewing MPLS Pseudowire over GRE Properties Viewing MPLS Pseudowire over GRE Properties Generic routing encapsulation (GRE) is a tunneling protocol, originated by Cisco Systems and standardized in RFC 2784. GRE encapsulates a variety of network layer packets inside IP tunneling packets, creating a virtual point-to-point link to devices at remote points over an IP network. GRE encapsulates the entire original packet with a standard IP header and GRE header before the IPsec process. GRE can carry multicast and broadcast traffic, making it possible to configure a routing protocol for virtual GRE tunnels. In RAN backhaul networks, GRE is used to transport cell site traffic across IP networks (nonMPLS). In addition, GRE tunnels can be used to transport TDM traffic (TDMoMPLSoGRE) as part of the connectivity among cell site-facing Cisco 7600 routers and base station controller (BSC) site-facing Cisco 7600 routers, or between a Cisco Mobile Wireless Router (MWR) device and a BSC site-facing Cisco 7600 router. Using GRE tunnels to transport Any Traffic over MPLS (AToM) enables mobile service providers to deploy AToM pseudowires in a network where MPLS availability is discontinuous; for example, in networks where the pseudowire endpoints are located in MPLS edge routers with a plain IP core network, or where two separate MPLS networks are connected by a transit network with plain IP forwarding. To view the properties for MPLS pseudowire over GRE: Step 1 In Prime Network Vision, right-click the required device, then choose Inventory. Step 2 In the inventory window, choose Logical Inventory > Pseudowires. The Tunnel Edges table is displayed in the content pane as shown in Figure 21-17. Step 3 Select the required entry and scroll horizontally until you see the required information. Figure 21-17 MPLS Pseudowire Tunnels over GRE Properties 21-33 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 21 Monitoring MToP Services Viewing MPLS Pseudowire over GRE Properties Table 21-18 describes the information included in the Tunnel Edges table specifically for MPLS pseudowire tunnels over GRE. Step 4 To view GRE Tunnel properties, choose Logical Inventory > GRE Tunnels. Figure 21-18 shows the Tunnel Edges table that is displayed for GRE tunnels. Table 21-18 MPLS Pseudowire over GRE Properties Field Description Pseudowire Type Type of pseudowire relevant to MToP: • ATM AAL5 SDU—ATM with ATM Adaptation Layer 5 (AAL5) service data units. • ATM n-to-one VCC—ATM with n-to-one virtual channel connection (VCC). • ATM n-to-one VPC—ATM with n-to-one virtual path connection (VPC). • CESoPSN Basic—CESoPSN basic services with CAS. • SAToP E1—SAToP on an E1 interface. Local MTU Size, in bytes, of the MTU on the local interface. Remote MTU Size, in bytes, of the MTU on the remote interface. Preferred Path Tunnel Path to be used for MPLS pseudowire traffic. Click the hyperlinked entry to view the tunnel details in logical inventory. 21-34 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 21 Monitoring MToP Services Viewing MPLS Pseudowire over GRE Properties Figure 21-18 GRE Tunnel Properties in Logical Inventory Table 21-19 describes the information that is displayed for GRE tunnels in logical inventory. Table 21-19 GRE Tunnel Properties in Logical Inventory Field Description Name Tunnel name. IP Address Tunnel IP address. Source IP address local to the device. Destination IP address of the remote router. State State of the tunnel: Up or Down. Keepalive Time If keepalive is enabled, the amount of time, in seconds, to wait before sending a keepalive message. Type Tunnel type. Keepalive Status of the keepalive function: Set, Not Set, or Unknown. Keepalive Retry Number times that the device continues to send keepalive packets without response before bringing the tunnel interface protocol down. Values range from 2 to 254, with a default of 3. 21-35 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 21 Monitoring MToP Services Network Clock Service Overview Network Clock Service Overview Network clock service refers to the means by which a clock signal is generated or derived and distributed through a network and its individual nodes for the purpose of ensuring synchronized network operation. Network clocking is particularly important for mobile service providers to ensure proper transport of cellular traffic from cell sites to Base Station Control (BSC) sites. Note In Prime Network Vision, clock service refers to network clock service. The following topics describe how to use Prime Network Vision to monitor clock service: • Monitoring Clock Service, page 21-35 • Monitoring PTP Service, page 21-37 • Viewing Pseudowire Clock Recovery Properties, page 21-42 • Viewing SyncE Properties, page 21-46 • Applying a Network Clock Service Overlay, page 21-49 Monitoring Clock Service To monitor clock service: Step 1 In Prime Network Vision, right-click the required device, then choose Inventory. Step 2 In the inventory window, choose Logical Inventory > Clock. Clock service information is displayed in the content pane as shown in Figure 21-19. Figure 21-19 Clock Service Properties 21-36 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 21 Monitoring MToP Services Network Clock Service Overview Table 21-20 describes the information displayed for clocking service. Table 21-20 Clock Service Properties Field Description Clock Service Mode This field is not populated. Network Clock Select Mode Action to take if the master device fails: • Non-revert—Do not use the master device again after it recovers from the failure. • Revert—Use the master device again after it recovers and functions correctly for a specified amount of time. • Unknown—The network clock selection mode is unknown. Service Status Status of the system service: • Initializing—The service is starting up. • Down—The service is down. • Reset—The service has been reset. • Running—The service is running. • Other—A status other than those listed. Active Clock Source Current active clock source used by the device. Hold Timeout How long the device waits before reevaluating the network clock entry. Values can be from 0-86400 seconds, Not Set, or infinite. Service Type Type of system service, such as Clock or Cisco Discovery Protocol. Use Stratum4 Quality of the clock source: • True—Use Stratum 4, the lowest level of clocking quality. • False—(Default) Use Stratum 3, a higher level of clocking quality than Stratum 4. 21-37 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 21 Monitoring MToP Services Network Clock Service Overview Monitoring PTP Service In networks that employ TDM, periodic synchronization of device clocks is required to ensure that the receiving device knows which channel is which for accurate reassembly of the data stream. The Precision Time Protocol (PTP) standard: • Specifies a clock synchronization protocol that enables this synchronization. • Applies to distributed systems that consist of one or more nodes communicating over a network. Defined by IEEE 1588-2008, PTP Version 2 (PTPv2) allows device synchronization at the nanosecond level. PTP uses the concept of master and slave devices to achieve precise clock synchronization. Using PTP, the master device periodically starts a message exchange with the slave devices. After noting the times at which the messages are sent and received, each slave device calculates the difference between its system time and the system time of the master device. The slave device then adjusts its clock so that it is synchronized with the master device. When the master device initiates the next message exchange, the slave device again calculates the difference and adjusts its clock. This repetitive synchronization ensures that device clocks are coordinated and that data stream reassembly is accurate. Clock Source Table This table is displayed only if there are active clock sources. Clock Source Current active clock source used by the device. Network Clock Priority Priority of the clock source with 1 being the highest priority. Source Type Method by which clocking information is provided: • BITS—Timing is supplied by a Building Integrated Timing Supply (BITS) port clock. • E1/T1—Clocking is provided via an E1 or T1 interface. • Packet-Timing—Clocking is provided over a packet-based network. • Synchronous Ethernet—Clocking is provided by Synchronous Ethernet. • Others—Clocking is provided by a source other than the above. Valid Source Validity of the clock source: • True—The clock source is valid and operational. • False—The clock source is not valid or is not operational. Table 21-20 Clock Service Properties (continued) Field Description 21-38 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 21 Monitoring MToP Services Network Clock Service Overview To monitor PTP service: Step 1 In Prime Network Vision, right-click the required device, then choose Inventory. Step 2 In the inventory window, choose Logical Inventory > Clock > PTP Service. The PTP service properties are displayed in the content pane as shown in Figure 21-20. Figure 21-20 PTP Service Properties Table 21-21 describes the properties that are displayed for PTP service. 21-39 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 21 Monitoring MToP Services Network Clock Service Overview Table 21-21 PTP Service Properties Field Description PTP Mode Mode of PTP operation: • Boundary—Boundary clock mode. • E2E Transparent—End-to-end transparent clock mode. • Ordinary—Ordinary clock mode. • P2P Transparent—Peer-to-peer transparent clock mode. • Unknown—The clock mode is unknown. Note Cisco MWR-2941 routers support Ordinary mode only. PTP Clock ID Clock identifier derived from the device interface. PTP Domain Number of the domain used for PTP traffic. A single network can contain multiple separate domains. Priority 1 First value checked for clock selection. The clock with the lowest priority takes precedence. Priority 2 If two or more clocks have the same value in the Priority 1 field, the value in this field is used for clock selection. Port State Clock state according to the PTP engine: • Freerun—The slave clock is not locked to a master clock. • Holdover—The slave device is locked to a master device, but communication with the master is lost or the timestamps in the PTP packet are incorrect. • Acquiring—The slave device is receiving packets from a master and is trying to acquire a clock. • Freq locked—The slave device is locked to the master device with respect to frequency, but is not aligned with respect to phase. • Phase aligned—The slave device is locked to the master device with respect to both frequency and phase. PTP Interface List Table Interface Name Interface identifier. PTP Version Version of PTP used. The default value is 2, indicating PTPv2. Port Name Name of the PTP port clock. Port Role PTP role of the clock: Master or Slave. 21-40 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 21 Monitoring MToP Services Network Clock Service Overview PTP Slave Mode For an interface defined as a slave device, the mode used for PTP clocking: • Not Set—The slave mode is not used. • Multicast—The interface uses multicast mode for PTP clocking. • Unicast—The interface uses unicast mode for PTP clocking. • Unicast with Negotiation—The interface uses unicast mode with negotiation for PTP clocking. Clock Source Addresses IP addresses of the clock source. Delay Request Interval (log mean value) When the interface is in PTP master mode, the interval specified to member devices for delay request messages. The intervals use base 2 values, as follows: • 4—1 packet every 16 seconds. • 3—1 packet every 8 seconds. • 2—1 packet every 4 seconds. • 1—1 packet every 2 seconds. • 0—1 packet every second. • -1—1 packet every 1/2 second, or 2 packets per second. • -2—1 packet every 1/4 second, or 4 packets per second. • -3—1 packet every 1/8 second, or 8 packets per second. • -4—1 packet every 1/16 seconds, or 16 packets per second. • -5—1 packet every 1/32 seconds, or 32 packets per second. • -6—1 packet every 1/64 seconds, or 64 packets per second. Announce Interval (log mean value) Interval value for PTP announcement packets: • 4—1 packet every 16 seconds. • 3—1 packet every 8 seconds. • 2—1 packet every 4 seconds. • 1—1 packet every 2 seconds. • 0—1 packet every second. • -1—1 packet every 1/2 second, or 2 packets per second. • -2—1 packet every 1/4 second, or 4 packets per second. • -3—1 packet every 1/8 second, or 8 packets per second. • -4—1 packet every 1/16 seconds, or 16 packets per second. • -5—1 packet every 1/32 seconds, or 32 packets per second. • -6—1 packet every 1/64 seconds, or 64 packets per second. Table 21-21 PTP Service Properties (continued) Field Description 21-41 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 21 Monitoring MToP Services Network Clock Service Overview Announce Timeout Number of PTP announcement intervals before the session times out. Values are 2-10. Sync Interval (log mean value) Interval for sending PTP synchronization messages: • 4—1 packet every 16 seconds. • 3—1 packet every 8 seconds. • 2—1 packet every 4 seconds. • 1—1 packet every 2 seconds. • 0—1 packet every second. • -1—1 packet every 1/2 second, or 2 packets per second. • -2—1 packet every 1/4 second, or 4 packets per second. • -3—1 packet every 1/8 second, or 8 packets per second. • -4—1 packet every 1/16 seconds, or 16 packets per second. • -5—1 packet every 1/32 seconds, or 32 packets per second. • -6—1 packet every 1/64 seconds, or 64 packets per second. Sync Limit (nanoseconds) Maximum clock offset value, in nanoseconds, before PTP attempts to resynchronize. Interface Physical interface identifier, hyperlinked to the routing information for the interface. PTP Master Mode For an interface defined as a master device, the mode used for PTP clocking: • Not Set—The master mode is not used. • Multicast—The interface uses multicast mode for PTP clocking. • Unicast—The interface uses unicast mode for PTP clocking. This mode allows a single destination. • Unicast with Negotiation—The interface uses unicast mode with negotiation for PTP clocking. This mode allows up to 128 destinations. Clock Destination Addresses IP addresses of the clock destinations. This field contains IP addresses only when Master mode is enabled. Domain Clocking domain. Table 21-21 PTP Service Properties (continued) Field Description 21-42 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 21 Monitoring MToP Services Network Clock Service Overview Viewing Pseudowire Clock Recovery Properties To view pseudowire clock recovery properties: Step 1 Choose Logical Inventory > Clock > Pseudowire Clock Recovery. Prime Network Vision displays the Virtual CEM information by default. See Figure 21-21. Figure 21-21 Pseudowire Clock Recovery - Virtual CEM Tab Step 2 To view more information about a virtual CEM, right-click the virtual CEM, then choose Properties. The Virtual CEM Properties window is displayed. The information that is displayed in the Virtual CEM Properties window depends on whether or not the virtual CEM belongs to a group: • If a CEM group is not configured on the virtual CEM, the Virtual CEM Properties window contains only the CEM interface name. • If a CEM group is configured on the virtual CEM, the Virtual CEM Properties window contains the information described in Table 21-22. 21-43 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 21 Monitoring MToP Services Network Clock Service Overview Step 3 To view additional CEM group properties, double-click the required CEM group. Table 21-23 describes the information displayed in the CEM Group Properties window. Table 21-22 Virtual CEM Group Properties Field Description CEM Interface Name CEM interface name. CEM Group Table CEM Group Name of the virtual CEM group. Framing Framing mode used for the CEM channel: • Framed—Specifies the channels used for the controller, such as Channels: (1-8), (10-14). The channels that are available depend on the type of controller: T1, E1, T3, or E3. • Unframed—Indicates that a single CEM channel is used for all T1/E1 timeslots. SAToP uses the unframed mode. Pseudowire Name of the pseudowire configured on the CEM interface, hyperlinked to the pseudowire properties in logical inventory. Oper Status Operational status of the CEM interface: • Dormant—The interface is dormant. • Down—The interface is down. • Not Present—An interface component is missing. • Testing—The interface is in test mode. • Unknown—The interface has an unknown operational status. • Up—The interface is up. Admin Status Administrative status of the CEM interface: • Down—The CEM interface is administratively down. • Testing—The administrator is testing the CEM interface. • Unknown—The administrative status is unknown. • Up—The CEM interface is administratively up. 21-44 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 21 Monitoring MToP Services Network Clock Service Overview Step 4 To view recovered clock entries, click the Recovered Clock Entries tab. See Figure 21-22. If no recovered clock entries exist, this tab is not displayed. Table 21-23 CEM Group Properties Field Description Oper Status Operational status of the CEM interface: • Dormant—The interface is dormant. • Down—The interface is down. • Not Present—An interface component is missing. • Testing—The interface is in test mode. • Unknown—The interface has an unknown operational status. • Up—The interface is up. Idle Pattern Eight-bit hexadecimal number that is transmitted on a T1 or E1 line when missing packets are detected on the pseudowire (PW) circuit. Type Type of CEM group. This is always DS0 Bundle. Idle CAS Pattern When CAS is used, the 8-bit hexadecimal signal that is sent when the CEM interface is identified as idle. Bundle Location Associated card and slot for the virtual CEM, using the virtual CEM port 24; for example virtual-cem/8/3/24:0. Dejitter Size of the dejitter buffer in milliseconds (ms). The range is 4 to 500 ms with a default of 4 ms. RTP Hdr Compression Whether RTP header compression is enabled or disabled. RTP Enabled Whether RTP compression is enabled or disabled. Admin Status Administrative status of the CEM interface: • Down—The CEM interface is administratively down. • Testing—The administrator is testing the CEM interface. • Unknown—The administrative status is unknown. • Up—The CEM interface is administratively up. ID DS0 bundle CEM group identifier. Payload Size Size of the payload for packets on the CEM interface. The range is 32 to 1312 bytes. 21-45 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 21 Monitoring MToP Services Network Clock Service Overview Figure 21-22 Pseudowire Clock Recovery - Recovered Clock Entries Tab Table 21-24 describes the information displayed for pseudowire clock recovery. Table 21-24 Pseudowire Clock Recovery Properties Field Description Recovered Clock Source Interface (slot/subslot) in which clock recovery occurred. Click the hyperlinked entry to view its properties in physical inventory. Recovered Clock Mode Recovered clock mode: • Adaptive—The devices do not have a common clock source. The recovered clock is derived from packet arrival. • Differential—The edge devices have a common clock source, and the recovered clock is derived from timing information in packets and the related difference from the common clock. • Synchronous—A GPS or BITS clock source externally synchronizes both end devices. This method is extremely accurate, but is rarely available for all network devices. 21-46 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 21 Monitoring MToP Services Network Clock Service Overview Viewing SyncE Properties With Ethernet equipment gradually replacing SONET and SDH equipment in service-provider networks, frequency synchronization is required to provide high-quality clock synchronization over Ethernet ports. Synchronous Ethernet (SyncE), a recently adopted standard, provides the required synchronization at the physical level. In SyncE, Ethernet links are synchronized by timing their bit clocks from high-quality, stratum-1-traceable clock signals in the same manner as SONET/SDH. Operations messages maintain SyncE links, and ensure a node always derives timing from the most reliable source. To view SyncE properties, choose Logical Inventory > Clock > SyncE. (See Figure 21-23.) Virtual CEM Tab CEM Interface Name Virtual CEM interface associated with the clock. Recovered Clock Entries Tab This tab appears if recovered entries exist. Transfer Type • In-band—The clocking information is sent over the same pseudowire as the bearer traffic. • Out-of-band—The clocking information is sent over a dedicated pseudowire between the sending and receiving SPAs. Clock ID Clock identifier, if known. Clock Mode Clock mode of the recovered clock: • Adaptive—The recovered clock was obtained using ACR. • Primary—The recovered clock was obtained from a clock with the highest priority. • Secondary—The recovered clock was obtained from a clock with a lower priority than the primary clock. Clock Status Status of the clock: • Acquiring—The clock is obtaining clocking information. • Acquired—The clock has obtained the required clocking information. • Holdover—The current primary clock is invalid and a holdover timer has started to check whether or not the clock becomes valid within the specified holdover time. CEM Group CEM group associated with the clock. CEM Group ID Identifier of the CEM group associated with the clock. CEM Interface Name Virtual CEM interface associated with the clock. Frequency Offset Offset to the clock frequency, in Hz. Table 21-24 Pseudowire Clock Recovery Properties (continued) Field Description 21-47 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 21 Monitoring MToP Services Network Clock Service Overview Figure 21-23 SyncE Properties in Logical Inventory Table 21-25 describes the information that is displayed for SyncE. Table 21-25 SyncE Properties Field Description Synchronous Mode Status of the automatic synchronization selection process: Enabled or Disable. Equipment Clock Ethernet Equipment Clock (EEC) options: EEC-Option I or EEC-Option II. Clock Mode Whether the clock is enabled or disabled for the Quality Level (QL) function: QL-Enabled or QL-Disabled. ESMC Ethernet Synchronization Message Channel (ESMC) status: Enabled or Disabled. SSM Option Synchronization Status Message (SSM) option being used: • ITU-T Option I • ITU-T Option II Generation 1 • ITU-T Option II Generation 2 Hold-off (global) Length of time (in milliseconds) to wait before issuing a protection response to a failure event. Wait-to-restore (global) Length of time (in seconds) to wait after a failure is fixed before the span returns to its original state. Revertive Whether the network clock is to use revertive mode: Yes or No. 21-48 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 21 Monitoring MToP Services Network Clock Service Overview SyncE Interfaces Table Interface Name Name of the Gigabit or 10 Gigabit interface associated with SyncE. If SyncE is not associated with a Gigabit or 10 Gigabit interface, this field contains Internal. Interface Hyperlinked entry to the interface routing information in the Routing Entity Controller window. For more information, see Viewing Routing Entities, page 19-32. This field does not apply for Internal interfaces. Mode Whether the interface is enabled or disabled for the QL function: QL-Enabled or QL-Disabled. Timing Port Priority Value used for selecting a SyncE interface for clocking if more than one interface is configured. Values are from 1 to 250, with 1 being the highest priority. QL Tx Actual Actual type of outgoing quality level information, depending on the globally configured SSM option: • ITU-T Option I—Available values are QL-PRC, QL-SSU-A, QL-SSU-B, QL-SEC, and QL-DNU. • ITU-T Option II Generation 1—Available values are QL-PRS, QL-STU, QL-ST2, QL-SMC, QL-ST4, and QL-DUS. • ITU-T Option II Generation 2—Available values are QL-PRS, QL-STU, QL-ST2, QL-TNC, QL-ST3, QL-SMC, QL-ST4, and QL-DUS. QL Tx Configured Configured type of outgoing quality level information, depending on the globally configured SSM option. See QL Tx Actual for the available values. QL Rx Actual Actual type of incoming quality level information, depending on the globally configured SSM option. See QL Tx Actual for the available values. QL Rx Configured Configured type of incoming quality level information, depending on the globally configured SSM option. See QL Tx Actual for the available values. Hold-Off Timer (msecs) Length of time (in milliseconds) to wait after a clock source goes down before removing the source. Wait-to-Restore (secs) Length of time (in seconds) to wait after a failure is fixed before the interface returns to its original state. Table 21-25 SyncE Properties (continued) Field Description 21-49 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 21 Monitoring MToP Services Network Clock Service Overview Applying a Network Clock Service Overlay A service overlay allows you to isolate the parts of a network that are being used by a particular service. This information can then be used for troubleshooting. For example, the overlay can highlight configuration or design problems when bottlenecks occur and all the site interlinks use the same link. To apply a network clock overlay: Step 1 In Prime Network Vision, display the network map on which you want to apply an overlay. Step 2 From the main toolbar, click Choose Overlay Type and choose Network Clock. The Select Network Clock Service Overlay dialog box is displayed. Step 3 Do one of the following: • Choose a search category, enter a search string, then click Go to narrow the search results to a range of network clock services or a specific network clock service. Search categories include: – Description – Name The search condition is “contains.” Search strings are case-insensitive. For example, if you choose the Name category and enter “net,” Prime Network Vision displays network clock services that have “net” in their names whether net appears at the beginning of the name, the middle, or at the end: for example, Ethernet. • Choose Show All to display all network clock services. Step 4 Select the network clock service overlay that you want to apply to the map. The elements and links used by the selected network clock are highlighted in the map, and the overlay name is displayed in the title of the window. (See Figure 21-24.) ESMC Tx Whether ESMC is enabled for outgoing QL information on the interface: Enabled, Disabled, or NA (Not Available). ESMC Rx Whether ESMC is enabled for incoming QL information on the interface: Enabled, Disabled, or NA (Not Available). SSM Tx Whether SSM is enabled for outgoing QL information on the interface: Enabled, Disabled, or NA (Not Available). SSM Rx Whether SSM is enabled for incoming QL information on the interface: Enabled, Disabled, or NA (Not Available). Table 21-25 SyncE Properties (continued) Field Description 21-50 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 21 Monitoring MToP Services Viewing CEM and Virtual CEM Properties Figure 21-24 Network Clock Service Overlay Example In addition, the elements configured for clocking service display a clock service icon as in the following example: Note An overlay is a snapshot taken at a specific point in time and does not reflect changes that occur in the service. As a result, the information in an overlay can become stale. To update the overlay, click Refresh Overlay in the main toolbar. Viewing CEM and Virtual CEM Properties The following topics describe how to view CEM and virtual CEM properties and interfaces: • Viewing CEM Interfaces, page 21-51 • Viewing Virtual CEMs, page 21-51 • Viewing CEM Groups, page 21-51 21-51 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 21 Monitoring MToP Services Viewing CEM and Virtual CEM Properties Viewing CEM Interfaces To view CEM interfaces: Step 1 In Prime Network Vision, double-click the required device. Step 2 In the inventory window, choose Physical Inventory > Chassis > slot > subslot > interface. The CEM interface name is displayed in the content pane as shown in Figure 21-25. Figure 21-25 CEM Interface Viewing Virtual CEMs To view virtual CEMs, choose Logical Inventory > Clock > Pseudowire Clock Recovery. The virtual CEM interfaces are listed in the Virtual CEM tab. Viewing CEM Groups CEM groups can be configured on physical or virtual CEM interfaces. The underlying interface determines where you view CEM group properties in Prime Network Vision: • Viewing CEM Groups on Physical Interfaces, page 21-52 • Viewing CEM Groups on Virtual CEM Interfaces, page 21-53 21-52 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 21 Monitoring MToP Services Viewing CEM and Virtual CEM Properties Viewing CEM Groups on Physical Interfaces When you configure a CEM group on a physical interface, the CEM group properties are displayed in physical inventory for that interface. To view CEM groups configured on physical interfaces: Step 1 In Prime Network Vision, double-click the required device. Step 2 In the inventory window, choose Physical Inventory > Chassis > slot > subslot > interface. The CEM group information is displayed in the content pane with other interface properties (Figure 21-26). Figure 21-26 CEM Group Information See Table 21-22 for a description of the properties displayed for CEM groups in the content pane. Step 3 To view additional information, double-click the required group. The CEM Group Properties window is displayed as shown in Figure 21-27. 21-53 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 21 Monitoring MToP Services Viewing CEM and Virtual CEM Properties Figure 21-27 CEM Group Properties Window See Table 19-30 on page 19-54 for the properties displayed in the Pseudowire table in the CEM Group Properties window. Viewing CEM Groups on Virtual CEM Interfaces When you configure a CEM group on a virtual CEM, the CEM group information is displayed below the virtual CEM in logical inventory. To view CEM groups on virtual CEM interfaces: Step 1 In Prime Network Vision, right-click the required device, then choose Inventory. Step 2 In the inventory window, choose Logical Inventory > Clock > Pseudowire Clock Recovery. Step 3 In the Virtual CEM tab, right-click the CEM interface name and choose Properties. The CEM group properties are displayed in a separate window (Figure 21-28). If a pseudowire is configured on the CEM group for out-of-band clocking, the pseudowire VCID is also shown. 21-54 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 21 Monitoring MToP Services Using SONET Configure, Clear, and Show Commands Figure 21-28 CEM Group Properties Step 4 To view additional CEM group properties, double-click the required CEM group. Table 21-23 describes the information displayed in the CEM Group Properties window. Using SONET Configure, Clear, and Show Commands The following commands can be launched from the inventory by right-clicking a SONET port and selecting Commands > SONET. Before executing any commands, you can preview them and view the results. If desired, you can also schedule the commands. To find out if a device supports these commands, see the Cisco Prime Network 3.10 Supported Cisco VNEs. Note You might be prompted to enter your device access credentials while executing a command. Once you have entered them, these credentials will be used for every subsequent execution of a command in the same GUI client session. If you want to change the credentials, click Edit Credentials. Edit Credentials button will not be available for SNMP commands or if the command is scheduled for a later time. 21-55 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 21 Monitoring MToP Services Using SONET Configure, Clear, and Show Commands Table 21-26 SONET Commands Command Input Required and Notes Show > BER Threshold N/A; performed from command launch point Show > Controller Data N/A; performed from command launch point Show > TCA Threshold N/A; performed from command launch point Show > PM > Line Counters Line type: farendline, farendline-history, line, or line-history History interval: 1-96; to view all, enter 0 Show > PM > Medium Counters N/A; performed from command launch point Show > PM > Path Counters Path type: farendpath, farendpath-history, path, path-history Channelized path index: 1-48 (for a particular channel) or 0 (for all channels) History interval: 1-96; to view all, enter 0 Show > PM > Section Counters Section type: section or section-history History interval: 1-96; to view all, enter 0 Show > PM > Trace Details Card location (for example, 0/5/CPU0) Note The device must be managed by Prime Network with device admin privileges. Clear > SONET > SDH Counters N/A; performed from command launch point Configure > BER Threshold BER threshold: • sf-ber—Sets the signal failure BER threshold. Value in the range from 3 to 9. The default value is 6 • sd-ber—Sets the signal degrade BER threshold. Value in the range from 3 through 9. The default value is 3 Bit error rate: 3-9, or default. The default for sf-ber is 3, and the default for sd-ber is 9. Configure > Clock Source Clock source of sent signal on SONET ports: • internal—Controller will clock its sent data using internal clock. • line—Controller will clock its sent data using the clock recovered from the line’s receive data stream. • default—Cancels any clock source setting. Configure > TCA Threshold TCA threshold: • b1-tca—Threshold for B1 BER TCA, between 3-9 (default is 6). • b2-tca—Threshold for B2 BER TCA, between 3-9 (default is 6). Bit error rate: Value from 3-9 (10 to the negative x), or default. 21-56 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 21 Monitoring MToP Services Using SONET Configure, Clear, and Show Commands CHAPTER 22-1 Cisco Prime Network 3.10 User Guide OL-28065-01 22 Viewing and Managing SBCs This chapter identifies and describes the properties for Session Border Controllers (SBCs) that appear in Cisco Prime Network Vision (Prime Network Vision) logical inventory. It also describes commands you can run to manage SBCs. Session Border Controllers (SBCs) control and manage real-time multimedia traffic flows between IP network borders, handling signaling, and media. SBCs perform native IP interconnection functions required for real-time communications such as admission control, firewall traversal, accounting, signaling interworking, and quality-of-service (QoS) management. This includes: • Protocol and media interworking • Session routing • Hosted Network Address Translation (NAT) and firewall traversal • Security and AAA • Intra- and inter-VPN interconnections and optimization • Media transcoding with an external media server The Cisco Prime Network platform provides fault management, configuration, and performance monitoring for SBC services. Prime Network SBC commands allow you to configure SBC components. An SBC consists of combined DBE and SBE functionality: • Data Border Element (DBE)—Responsible for media-related functions. • Signaling Border Element (SBE)—Responsible for call signaling-related functions. In addition, the SBC can operate in the following deployment models: • Distributed Model (DM)—Contains only the SBE or DBE, resulting in a distributed SBC. • Unified Model (UM)—Contains both the SBE and DBE, thereby implementing the SBE and DBE as a single device. Note The existing Cisco SBC platforms support only DBE. The following topics describe the SBC properties that are displayed in Prime Network Vision logical inventory: • User Roles Required to View SBC Properties, page 22-2 • Viewing SBC Properties in Logical Inventory, page 22-3 • Viewing SBC DBE Properties, page 22-5 • Viewing SBC SBE Properties, page 22-6 22-2 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 22 Viewing and Managing SBCs User Roles Required to View SBC Properties • SBC Configuration and Monitoring Commands, page 22-14 • SBC Show Commands, page 22-39 User Roles Required to View SBC Properties This topic identifies the GUI default permission or scope security level that is required to view SBC properties in Prime Network Vision. Prime Network determines whether you are authorized to perform a task as follows: • For GUI-based tasks (tasks that do not affect elements), authorization is based on the default permission that is assigned to your user account. • For element-based tasks (tasks that do affect elements), authorization is based on the default permission that is assigned to your account. That is, whether the element is in one of your assigned scopes and whether you meet the minimum security level for that scope. For more information on user authorization, see the Cisco Prime Network 3.10 Administrator Guide. The following tables identify the tasks that you can perform: • Table 22-1 identifies the tasks that you can perform if a selected element is not in one of your assigned scopes. • Table 22-2 identifies the tasks that you can perform if a selected element is in one of your assigned scopes. By default, users with the Administrator role have access to all managed elements. To change the Administrator user scope, see the topic on device scopes in the Cisco Prime Network 3.10 Administrator Guide. Table 22-1 Default Permission/Security Level Required for Viewing SBC Properties - Element Not in User’s Scope Task Viewer Operator OperatorPlus Configurator Administrator Viewing SBC properties ——— — X Using SBC Configuration and Monitoring Commands ——— X X Using SBC Show Commands ——— X X Table 22-2 Default Permission/Security Level Required for Viewing SBC Properties - Element in User’s Scope Task Viewer Operator OperatorPlus Configurator Administrator Viewing SBC properties XXX X X 22-3 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 22 Viewing and Managing SBCs Viewing SBC Properties in Logical Inventory Viewing SBC Properties in Logical Inventory To view SBC properties in Prime Network Vision logical inventory, right-click the element configured for SBC, then choose Inventory > Logical Inventory > Session Border Controller. The SBC properties are displayed as shown in Figure 22-1. Using SBC Configuration and Monitoring Commands ——— X X Using SBC Show Commands ——— X X Table 22-2 Default Permission/Security Level Required for Viewing SBC Properties - Element in User’s Scope (continued) Task Viewer Operator OperatorPlus Configurator Administrator 22-4 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 22 Viewing and Managing SBCs Viewing SBC Properties in Logical Inventory Figure 22-1 SBC Properties in Logical Inventory Table 22-3 describes the general SBC properties displayed in logical inventory. Table 22-3 SBC Properties Field Description Process Process name, such as Session Border Controller. Process Status Status of the process, such as Running. Application Version SBC version number. Mode Mode in which the SBC is operating: • Unified • Distributed DBE SBC Service Name Name of the service. 22-5 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 22 Viewing and Managing SBCs Viewing SBC DBE Properties Viewing SBC DBE Properties The DBE controls media packet access to the network, provides differentiated services and QoS for different media streams, and prevents service theft. To view SBC DBE properties, choose Logical Inventory > Session Border Controller > DBE. Table 22-4 describes the DBE properties that appear in logical inventory. Viewing Media Address Properties A DBE uses a pool of sequential IPv4 media addresses as local media addresses. To view SBC media address properties, choose Logical Inventory > Session Border Controller > DBE > Media Address. Table 22-5 describes the SBC media address properties that are displayed in logical inventory. Viewing VDBE H.248 Properties To view VDBE H.248 properties, choose Logical Inventory > Session Border Controller > DBE > VDBE. Table 22-6 describes the VDBE H.248 properties that are displayed in logical inventory. Table 22-4 SBC DBE Properties Field Description Process Process name, such as DBE. Process Status Status of the process, such as Running. Name Name assigned to the DBE. Type Type of DBE, either DBE or virtual DBE (vDBE). DBE Location Id Unique identifier configured on each vDBE within a UM DBE. Table 22-5 Media Address Properties Field Description Address Range IP addresses defined for the pool. Port Range Lower Lower end of the port range for the interface. If no range is specified, all possible Voice over IP (VoIP) port numbers are valid. Port Range Upper Upper end of the port range for the interface. VRF Name VRF that the interface is assigned to. Service Class Class of service (CoS) for each port range, such as fax, signaling, voice, or any. 22-6 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 22 Viewing and Managing SBCs Viewing SBC SBE Properties Viewing SBC SBE Properties The SBE controls the access of VoIP signaling messages to the network core and manipulates the contents of these messages. It does this by acting as a SIP B2BUA or H.323 gateway. To view SBC SBE properties, choose Logical Inventory > Session Border Controller > SBE. Table 22-7 describes the information displayed in logical inventory for an SBE. Table 22-6 VDBE H.248 Properties Branch Description H248 Controller H.248 controller used by the DBE. The Media Gateway Configuration (MGC) table displays the following information: • Index—The number of the H.248 controller. The profile is used to interoperate with the SBE. • Remote IP—The remote IP address for the H.248 controller. • Remote Port—The remote port for the H.248 controller. • Transport—The transport for communications with the remote device. H248 Interface The SBC H248 Control Interface table displays the following information: • IP Address: – In DM mode, the local IP address of the DBE used to connect to the SBE. – In UM mode, the local IP address used to connect to the media gateway. • Port—The port for the H.248 controller interface. • Transport—The transport the H.248 controller interface uses. • Association—The relationship between the SBE and the media gateway. Table 22-7 SBC SBE Properties Field Description Process Name of the process, such as SBE. Process Status Status of the process, such as Running or Idle. Name Name assigned to this SBE. Call Redirect Limit Maximum number of times a call is redirected before the call is declared failed. The range is 0 to 100 with a default of 2. On Hold Timeout Amount of time, in milliseconds, that the SBE waits after receiving a media timeout notification from the DBE for an on-hold call before tearing down the call. 22-7 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 22 Viewing and Managing SBCs Viewing SBC SBE Properties Viewing AAA Properties For devices that support local and remote billing, the SBC can send billing records to a AAA server using the RADIUS protocol. To view AAA properties, choose Logical Inventory > Session Border Controller > SBE > AAA. Table 22-8 describes the AAA properties that appear in logical inventory for the SBC SBE. Viewing H.248 Properties The H.248 interface is used for signaling between an SBE and a DBE in distributed mode and between an SBE and a transcoding media gateway. The SBE or SBC acts as an H.248 MGC, and the transcoding device acts as an H.248 media gateway. The connection between the MGC and the media gateway is an H.248 link. To view H.248 properties, choose Logical Inventory > Session Border Controller > H248. Table 22-9 describes the H.248 properties that appear in logical inventory for the SBC SBE. Table 22-8 AAA Properties Branch Description AAA Interface The SBE AAA Interface table displays the following information: • AAA Address—The local AAA interface address. • Network ID—A unique identifier for the SBE. Accounting The Accounting Radius Client table displays the following information: • Name—The name of the accounting client. • Client Type—The type of client, either Accounting or Authentication. Authentication The Authentication Radius Client table displays the following information: • Name—The name of the authentication client. • Client Type—The type of client, either Accounting or Authentication. Billing The SBE Billing table displays the following information related to billing: • LDR Check Time—The time of day (local time) to run the long duration record check. • Local Billing Address—The local IP address for SBE billing. This IP address can be different from the local AAA IP address and is the IP address written in the bill records. • Admin Status—The configuration status, available with the running-config command. • Operational Status—The running status, available from the CLI. This entry indicates whether or not the billing interface is up. The status is derived from the interworking of the SBC and the AAA server. 22-8 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 22 Viewing and Managing SBCs Viewing SBC SBE Properties Viewing Policy Properties An SBC policy is a set of rules that define how the SBC treats different kinds of VoIP events. An SBC policy allows control of the VoIP signaling and media that pass through the SBC at an application level. A policy set is a group of policies that can be active on the SBC at any one time. If a policy set is active, the SBC uses the rules defined within it to apply policy to events. Multiple policies can be set on a single SBC. To view policy properties, choose Logical Inventory > Session Border Controller > Policy. Table 22-10 describes the policy properties that appear in logical inventory for the SBC SBE. Table 22-9 H.248 Properties Branch Description H248 Interface The SBC H248 Control Interface table displays the following information: • IP Address: – In DM mode, the IP address used to connect the DBE and the MGC. – In UM mode, the IP address used to connect the SBC and the media gateway. • Port—The port for the H.248 controller interface. • Transport—The transport the H.248 controller interface uses. • Association—The relationship between the SBE and the media gateway. Media Gateway The Media Gateway table displays the following information: • IP Address—The IP address of the media gateway. • Codec List—A comma-separated list of the codecs supported. 22-9 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 22 Viewing and Managing SBCs Viewing SBC SBE Properties Table 22-10 Policy Properties Branch Description Blacklist The Blacklists table contains the following information: • Name—The blacklist name. • Type—The type of source that this blacklist applies to, such as critical or normal. CAC Policy A Call Admission Control (CAC) policy is used to define admission control. The SBE CAC Policy Set table contains the following information: • Policy Set Number—An identifying number the SBE has assigned to the policy set. • First Table—A CAC policy table. • Status—Whether the policy is active or inactive. If the policy is active, the SBC applies the defined rules to events. • First CAC Scope—The scale that the CAC applies for, such as source adjacency or destination adjacency. This is the first CAC table used for CAC policy match. • Description—A brief description of the policy set. Call Policy A call policy set is used for number analysis and routing. The SBE Call Policy Set table contains the following information: • Policy Set Number—An identifying number the SBE has assigned to the policy set. • Status—Whether the policy is active or inactive. If the policy is active, the SBC applies the defined rules to events. • First Call Table—The first call table used for call policy match. • Description—A brief description of the policy set. Codec List The SBE Codec List table contains the following information: • Name—The name of the codec list. • Codecs—The codecs contained in each list. 22-10 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 22 Viewing and Managing SBCs Viewing SBC SBE Properties Current Blacklisting The Current Blacklistings table contains the following information: • Type—The type of source this blacklist applies to. Blacklists are used to block certain VoIP services that meet specified conditions. • Event Type—The type of event this blacklist applies to, such as CORRUPT_MESSAGE. • Is All Source Addresses—Whether the blacklist applies to all source IP addresses: – True—Ignore any IP address in the Source Address field. – False—Use the IP address in the Source Address field. • Source Address—The IP address that this blacklist applies to. • Source Port Number—The port number that this blacklist applies to. • Source Port Type—The type of port this blacklist applies to. All is a valid entry. • Time Remaining—The amount of time, in hours, minutes, or seconds, before the blacklist is removed. Hunting Trigger The hunting trigger enables the SBC to search for other routes or destination adjacencies if an existing route fails. The Global Hunting Trigger List table contains the following information: • Hunting Mode—Indicates the protocol to use to search for routes, such as Session Initiation Protocol (SIP). • Hunting Triggers—The SIP responses, such as 468 or 503, that indicate the SBC is to search for an alternate route or destination adjacency. SIP responses are defined in RFC3261. Table 22-10 Policy Properties (continued) Branch Description 22-11 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 22 Viewing and Managing SBCs Viewing SBC SBE Properties QoS Profile QoS profiles can be used by CAC policies and are used exclusively for marking IP packets. The QoS Profile table contains the following information: • Name—The name of the QoS profile. • Class of Service—The type of call this profile applies to, such as voice, video, signaling, or fax. • Marking Type—The type of marking to be applied to the IP packet. Options include Passthrough, Differentiated Service Code Point (DSCP), and IP Precedence/ToS. • IP Precedence—If the marking type is IP Precedence, the specified precedence, either 0 or 1. • ToS—If the marking type is ToS, the ToS value. • DSCP—If the marking type is DSCP, the DSCP value. SDP The Session Description Protocol (SDP) content pane contains the following tabs, each with their respective table: • SBE SDP Policy Table: – Instance Name—The name of the policy table. – SBE SDP Match Table—The name of the SDP match table. • SBE SDP Match Table: – Instance Name—The name of the SDP match table. – Match Strings—The match criteria. – Table Type—The type of table, either Blacklist or Whitelist. Table 22-10 Policy Properties (continued) Branch Description 22-12 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 22 Viewing and Managing SBCs Viewing SBC SBE Properties Viewing SIP Properties To view SIP properties, choose Logical Inventory > Session Border Controller > SIP. Table 22-11 describes the SIP entries that appear in logical inventory for the SBC SBE. Table 22-11 SIP Properties Branch Description SIP Account The SBE Account table contains the following information: • Name—The name of the account associated with the adjacencies. • Adjacencies—The identified adjacencies. SIP Adjacency An adjacency represents a signaling relationship with a remote call agent. One adjacency is defined per external call agent. Each adjacency belongs within an account. Each incoming call is matched to an adjacency, and each outgoing call is routed out over a second adjacency. The SBC SIP Adjacencies table contains the following information: • Name—The adjacency name. • Status—The status of the adjacency, either Attached or Detached. • Signaling Address—The local IP address and port (optional) for communications. • Signaling Peer—The remote IP address and port (optional) for communications. • Description—A brief description of the adjacency. SIP Adjacency Group The Adjacencies Groups table contains the following information: • Name—The name of the SIP adjacency group. • Adjacencies—The adjacencies that belong to the group. SIP Profile The SBC can be configured with whitelist and blacklists profiles on SIP messages. The following types of SIP profiles are available: • Header profile—A profile based on SIP header information. • Method profile—A profile based on SIP method strings. • Option profile—A profile based on SIP option strings. • Parameter profile—A profile based on SIP parameters. SIP Profile > Header Profile The SIP Header Profiles table contains the following information: • Name—The name of the SIP header profile. • Status—Whether or not the profile is in use. • Profile Type—The type of profile: – Whitelist—Accepts SIP requests that match the profile. – Blacklist—Rejects SIP requests that match the profile. • Description—A brief description of the profile. 22-13 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 22 Viewing and Managing SBCs Viewing SBC SBE Properties SIP Profile > Method Profile The SIP Method Profiles table contains the following information: • Name—The name of the SIP method profile. • Status—Whether or not the profile is in use. • Profile Type—The type of profile: – Whitelist—Accepts SIP requests that match the profile. – Blacklist—Rejects SIP requests that match the profile. • Description—A brief description of the profile. • Is Passthrough—Whether or not passthrough is enabled: – True—Permits message bodies to be passed through for nonvital methods that match this profile. – False—Strips the message body out of any nonvital SIP messages that match this profile. SIP Profile > Option Profile The SIP Option Profiles table contains the following information: • Name—The name of the SIP option profile. • Status—Whether or not the profile is in use. • Profile Type—The type of profile: – Whitelist—Accepts SIP requests that match the profile. – Blacklist—Rejects SIP requests that match the profile. • Description—A brief description of the profile. • Options—The SIP option strings that define this profile, such as host user-agent, refer redirect, or replaces. Table 22-11 SIP Properties (continued) Branch Description 22-14 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 22 Viewing and Managing SBCs SBC Configuration and Monitoring Commands SBC Configuration and Monitoring Commands The following commands can be launched from the inventory by right-clicking the appropriate node and selecting Commands. Before executing any commands, you can preview them and view the results. If desired, you can also schedule the commands. To find out if a device supports these commands, see the Cisco Prime Network 3.10 Supported Cisco VNEs. Note You might be prompted to enter your device access credentials while executing a command. Once you have entered them, these credentials will be used for every subsequent execution of a command in the same GUI client session. If you want to change the credentials, click Edit Credentials. Edit Credentials button will not be available for SNMP commands or if the command is scheduled for a later time. SIP Profile > Parameter Profile The SIP Parameter Profiles table contains the following information: • Name—The name of the SIP parameter profile. • Status—Whether or not the profile is in use. • Description—A brief description of the profile. SIP Timer The SBE SIP Timer table contains the following information: • TCP Connect Timeout—The time, in milliseconds, that the SBC waits for a SIP TCP connection to a remote peer to complete before failing that connection. The default is 1000 milliseconds. • TCP Idle Timeout—The minimum time, in milliseconds, that a TCP socket does not process any traffic before it closes the connection. The default is 120000 milliseconds (2 minutes). • TLS Idle Timeout—The minimum time, in milliseconds, that a Transport Layer Security (TLS) socket does not process traffic before it closes the connection. • Invite Timeout—The time, in seconds, that the SBC waits for a final response to an outbound SIP invite request. The default is 180 seconds. If no response is received during that time, an internal request timeout response is generated and returned to the caller. • UDP First Retransmit Interval—The time, in milliseconds, that the SBC waits for a UDP response or ACK before sending the first retransmission of a signal. The default value is 500 milliseconds. • UDP Max Retransmit Interval—The maximum time interval, in milliseconds, for an SBC to retransmit a signal. The maximum retransmission interval is 4000 milliseconds (4 seconds). • UDP Response Linger Period—The time, in milliseconds, for which the SBC retains negative UDP responses to invite requests. The default value is 32000 milliseconds (32 seconds). Table 22-11 SIP Properties (continued) Branch Description 22-15 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 22 Viewing and Managing SBCs SBC Configuration and Monitoring Commands Commands are described in these topics: • Add, Update, and Delete SBC Components, page 22-15 • SBC Show Commands, page 22-39 Note In the GUI, parameters that are displayed in bold text are mandatory. Add, Update, and Delete SBC Components You can configure the following SBC components using the commands described in this section. • SIP Adjacencies, page 22-15 • SIP Header Profiles, page 22-20 • SIP Option Profiles, page 22-24 • Blacklists, page 22-26 • CAC Policies, page 22-28 • Call Policies, page 22-32 • Codec Lists, page 22-36 • Media Addresses, page 22-37 • Qos Profiles, page 22-38 SIP Adjacencies • Add and Update SIP Adjacencies, page 22-15 • Add, Update, Delete an Outbound Authentican Realm in a SIP Adjacency, page 22-19 • Delete a SIP Adjacency, page 22-20 Add and Update SIP Adjacencies Use this procedure to add an SIP adjacency or update an existing SIP adjacency. Step 1 In the inventory window, expand the Logical Inventory tree and expand the Session Border Controller node. Step 2 Do one of the following: • To add a new SIP Adjacency, right-click the SBC node and choose Commands > Add > SIP Adjacency. The SIP Adjacency dialog box opens. • To update an existing SIP Adjacency, right-click the adjacency instance in the SIP Adjacencies window and select Commands > Update > SIP Adjacency. (To open the appropriate window, expand the SBE node, SIP node, and SIP Adjacency node.) • To update an existing SIP Adjacency, right-click the adjacency instance in the SIP Adjacencies window and select Commands > Delete > SIP Adjacency. (To open the appropriate window, expand the SBE node, SIP node, and SIP Adjacency node.) Confirm your choice. Step 3 Enter or update the values for the following parameters. 22-16 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 22 Viewing and Managing SBCs SBC Configuration and Monitoring Commands Step 4 Click the Registration tab. Enter values for the following parameters. Step 5 Click the Signalling Property tab. Enter values for the following parameters. Input Parameter Description Name The SIP adjacency name. This parameter is mandatory. Description The SIP adjacency description. Signaling Address The local IPv4 signaling address of the SIP adjacency. This parameter is mandatory. Signaling Port The local port of signaling address of the SIP adjacency. The range is from 1 to 65535; the default is 5060. Signaling Peer The remote signaling peer of the SIP adjacency. This parameter is mandatory. Signaling Peer Port The remote signaling peer’s port of the SIP adjacency. The range is from 1 to 65535; the default is 5060. Remote Address The set of remote signaling peers that can be contacted over the adjacency with the specified IP address prefix. This parameter is mandatory. Preferred Transport The preferred transport protocol for SIP signaling on the adjacency. Vrf The value used to configure the SIP adjacency for a specific VPN. The adjacency receives incoming signaling from this VPN only. The adjacency’s outgoing signaling is routed in the relevant Virtual Routing and Forwarding (VRF) table. Adjacency group The adjacency group of the SIP adjacency. The maximum size is 32 characters. Adjacency Account The SIP adjacency account on an SBE. Attach This Adjacency Check this check box to attach the adjacency to an account on an SBE. Input Parameter Description Enable Faster Register Enables or disables fast-path register support on the SIP adjacency. Faster Register Interval The fast-path register interval, in seconds. Register Minimum Expiry The minimum registration period on the SIP adjacency, in seconds. The default is 3000 seconds. Registration Target Address The address to be used when an outbound SIP register request rewriting occurs. Registration Target Port The port to be used when an outbound SIP register request rewriting occurs. Registration Rewrite Register Enables or disables the SIP register request rewriting. 22-17 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 22 Viewing and Managing SBCs SBC Configuration and Monitoring Commands Step 6 Click the SIP Profile tab. Enter values for the following parameters. Input Parameters Description Hold Media Timeout The amount of time an SBE waits after receiving a media timeout notification from the DBE for an on-hold call before tearing that call down. The time is in milliseconds; the default value is 0. Redirect Mode Configures the behavior of the session border controller upon receipt of a 3xx response to an invitation from the SIP adjacency. Values are: • pass-through—Passes all 3xx responses back to the caller. • recurse—On 300, 301, 302, and 305 invite responses, the session border controller resends the invitation to the first listed contact address, or returns the 3xx response. Redirect Limit The maximum number of redirections that the session border controller performs on a call. The range is from 0 to 200 redirections; the default is 2. NAT Force On Enables NAT assuming. Passthrough From Header Enables the From header rewriting. Passthrough To Header Enables the To header rewriting. Force Signaling Peer Enables forcing the SIP message to go to the configured signaling peer. SIP-I Passthrough Enables a SIP adjacency for SIP-I pass-through. Outbound Flood Rate The maximum desired rate of outbound request signals on the adjacency, excluding ACK/PRACK requests. The value is in signals per second. Hunting Trigger The failure return codes to trigger hunting for the adjacency. Media Bypass The SIP adjacency to allow media traffic to bypass the DBE. Security The transport-level security to use on a SIP adjacency. Values are: • untrusted—(Default) The adjacency is not secure. • trusted-encrypted—Encrypted signaling is used to ensure security on the adjacency. • untrusted-encrypted—The adjacency is untrusted and uses SSL/TLS encryption. • trusted-unencrypted—A nonencryption mechanism is used to guarantee secure signaling for all messages on the adjacency. Local Id Host The local identity name—such as a DNS name—to present on outbound SIP messages. Resource Priority Set The name of the resource priority set used with the specified SIP adjacency. Input Parameters Description Inbound Method Profile The name of the inbound method profile. Outbound Method Profile The name of the outbound method profile. Inbound Header Profile The name of the inbound header profile. Outbound Header Profile The name of the outbound header profile. 22-18 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 22 Viewing and Managing SBCs SBC Configuration and Monitoring Commands Step 7 Click the Authentication tab. Enter values for the following parameters. Step 8 Click the UAS Failure Detection tab. Enter values for the following parameters. Step 9 Click the P-CSCF tab. Enter values for the following parameters. Proxy Inbound Option Profile The name of the inbound proxy header profile for white/blacklisting options. Proxy Outbound Option Profile The name of the outbound proxy header profile for white/blacklisting options. UA Inbound Option Profile The name of the inbound UA header profile for white/blacklisting options. UA Outbound Option Profile The name of the outbound UA header profile for white/blacklisting options. Input Parameter Description Authentication Realm Inbound The domain name of inbound authentication realm. Authentication Mode Configures the authentication mode for a SIP adjacency. Authentication Nonce Timeout The authentication nonce timeout value, in seconds. The range is from 0 to 65535 seconds; the default is 300 seconds. Note Nonce is a hash value used to authenticate the user. Input Parameters Description Enable Ping Configures the adjacency to: • Poll its remote peer by sending SIP OPTIONS pings to it. • Enter the ping option submode. The default value is disabled. Ping Interval The interval between SIP OPTIONS pings that are sent to the remote peer. The range is from 1 to 2147483 seconds; the default is 32 seconds. Ping Fail Count The number of consecutive pings that must fail before the adjacency peer is deemed to be unavailable. The range is from 1 to 4294967295; the default value is 3. Ping Life Time The duration for which the session border controller waits for a response to an options ping for the adjacency. The default is 32 seconds. Input Parameters Description 22-19 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 22 Viewing and Managing SBCs SBC Configuration and Monitoring Commands Step 10 Click the IBCF tab. Enter values for the following parameters. Step 11 Preview, schedule, or execute the command. Add, Update, Delete an Outbound Authentican Realm in a SIP Adjacency Use the Add Sip Adjacency Outbound AuthRealm command to add a SIP adjacency outbound authentication realm. Step 1 In the inventory window, expand the Logical Inventory tree and expand the Session Border Controller node. Step 2 Expand the SBE node and the SIP node, and click the Sip Adjacency node. Input Parameter Description Global SIP Inherit Profile Configures the Proxy-Call Session Control Function (P-CSCF) access inherit profile as the global profile. Values are: • preset-access—Specifies a preset access profile. • preset-core—(Default) Specifies a preset core profile. • preset-ibcf-ext-untrusted—Specifies a preset Interconnection Border Control Function (IBFC) external untrusted profile. • preset-ibcf-external—Specifies a preset IBCF external profile. • preset-ibcf-internal—Specifies a preset IBCF internal profile. • preset-p-cscf-access—Specifies a preset P-CSCF-access profile. • preset-p-cscf-core—Specifies a preset P-CSCF-core profile. • preset-peering—Specifies a preset peering profile. • preset-standard-non-ims—Specified a preset standard non-Information Management System (IMS) profile. SIP Adjacency Inherit Profile Configures the SIP adjacency to use the P-CSCF access profile. Visited Network Identifier The network name of the SIP adjacency. Input Parameter Description Global SIP Home Network Identifier The specified domain name as the global home network identifier for use in all SIP IBCF adjacencies. Global SIP Encryption Key The global encryption key for all SIP IBCF adjacencies. SIP Adjacency Inherit Profile Specifies a preset IBCF internal profile. SIP Adjacency Encryption Key The encryption key on the SIP IBCF adjacency. Sip Adjacency Home Network Identifier The home network identifier on an IBCF adjacency. 22-20 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 22 Viewing and Managing SBCs SBC Configuration and Monitoring Commands Step 3 Do one of the following: • To add a new realm, in the SIP Adjacencies window, right-click the SIP adjacency instance and choose Commands > Add > SIP Adjacency Outbound AuthRealm. The SIP Adjacency Outbound AuthRealm dialog box opens. • To update an existing realm, right-click the adjacency instance in the SIP Adjacencies window and select Commands > Update > SIP Adjacency Outbound AuthRealm. (To open the appropriate window, expand the SBE node, SIP node, and SIP Adjacency node.) • To delete an existing realm, right-click the adjacency instance in the SIP Adjacencies window and select Commands > Delete > Adjacency Outbound AuthRealm. (To open the appropriate window, expand the SBE node, SIP node, and SIP Adjacency node.) Confirm your choice. Step 4 By default, the General tab is selected. Enter values for the following parameters. Step 5 Preview, schedule, or execute the command. Delete a SIP Adjacency Step 1 In the inventory window, expand the Logical Inventory tree and expand the Session Border Controller node. Step 2 Expand the SBE node and the SIP node, and click the SIP Adjacency node. Step 3 In the SIP Adjacencies window, right-click a SIP adjacency and choose Commands > Delete > SIP Adjacency. Step 4 Enter the name of the SIP adjacency that you want to delete. Step 5 Preview, schedule, or execute the command. SIP Header Profiles Add, Update, Delete a SIP Header Profile Use the Add SIP Header Profile command to add a SIP header profile. Note When you add a new SIP header profile, you can add three headers to it. You can add more headers to the new SIP header profile after it is discovered. Input Parameter Description Domain The domain name for which the authentication credentials are valid. Username The username that identifies the SBC in the specified domain. Password The password to authenticate the username in the specified domain. 22-21 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 22 Viewing and Managing SBCs SBC Configuration and Monitoring Commands Step 1 In the inventory window, expand the Logical Inventory tree and expand the Session Border Controller node. Step 2 Do one of the following: • To create a new SIP Header Profile, right-click the SBE node and choose Commands > Add > SIP Header Profile. The SIP Header Profiles dialog box opens. • To update an existing SIP Header Profile, right-click the profile in the SIP Header Profiles window and select Commands > Update > SIP Header Profile. (To open the SIP Headers Profile window, expand the SBE node, SIP node, and SIP Profile node, then click the Header Profile node.) • To delete an existing SIP Header Profile, right-click the profile in the SIP Header Profiles window and select Commands > Delete > SIP Header Profile. (To open the SIP Headers Profile window, follow the navigation in the previous bullet.) Confirm your choice. Step 3 Enter or edit the values for the following parameters. Step 4 Click the Header 1 tab. Enter values for the following parameters. Note These values cannot be updated. Step 5 Preview, schedule, or execute the command. Input Parameter Description Name The name of the SIP header profile. Description The description of the SIP header profile. Profile Type The type of SIP header profile. Values are: • Whitelist • Blacklist Input Parameter Description Header Name The header name that is included in this header profile. Entry Number The entry number for the header. Action Type The action type of the entry. Action Value The action value for the action type. Condition Type The condition type. Condition Header Name Compares the content of a different header name. Condition Content Compares the content of the header. Condition Operator The operator for the condition content comparison. Condition Value The value used for comparing the condition content. Parameter Profile The parameter profile used by the header entry. 22-22 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 22 Viewing and Managing SBCs SBC Configuration and Monitoring Commands Add or Delete a Header from an Existing SIP Header Profile Use the Add Header command to add a header to an existing header profile. Step 1 In the inventory window, expand the Logical Inventory tree and expand the Session Border Controller node. Step 2 Expand the SBE node, IP node, and SIP Profile node, and click the Header Profile node. The SIP Header Profiles window opens. Step 3 Do one of the following: • To add a new header, in the SIP Header Profiles window, right-click the SIP header profile instance and choose Commands > Add > SIP Header Profile Header. The SIP Header Profile Header dialog box opens. • To delete a header from a header profile, in the header profile properties window, right-click the header you want to remove and choose Commands > Delete > SIP Header Profile Header. (To open the appropriate window, double-click the header profile instance to open the properties window.) Confirm your choice. Step 4 By default, the General tab is selected. Enter values for the following parameters. Step 5 Preview, schedule, or execute the command. Add, Update, Delete an Entry in a SIP Header Profile Use the Add SIP Header Profile Entry command to add an entry to an existing SIP header profile header. Step 1 In the inventory window, expand the Logical Inventory tree and expand the Session Border Controller node. Input Parameter Description Header Name The header name that is included in the header profile. Entry Number The entry number for the header. Action Type The action type of the entry. Action Value The action value for the action type. Condition Type The condition type. Condition Header Name Compares the content of different header names. Condition Content Compares the content of the header. Condition Operator The operator for the condition content comparison. Condition Value The value used for comparing the condition content. Parameter Profile The parameter profile used by the header entry. 22-23 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 22 Viewing and Managing SBCs SBC Configuration and Monitoring Commands Step 2 Do one of the following: • To create a new SIP Header Profile, right-click the SBE node and choose Commands > Add > SIP Header Profile Entry. The SIP Header Profile Entry dialog box opens. • To update an existing SIP Header Profile entry, right-click an entry in the SIP Header Profile Header Properties window and select Commands > Update > SIP Header Profile. Entry. (To open the appropriate window, expand the SBE node, SIP node, and SIP Profile node, and click the Header Profile node. In the SIP Header Profiles window, double-click a header profile, then double-click a header.) • To delete an entry, right-click an entry in the SIP Header Profile Header Properties window and select Commands > Delete > SIP Header Profile. Entry. (To get to the correct window, follow the same navigation as the previous bullet.) Confirm your choice. Step 3 By default, the General tab is selected. Enter values for the following parameters. Step 4 Preview, schedule, or execute the command. Adding a Condition to a SIP Header Profile Header Entry Use the Add SIP Header Profile Condition command to add a condition to a SIP header profile header. Step 1 In the inventory window, expand the Logical Inventory tree and expand the Session Border Controller node. Step 2 Expand the SBE node, SIP node, and SIP Profile node, and click the Header Profile node. The Sip Header Profiles window opens. Step 3 Double-click a header profile to open the SIP Header Profile Properties window. Step 4 Double-click a header to open the Header Profile Header Properties window. Step 5 Right-click an entry and choose Commands > Add > SIP Header Profile Condition. The SIP Header Profile Condition dialog box opens. Input Parameter Description Entry Number The entry number for the header. Action Type The action type of the entry. Action Value The action value for the action type. Condition Type The condition type. Condition Header Name Compares the content of a different header. (This field cannot be changed when doing an update.) Condition Content Compares the content of the header. (This field cannot be changed when doing an update.) Condition Operator The operator for the condition content comparison. (This field cannot be changed when doing an update.) Condition Value The value used for comparing the condition content. (This field cannot be changed when doing an update.) Parameter Profile The parameter profile used by the header entry. 22-24 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 22 Viewing and Managing SBCs SBC Configuration and Monitoring Commands Step 6 By default, the General tab is selected. Enter values for the following parameters. Step 7 Preview, schedule, or execute the command. SIP Option Profiles Add, Update, Delete a SIP Option Profile Step 1 In the inventory window, expand the Logical Inventory tree and expand the Session Border Controller node. Step 2 Do one of the following: • To create a new SIP Option Profile, right-click the SBE node and choose Commands > Add > SIP Option Profile. The SIP Option Profile dialog box opens. • To update an existing SIP Option Profile, right-click a profile in the SIP Option Profile window and select Commands > Update > SIP Option Profile. (To open the appropriate window, expand the SBE node, SIP node, and SIP Profile node, and click the Option Profile node.) • To delete an existing SIP Option Profile, right-click a profile in the SIP Option Profile window and select Commands > Delete > SIP Option Profile. (To open the appropriate window, expand the SBE node, SIP node, and SIP Profile node, and click the Option Profile node.) Confirm your choice. Step 3 Right-click the SBE node and choose Commands > Add > SIP Option Profile. The SIP Option Profile dialog box opens. Step 4 By default, the General tab is selected. Enter values for the following parameters. Input Parameter Description Condition Type The condition type. Condition Header Name Compares the content of a different header name. Condition Content Compares the content of the header. Condition Operator The operator for the condition content comparison. Condition Value The value used for comparing the condition content. Input Parameter Description Name The name of the SIP option profile. Description The description of the SIP option profile. Profile Type The type of the SIP option profile. Values are: • Whitelist • Blacklist Profile Options The options of the SIP option profile. Multiple options are separated by one space; for example, host user-agent 22-25 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 22 Viewing and Managing SBCs SBC Configuration and Monitoring Commands Step 5 Preview, schedule, or execute the command. Add, Delete a SIP Parameter Profile Use the Add SIP Parameter Profile command to add a SIP parameter profile. Step 1 In the inventory window, expand the Logical Inventory tree and expand the Session Border Controller node. Step 2 Do one of the following: • To add a new profile, right-click the SBE node and choose Commands > Add > SIP Parameter Profile. The SIP Parameter Profile dialog box opens. • To delete a profile, click the Parameter Profile node, then right-click the profile and choose Commands > Delete > SIP Parameter Profile. (To get to the appropriate window, expand the SBE, SIP, and SIP profile nodes.) Confirm your choice. Step 3 By default, the General tab is selected. Enter values for the following parameters. Step 4 Preview, schedule, or execute the command. Add, Update, Delete Parameter in SIP Parameter Profiles Step 1 In the inventory window, expand the Logical Inventory tree and expand the Session Border Controller node. Step 2 Expand the SBE node, SIP node, SIP Profile node, and click the Parameter Profile node. This opens the SIP Parameter Profiles window. Step 3 Do one of the following • To add a new parameter, right-click the profile instance and choose Commands > Add > SIP Parameter Profile Parameter. • To update an existing parameter, double-click the profile that contains the parameter, then right-click the parameter and choose Commands > Update > SIP Parameter Profile Parameter. • To delete an existing parameter, double-click the profile that contains the parameter, then right-click the parameter and choose Commands > Delete > SIP Parameter Profile Parameter. Confirm your choice. Step 4 In the SIP Parameter Profile Parameter dialog box, enter or update the values for the following parameters. Input Parameter Description Profile Name The name of the SIP parameter profile. Description The description of the SIP parameter profile. 22-26 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 22 Viewing and Managing SBCs SBC Configuration and Monitoring Commands Step 5 Preview, schedule, or execute the command. Blacklists Add, Delete a Blacklist Step 1 In the inventory window, expand the Logical Inventory tree and expand the Session Border Controller node. Step 2 Do one of the following: • To add a blacklist, right-click the SBE node and choose Commands > Add > Blacklist. The Blacklist dialog box opens. • To delete an existing blacklist, from the Configured Blacklist Properties window, right-click the blacklist and choose Commands > Delete > Blacklist. (To open the Configured Blacklist Properties window, expand the SBE, Policy, and Blacklist nodes.) Confirm your choice. Step 3 Enter values for the following parameters. Input Parameter Description Profile Name The name of the profile to which you want to add the parameter. (This field cannot be changed when doing an update.) Parameter Name The name of the parameter to update. Action The action. Values are: • add-not-present • add-or-replace • strip Value The value of the action. Values are: • private-ip-address • public-ip-address • A user-defined word Input Parameter Description VPN The VPN name. For global VPN, the value is global. Type The blacklist type. Values are: • NORMAL • CRITICAL IP Address The IP address. 22-27 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 22 Viewing and Managing SBCs SBC Configuration and Monitoring Commands Step 4 Preview, schedule, or execute the command. Add, Delete, Update a Blacklist Reason Use the Add Blacklist Reason command to add a blacklist reason. Step 1 In the inventory window, expand the Logical Inventory tree and expand the Session Border Controller node. Step 2 Expand the SBE node and the Policy node, and click the Blacklist node to open the Blacklist window. Step 3 Do one of the following: • To add a new blacklist reason, right-click the blacklist instance and choose Commands > Add > Blacklist Reason. The Blacklist Reason dialog box opens. • To update an existing blacklist reason, in the Configured Blacklist Properties window, right-click a blacklist reason and choose Commands > Update > Blacklist Reason. (To get to the Configured Blacklist Properties window, double-click a blacklist instance.) • To delete an existing blacklist reason, in the Configured Blacklist Properties window, right-click a blacklist reason and choose Commands > Delete > Blacklist Reason. (To get to the Configured Blacklist Properties window, double-click a blacklist instance.) Confirm your choice. Step 4 By default, the General tab is selected. Enter values for the following parameters. If you are updating and existing blacklist reason, you can edit the Blacklist Period, Trigger Period, and Trigger Size entries. Port Type The port type. Values are: • default-port-limit • TCP • UDP Port Number The port number, in the range from 0 to 65535. This field is valid only when the port type is TCP or UDP. Description The description of the blacklist. Input Parameter Description Input Parameter Description Blacklist Name The blacklist name. (This field cannot be changed when doing an update.) Blacklist Type The blacklist type. (This field cannot be changed when doing an update.) 22-28 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 22 Viewing and Managing SBCs SBC Configuration and Monitoring Commands Step 5 Preview, schedule, or execute the command. CAC Policies Add, Update, Delete a CAC Policy Set Use the Add CAC Policy Set command to add a Call Admission Control (CAC) policy set. Step 1 In the inventory window, expand the Logical Inventory tree and expand the Session Border Controller node. Step 2 Do one of the following: • To add a new set, right-click the SBE node and choose Commands > Add > CAC Policy Set. The CAC Policy Set dialog box opens. • To update an existing set, in the CAC Policy Set window, right-click the policy set instance and choose Commands > Update > CAC Policy Set. (To get to the appropriate window from the SBC node, expand the SBE and Policy nodes, and click the CAC Policy node.) • To delete an existing set, in the CAC Policy Set window, right-click the policy set instance and choose Commands > Delete > CAC Policy Set. (To get to the appropriate window from the SBC node, expand the SBE and Policy nodes, and click the CAC Policy node.) Confirm your choice. Step 3 By default, the General tab is selected. Enter values for the following parameters. Event Type The event type. (This field cannot be changed when doing an update.) Values are: • authentication-failure • bad-address • corrupt-message • endpoint-registration • policy-rejection • routing-failure • spam Blacklisting Period The blacklisting period value. Trigger Period The trigger period value. Trigger Size The trigger size value. Input Parameter Description Input Parameter Description Policy Set Number The set number of the CAC policy set. (This field cannot be changed when doing an update.) Active The status of the CAC policy set. Description The description of the CAC policy set. 22-29 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 22 Viewing and Managing SBCs SBC Configuration and Monitoring Commands Step 4 Click the Table 1 tab. Enter values for the following parameters. Note When you add a CAC policy set for the first time, you can add three CAC policy tables. If you need to add more tables, you can do so after the CAC policy set that you create is discovered. Step 5 Preview, schedule, or execute the command. Add, Update, Delete a CAC Policy Table Use the Add CAC Policy Table command to add a CAC policy table to an existing CAC policy set. Step 1 In the inventory window, expand the Logical Inventory tree and expand the Session Border Controller node. Step 2 Expand the SBE node and the Policy node, and click the CAC Policy node. Step 3 Do one of the following: • To add a new table, in the CAC Policy Set window, right-click the CAC policy instance and choose Commands > Add > CAC Policy Table. The CAC Policy Table dialog box opens. • To update an existing table, right-click a policy table in the CAC Policy Set Properties window and choose Commands > Update > CAC Policy Table. (To get to the appropriate window from the CAC Policy node, double -click a policy instance in the CAC Policy Set window.) • To delete an existing table, right-click a policy table in the CAC Policy Set Properties window and choose Commands > Delete > CAC Policy Table. (To get to the appropriate window from the CAC Policy node, double -click a policy instance in the CAC Policy Set window.) Confirm your choice. Step 4 Enter values for the following parameters. First Cac Table The first policy table of the CAC policy set. The table must be included in this CAC policy set. You can update the policy set’s properties only when the policy set is inactive. First Cac Scope The first scope of the CAC policy set. Input Parameter Description Input Parameter Description Table Name The CAC policy table name that is included in this CAC policy set. Match Type The match type of the CAC policy table. Number The entry number for the CAC rule entry. Action The action type of the CAC rule entry. Next table When the Action field is set to next-table, you must configure this field. If the Action field is set to cac-complete, ignore this field. Match Value The match value for the CAC rule entry. 22-30 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 22 Viewing and Managing SBCs SBC Configuration and Monitoring Commands Step 5 Preview, schedule, or execute the command. Add, Update, Delete CAC Rule Entry in a CAC Policy Table Use the Add CAC Policy Entry command to add a CAC rule entry to an existing CAC policy table. Step 1 In the inventory window, expand the Logical Inventory tree and expand the Session Border Controller node. Step 2 Expand the SBE node and the Policy node, and click the CAC Policy node. Step 3 In the CAC Policy Set window, double-click a policy instance. The CAC Policy Set Properties window opens. Step 4 Do one of the following: • To add a new rule entry, right-click a policy table and choose Commands > Add > CAC Rule Entry. The CAC Rule Entry dialog box opens. • To update an existing rule entry, right-click an entry in the CAC Rule Entry tab, and choose Commands > Update > CAC Rule Entry. (To get to the appropriate window, double-click a policy table in the CAC Policy Set Properties window.) • To delete an existing rule entry, right-click an entry in the CAC Rule Entry tab, and choose Commands > Delete > CAC Rule Entry. (To get to the appropriate window, double-click a policy table in the CAC Policy Set Properties window.) Confirm your choice. Step 5 By default, the General tab is selected. Enter values for the following parameters. Step 6 Click the Callee tab. Enter values for the following parameters. Input Parameter Description Table Name The CAC policy table name that is included in this CAC policy set. (This field cannot be changed when doing an update.) Description The description of the CAC policy table. Match Type The match type of the CAC policy table. Input Parameter Description Entry Number The CAC rule number that is included in this CAC policy table. (This field cannot be changed when doing an update.) Match Value The match value for the CAC rule entry. Action The action type of this CAC rule entry (next-table or cac-compatible). Next table When the Action field is set to next-table, you must configure this field. If the Action field is set to cac-complete, ignore this field. 22-31 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 22 Viewing and Managing SBCs SBC Configuration and Monitoring Commands Step 7 Click the Caller tab. Enter values for the following parameters. Input Parameter Description Callee Hold Setting The callee hold setting. Values are: • hold-c0 • hold-c0-inactive • hold-c0-sendonly • hold-sendonly • standard Callee Codec List The codec list of the CAC rule entry. Callee Privacy The callee privacy. Values are: • never • always • account-boundary Callee Sig Qos Profile The QoS profile to use for signaling packets sent to the original callee. Callee Video Qos Sig Profile The QoS profile to use for media packets (video) sent to the original callee. Callee Voice Qos Sig Profile The QoS profile to use for media packets (voice) sent to the original callee. Input Parameter Description Caller Hold Setting The caller hold setting. Values are: • hold-c0 • hold-c0-inactive • hold-c0-sendonly • hold-sendonly • standard Caller Codec List The codec list of the CAC rule entry. Caller Privacy The caller privacy. Values are: • never • always • account-boundary Caller Sig Qos Profile The QoS profile to use for signaling packets sent to the original caller. Caller Video Qos Profile The QoS profile to use for media packets (video) sent to the original caller. Caller Voice Qos Profile The QoS profile to use for media packets (voice) sent to the original caller. 22-32 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 22 Viewing and Managing SBCs SBC Configuration and Monitoring Commands Step 8 Click the Others tab. Enter values for the following parameters. Step 9 Preview, schedule, or execute the command. Call Policies Add, Update, Delete a Call Policy Set Use the Add Call Policy Set command to add a new call policy set. Note When you add a new call policy set, you can add three call policy tables. You can add more tables after the call policy set you created is discovered. Step 1 In the inventory window, expand the Logical Inventory tree and expand the Session Border Controller node. Input Parameter Description Codec Restrict ToList The parameter to use to restrict the codecs used in signaling a call to the set of codecs in the specified list. Early Media Allows or forbids early media. Early Media Timeout The amount of time for which to allow early media before a call is established. Early Media Type The direction of early media to allow for an entry in a call admission control table. Max bandwidth per scope The maximum bandwidth per scope for an entry in an admission control table. Max call rate per scope The maximum call rate for an entry in an admission control table. Max channels per scope The maximum number of channels for an entry in an admission control table. Max In Call Rate The maximum rate of inbound calls. Max num calls per scope The maximum number of calls for an entry in an admission control table. Max Out Call Rate The maximum rate of outbound calls. Max regs per scope The maximum number of subscriber registrations for an entry in an admission control table. Max regs rate per scope The maximum call number of subscriber registrations for an entry in an admission control table. Max updates per call The maximum call updates for an entry in an admission control table. Media bypass The SIP adjacency to use to allow media traffic to bypass the DBE. Transcode Allows or forbids transcoding for an entry in the admission control table. Transport The transport for an entry in an admission control table. 22-33 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 22 Viewing and Managing SBCs SBC Configuration and Monitoring Commands Step 2 Do one of the following: • To add a new call policy set, right-click the SBE node and choose Commands > Add > Call Policy Set. The Call Policy Set dialog box opens. • To update an existing policy set, right-click a policy set in the Call Policy Set window and choose Commands > Update > Call Policy Set. (To get to the appropriate window, from the SBC node, expand the Policy and Call Policy nodes.) • To delete an existing policy set, right-click a policy set in the Call Policy Set window and choose Commands > Delete > Call Policy Set. (To get to the appropriate window, from the SBC node, expand the Policy and Call Policy nodes.) Confirm your choice. Step 3 By default, the General tab is selected. Enter values for the following parameters. Step 4 Click the Table 1 tab. Enter values for the following parameters. Input Parameter Description Policy Set Number The set number of the call policy set. (This field cannot be changed when doing an update.) Description The description of the call policy set. Active The status of the call policy set: active (true) or inactive (false). First Call Routing Table The first call routing table of the call policy set. The table must be included in this call policy set. You can update the policy set’s properties only when the policy set is inactive. Input Parameter Description Table Name The call policy table name that is included in the call policy set. Match Type The match type of the call policy table. Number The entry number for the call rule entry. Action The action type of the call rule entry Next table When the Action field is set to next-table, you must configure this field. If the Action field is set to cac-complete, ignore this field. Edit action The dial-string manipulation action in number analysis and routing tables, where entries in the table match the entire dialed number. Enter the: • Edit action type • Edit action value Edit cic The carrier identification code (CIC) in number analysis and routing tables. Enter the: • Edit action type • Edit action value 22-34 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 22 Viewing and Managing SBCs SBC Configuration and Monitoring Commands You can add three entries to the call policy table. For details about adding more entries, see Add, Update, Delete a Call Rule Entry in a Call Policy Table. Step 5 Preview, schedule, or execute the command. Add, Update, Delete Call Policy Tables Use the Add Call Policy Table command to add a call policy table to an existing call policy set. Step 1 In the inventory window, expand the Logical Inventory tree and expand the Session Border Controller node. Step 2 Expand the SBE node and the Policy node, and click the Call Policy node. Step 3 Do one of the following: • To add a new table, in the Call Policy Set window, right-click the policy set and choose Commands > Add > Call Policy Table. The Call Policy Table dialog box opens. • To update an existing table, double-click a policy set, then right-click a policy table and choose Commands > Update > Call Policy Table. (To get to the appropriate window, double-click a policy set in the Call Policy Set window.) • To delete an existing table, double-click a policy set, then right-click a policy table and choose Commands > Delete > Call Policy Table. Confirm your choice. Step 4 Enter values for the following parameters. Step 5 Preview, schedule, or execute the command. Add, Update, Delete a Call Rule Entry in a Call Policy Table Use the Add Call Rule Entry command to add an entry to an existing call policy table. Step 1 In the inventory window, expand the Logical Inventory tree and expand the Session Border Controller node. Step 2 Expand the SBE node and the Policy node, and click the Call Policy node. Step 3 In the Call Policy Set window, double-click a policy set. The Call Policy Set Properties window opens. Step 4 Do one of the following: • To add a call rule entry, right-click a policy table and choose Commands > Add > Call Rule Entry. The Call Rule Entry dialog box opens. Input Parameter Description Table Name The call policy table name that is included in the call policy set. (This field cannot be changed when doing an update.) Match Type The match type of the call policy table. (This field cannot be changed when doing an update.) Description The description for the call policy table. 22-35 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 22 Viewing and Managing SBCs SBC Configuration and Monitoring Commands • To update a call rule entry,double-click a policy table, then right-click an entry and choose Commands > Update > Call Rule Entry. • To delete a call rule entry, double-click a policy table, then right-click an entry and choose Commands > Delete > Call Rule Entry. Confirm your choice. Step 5 By default, the General tab is selected. Enter values for the following parameters. Step 6 Preview, schedule, or execute the command. Input Parameter Description Entry Number The call rule number that is included in this call policy table. (This field cannot be changed when doing an update.) Action The action type of this call rule entry (next-table or cac-complete). Next table When the Action field is set to next-table, you must configure this field. If the Action field is set to cac-complete, ignore this field. Edit action The dial-string manipulation action in number analysis and routing tables, where entries in the table match the entire dialed number. Enter the: • Edit action type • Edit action value Edit cic The carrier identification code (CIC) in number analysis and routing tables. Enter the: • Edit action type • Edit action value Edit src The source number manipulation action in number analysis and routing tables. Enter the: • Edit action type • Edit action value Match Value The match value for the call rule entry. Dst Adjacency The destination adjacency of an entry in a routing table. Precedence The precedence of the routing entry. You must configure this field only when the table type of the call policy table is rtg-time. Use time offset Check this check box if the desired time zone is ahead of or behind local time. You must configure this field only when the table type of the call policy table is rtg-time. 22-36 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 22 Viewing and Managing SBCs SBC Configuration and Monitoring Commands Codec Lists Add, Delete a Codec List Use the Add Codec List command to add a codec list. Step 1 In the inventory window, expand the Logical Inventory tree and expand the Session Border Controller node. Step 2 do one of the following: • To add a new codec list, right-click the SBE node and choose Commands > Add > Codec List. The Codec List dialog box opens. • To delete a codec list, from the Codec List window, right-click a list instance and choose Commands > Delete > Codec List. (To get to the Codec List window, expand the Policy and Codec List nodes.) Confirm your choice. Step 3 By default, the General tab is selected. Enter values for the following parameters. Step 4 Preview, schedule, or execute the command. Add, Update, Delete an Entry in a Codec List Step 1 In the inventory window, expand the Logical Inventory tree and expand the Session Border Controller node. Step 2 Expand the SBE node and the Policy node, and click the Codec List node. This opens the Codec List window. Step 3 Do one of the following: • To add a new entry, In the Codec List window, right-click the codec list instance and choose Commands > Add > Codec List Entry. • To update an existing entry, double-click the codec list, then right-click the codec and choose Commands > Update > Codec List Entry. • To update an existing entry, double-click the codec list, then right-click the codec and choose Commands > Delete > Codec List Entry. Confirm your choice. Step 4 By default, the General tab is selected. Enter values for the following parameters. Input Parameters Description Name The name of the codec list. Description The description of the codec list. Input Parameter Description Name The name of the codec list. (This field cannot be changed when doing an update.) 22-37 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 22 Viewing and Managing SBCs SBC Configuration and Monitoring Commands Step 5 Preview, schedule, or execute the command. Media Addresses Adding a Media Address or Media Address DBE Step 1 In the inventory window, expand the Logical Inventory tree and expand the Session Border Controller node. Step 2 Do one of the following: • For SBE, right-click the SBE node and choose Commands > Add > Media Address. The Media Address dialog box opens. • For DBE, right-click the DBE node and choose Commands > Add > Media Address Dbe. The Media Address Dbe dialog box opens Step 3 By default, the General tab is selected. Enter values for the following parameters. Step 4 Preview, schedule, or execute the command. Delete a Media Address Step 1 In the inventory window, expand the Logical Inventory tree and expand the Session Border Controller node. Step 2 Expand the DBE node and click the Media Address node to open the Media Address Window. Codec The codec list item to add (or delete, if updating). Packetization Period The packetization period value. Input Parameter Description Input Parameter Description Address Range The IP address or IP address range. Managed By Indicates whether the media address is managed by the Data Border Element (DBE) or Media Gateway Configuration (MGC). Nat Mode The network address translation (NAT) mode of the media address. Vrf Name The VRF table name of the media address. Port Range Lower The lower limit of the port range. Port Range Upper The upper limit of the port range. Service Class The service class of the media address. 22-38 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 22 Viewing and Managing SBCs SBC Configuration and Monitoring Commands Step 3 Right-click the media address you want to delete and choose Commands > Delete > Media Address. Step 4 Confirm your choice. Qos Profiles Add, Update, Delete a QoS Profile Use the Add QoS Profile command to add a QoS profile. Step 1 In the inventory window, expand the Logical Inventory tree and expand the Session Border Controller node. Step 2 Do one of the following: • To create a new Qos Profile, right-click the SBE node and choose Commands > Add > QoS Profile. The QoS Profile dialog box opens. • To update an existing Qos Profile, right-click the profile in the QoS Profile window and select Commands > Update > QoS Profile. (To open the Qos Profile window, expand the SBE node and policy node, and click the QosProfile node.) • To delete an existing Qos Profile, right-click the profile in the QoS Profile window and select Commands > Delete > QoS Profile. (Use the navigation in the previous bullet) Confirm your choice. Step 3 Enter or update the values for the following parameters. Step 4 Preview, schedule, or execute the command. Input Parameters Description Qos Profile Name The QoS profile name. Qos Profile Type The QoS type. Values are: • fax—Fax QoS profile. • sig—Signaling QoS profile. • video—Video QoS profile. • voice—Voice QoS profile. Marking The marking type of the QoS profile. IP Precedence The IP precedence value. The range is from 0 to 7. IP ToS The IP ToS value. The range is from 0 to 15. DSCP The DSCP value. The range is from 0 to 63. 22-39 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 22 Viewing and Managing SBCs SBC Show Commands SBC Show Commands The following commands can be launched from the inventory by right-clicking an SBC node and selecting Commands. Before executing any commands, you can preview them and view the results. If desired, you can also schedule the commands. To find out if a device supports these commands, see the Cisco Prime Network 3.10 Supported Cisco VNEs. Input is not required; all of the commands are run from the launch point. • Show > PM > CPS Data • Show > Components • Show > PM > Current 15 Min Statistics • Show > PM > Current 5 Min Statistics • Show > PM > Current Day Statistics • Show > PM > Current Hour Statistics • Show > PM > H.248 Statistics • Show > PM > Previous 15 Minutes Statistics • Show > PM > Previous 5 Minutes Statistics • Show > PM > Previous Day Statistics • Show > PM > Previous Hour Statistics • Show > Media Statistics 22-40 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 22 Viewing and Managing SBCs SBC Show Commands CHAPTER 23-1 Cisco Prime Network 3.10 User Guide OL-28065-01 23 Monitoring AAA Configurations AAA refers to Authentication, Authorization, and Accounting, which is a security architecture for distributed systems that determines the access given to users for specific services and the amount of resources they have used. • Authentication—This method identifies users, including their login and password, challenge and response, messaging support, and encryption. Authentication is the way to identify a subscriber before providing access to the network and network services. • Authorization—This method provides access control, including authorization for a subscriber or domain profile. AAA authorization sends a set of attributes to the service describing the services that the user can access. These attributes determine the user’s actual capabilities and restrictions. • Accounting—This method collects and sends subscriber usage and access information used for billing, auditing, and reporting. For example, user identities, start and stop times, performed actions, number of packets, and number of bytes. Accounting enables an operator to analyze the services that the users access as well as the amount of network resources they consume. Accounting records comprise accounting Attribute Value Pairs (AVPs) and are stored on the accounting server. This accounting information can then be analyzed for network management, client billing, and/or auditing. This chapter contains the following topics: • Supported Network Protocols, page 23-1 • Viewing AAA Configurations in Prime Network Vision, page 23-2 • Working with AAA Commands, page 23-12 Supported Network Protocols AAA supports the following protocols: • Diameter—This is a networking protocol that provides centralized AAA management for devices to connect and use a network service, and an alternative to RADIUS. Diameter Applications can extend the base protocol, by adding new commands and/or attributes. • Remote Authentication Dial In User Service (RADIUS)—This is a networking protocol that provides centralized AAA management for devices to connect and use a network service. RADIUS is a client/server protocol that runs in the application layer, using UDP as transport. The Remote Access Server (RAS), the Virtual Private Network (VPN) server, the network switch with port-based authentication, and the Network Access Server (NAS), are all gateways that control access to the network, and all have a RADIUS client component that communicates with the RADIUS server. 23-2 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 23 Monitoring AAA Configurations Viewing AAA Configurations in Prime Network Vision Viewing AAA Configurations in Prime Network Vision Prime Network allows you to view the AAA configurations for Cisco ASR9000 and Cisco ASR5000 series network elements. This topic contains the following sections: • Viewing AAA Group Profile, page 23-2 • Viewing Dynamic Authorization Profile, page 23-3 • Viewing Radius Global Configuration Details, page 23-4 • Viewing AAA Configuration Details for an AAA group, page 23-5 Viewing AAA Group Profile To view the AAA group profile: Step 1 Right-click on the required device and choose the Inventory option. Step 2 In the Inventory window, choose Logical Inventory > AAA. The AAA attribute details are displayed in the content pane. Note These attributes are available only for Cisco ASR 9000 series network elements. Table 23-1 describes the fields that are displayed in the content pane. Step 3 In the Inventory window, choose AAA group node under the AAA node. Step 4 Under the AAA group node, select and expand the required group and choose the Radius Configuration option. The group details are displayed in the content pane. Table 23-2 describes the fields that are displayed in the Radius Configuration dialog box. Table 23-1 AAA Attributes Field Name Description Type Customization applied to the attribute. Key Unique format name applied to the attribute. Value Formatting applied to the attribute. 23-3 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 23 Monitoring AAA Configurations Viewing AAA Configurations in Prime Network Vision Viewing Dynamic Authorization Profile To view the dynamic authorization profile: Step 1 Right-click on the required device and choose the Inventory option. Step 2 In the Inventory window, choose Logical Inventory > AAA > Dynamic Authorization. The authorization details are displayed in the content pane. You can click on the tabs to view more details. Note These attributes are available only for Cisco ASR 9000 series network elements. Table 23-3 describes the fields that are displayed in the Dynamic authorization content pane. Table 23-2 Radius Configuration Details Field Name Description Load Balancing Method The load balancing method. Ignore Preferred Server Indicates if a transaction associated with a single AAA session should attempt to use the same server or not. VRF Virtual routing and forwarding (VRF) associated with the AAA group. Click the hyperlink to view the relevant node under the VRF node in the logical inventory. Dead Time The deadtime for the profile. Table 23-3 Dynamic Authorization Details Field Name Description Protocol The name of the protocol. Server Listen Port The port number that receives service requests. Ignore Server Key Indicates whether the server key must be ignored. Values are: • true • false CoA Clients Tab IP Address The IP address of the Change of Authorization (CoA) client. VRF The associated VRF to which the CoA client belongs. Click the hyperlink to view the relevant node under the VRF node. 23-4 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 23 Monitoring AAA Configurations Viewing AAA Configurations in Prime Network Vision Viewing Radius Global Configuration Details To view the radius global configuration details: Step 1 Right-click on the required device and choose the Inventory option. Step 2 In the Inventory window, choose Logical Inventory > AAA > Radius Global Configuration. The authorization details are displayed in the content pane. Note These attributes are available only for Cisco ASR 9000 series network elements. Table 23-4 describes the fields that are displayed in the Radius global configuration content pane. Table 23-4 Radius Global Configuration Details Field Name Description Load Balancing Method The load balancing method using which the next host is selected. The server with the least transactions outstanding is generally picked as the next host. Ignored Preferred Server Indicates if a transaction associated with a single AAA session should attempt to use the same server or not. Request Timeout The request timeout value for the device. Dead Time The amount of time (in minutes) after which the dead RADIUS server will be treated as active. Retransmit Indicates whether retransmission of data is allowed. Retransmit Count The retransmission count. Dead Criteria Time The time interval after which the device is considered unavailable. Dead Criteria Retransmit Count The retransmission count after the dead criteria time. Accounting Servers/ Authentication Servers Server IP The IP address of the server. Server Port The server port. Preference The preferred server. Operational State The current operational state of the interface. Administrative Status The administrative status of the interface. Retain Administrative Status After Reboot Indicates whether the administrative status must be retained after the system reboots. Keepalive Representative Group The keepalive representative group. Request Timeout The request timeout value for the device. Retransmit Count The retransmission count. 23-5 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 23 Monitoring AAA Configurations Viewing AAA Configurations in Prime Network Vision Viewing AAA Configuration Details for an AAA group For a Cisco ASR5000 device, Prime Network Vision allows you to view the following configurations for an AAA group: • Diameter Configuration – Accounting Configuration – Authentication Configuration • Radius Configuration – Accounting Configuration – Accounting Keepalive and Detect Dead Server Configuration – Authentication Configuration – Authentication Keepalive and Detect Dead Server Configuration – Charging Configuration – Charging Triggers Prime Network Vision displays the AAA configuration details under the AAA container as shown in Figure 23-1. You can view the individual AAA group details by choosing Logical Inventory > Context > AAA > AAA Groups. Figure 23-1 AAA Groups in Logical Inventory 23-6 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 23 Monitoring AAA Configurations Viewing AAA Configurations in Prime Network Vision Viewing Diameter Configuration Details for an AAA group To view the diameter configuration details for a AAA group: Step 1 Right-click on the required device and choose the Inventory option. Step 2 In the Inventory window, choose Logical Inventory > Context > AAA > AAA Groups. You can view the AAA groups on the content pane. Step 3 Choose Diameter Configuration under a specific AAA group node. The diameter configurations made for accounting servers and authentication servers are displayed in the respective tabs on the content pane. Click on the tabs to view more details. Table 23-5 describes the diameter configuration details for accounting and authentication servers. Step 4 In the Inventory window, choose Accounting Configuration or Authentication Configuration under the Diameter Configuration node. The configuration details are displayed on the content pane. Table 23-6 describes the accounting/authentication diameter configuration details. Table 23-5 Diameter Configuration Field Name Description Accounting Servers/Authentication Servers Server Host Host name of the diameter authentication/accounting server. Priority Relative priority of the diameter authentication/accounting server. Number of Instances in Up State Number of instances between the diameter authentication/accounting server and the AAA manager that are in UP status. Number of Instances in Down State Number of instances between the diameter authentication/accounting server and the AAA manager that are in DOWN status. Table 23-6 Accounting/Authentication Diameter Configuration Field Name Description Dictionary Diameter dictionary used for accounting/authentication. Endpoint Name Diameter endpoint used for accounting/authentication. Maximum Transmissions Maximum number of transmission attempts for diameter accounting/authentication. Maximum Retries Number of retry attempts for diameter accounting/authentication requests. Request Timeout Diameter accounting/authentication request timeout period. Redirect Host AVP Indicates whether to use: • one returned AVP • the first returned AVP as the primary host and the second returned AVP as the secondary host. This field is applicable only for Authentication configuration. 23-7 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 23 Monitoring AAA Configurations Viewing AAA Configurations in Prime Network Vision Viewing Radius Configuration Details for an AAA Group To view the radius configuration details for an AAA group: Step 1 Right-click on the required device and choose the Inventory option. Step 2 In the Inventory window, choose Logical Inventory > Context > AAA > AAA Groups> AAA Group > Radius Configuration. The configurations made for accounting, authentication, charging, and charging accounting servers are displayed in the respective tabs on the content pane. Click on the tabs to view more details. Table 23-7 describes the radius configuration details for accounting, authentication, charging, and charging accounting servers. Viewing Radius Accounting Configuration Details for an AAA group To view the radius accounting configuration details for an AAA group: Step 1 Right-click on the required device and choose the Inventory option. Step 2 In the Inventory window, choose Logical Inventory > Context > AAA > AAA Groups > AAA Group > Radius Configuration > Accounting Configuration. The accounting configuration details are displayed in the content pane. Table 23-7 Radius Configuration Field Name Description Dictionary The radius dictionary. Strip Domain Indicates whether the domain must be stripped from the user name prior to authentication or accounting. Authenticator Validation Indicates whether the MD5 authentication of the user is enabled or disabled. Allow Server Down Authentication Indicates whether subscriber sessions are allowed when RADIUS authentication is unavailable. Allow Server Down Accounting Indicates whether subscriber sessions are allowed when RADIUS accounting is unavailable. Accounting Servers/Authentication Servers/Charging Servers/Charging Accounting Servers Server Name IP address of the RADIUS server. Server Port Port used to communicate with the RADIUS server. Preference Preference of the RADIUS server. Operational State Status of the RADIUS server. Administrative Status Administrative status of the RADIUS server. Retain Administrative Status after Reboot Indicates whether the administrative status must be retained when the system reboots. Keepalive Representative Group Name of the Keepalive representative group. 23-8 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 23 Monitoring AAA Configurations Viewing AAA Configurations in Prime Network Vision Table 23-8 describes the radius accounting configuration details. Viewing the Radius Keepalive and Detect Dead Server Configuration Details for an AAA group To view the radius accounting/authentication Keepalive and Detect Dead Server Configuration details: Step 1 Right-click on the required device and choose the Inventory option. Table 23-8 Radius Accounting Configuration Field Name Description Server Selection Algorithm The algorithm to select the RADIUS accounting server(s) to which accounting data must be sent. Values are: • first-n n Default • first-server • round-robin Billing Version The billing system version of RADIUS accounting servers. Server Deadtime The number of minutes after which communication must be attempted with a server that is not reachable. Maximum Outstanding Messages The maximum number of outstanding messages that can be queued with the AAA manager. Fire and Forget Indicates whether RADIUS Fire-and-Forget accounting is enabled for the AAA group. Maximum Transmissions The maximum number of transmissions attempted for a RADIUS accounting message, before it is declared FAILED. Maximum Retries The maximum number of attempts with the AAA server, before it is declared Not Responding and the detect dead server’s consecutive failures count is incremented. Maximum PDU Size (Bytes) The maximum packed data unit size, in bytes, that can be accepted or generated. Response Timeout The time period, in seconds, to wait for a response from the RADIUS server, before resending the message. Remote Address Indicates whether the remote IP address lists are configured and the collection of accounting data for the addresses in these lists are enabled. Archive Messages Indicates whether archiving of the RADIUS accounting messages in the system (after retries to all available RADIUS accounting servers) is enabled. APN To Be Included The Access Point Name (APN) associated with the RADIUS accounting. Interim Interval The time interval (in seconds) between sending interim accounting records. GTP Trigger Policy The downlink volume that triggers interim RADIUS accounting. 23-9 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 23 Monitoring AAA Configurations Viewing AAA Configurations in Prime Network Vision Step 2 In the Inventory window, choose Logical Inventory > Context > AAA > AAA Groups > AAA Group > Radius Configuration > Accounting Keepalive and Detect Dead Server Configuration or Authentication Keepalive and Detect Dead Server Configuration. The configuration details are displayed in the content pane. Table 23-9 describes the radius accounting keepalive and detect dead server configuration details. Viewing the Radius Authentication Configuration Details for an AAA group To view the radius authentication configuration details for an AAA group: Step 1 Right-click on the required device and choose the Inventory option. Step 2 In the Inventory window, choose Logical Inventory > Context > AAA > AAA Groups > AAA Group > Radius Configuration > Authentication Configuration. The authentication configuration details are displayed in the content pane. Table 23-10 describes the radius authentication configuration details. Table 23-9 Radius Accounting Keepalive and Detect Dead Server Configuration details Field Name Description Keepalive Interval The time interval (in seconds) between two keepalive access requests. Keepalive Timeout The time period to wait for a response from the RADIUS server, before resending the message. This value is displayed in seconds. KeepAlive Maximum Retries The maximum number of keepalive access requests to be sent, before the server is declared as not reachable. Keepalive Consecutive Response The number of consecutive accounting responses after which the server is declared as reachable. Username The accounting user name. Calling Station ID The calling station ID to be used for keepalive accounting. Keepalive Password The password to be used for authentication. This field is available only for authentication configuration. Keepalive Allow Access Reject Indicates the valid response for authentication request. This field is available only for authentication configuration. Detect Dead Server Consecutive Failures The number of consecutive failures for an AAA manager, before the status of an accounting server is changed from Active to Down. Detect Dead Server KeepAlive The number of seconds to wait for a response to any message, before the status of an accounting server is changed from Active to Down. 23-10 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 23 Monitoring AAA Configurations Viewing AAA Configurations in Prime Network Vision Viewing the Charging Configuration Details for an AAA group To view the radius charging configuration details for an AAA group: Step 1 Right-click on the required device and choose the Inventory option. Step 2 In the Inventory window, choose Logical Inventory > AAA > AAA Groups > AAA Group > Radius Configuration > Charging Configuration. The charging configuration details are displayed in the content pane. Table 23-11 describes the charging configuration details. Table 23-10 Radius Authentication Configuration Field Name Description Server Selection Algorithm The algorithm to select the RADIUS accounting server(s) to which accounting data must be sent. Values are: • first-server • round-robin Server Deadtime The time period after which the status of the authentication server must be changed from Down to Active. Maximum Outstanding Messages The maximum number of outstanding messages that can be queued with the AAA manager. Authentication Maximum Retries The maximum number of attempts with the AAA server, before it is declared Not Responding and the detect dead server’s consecutive failures count is incremented. Authentication Maximum Transmissions The maximum number of transmissions attempted for a RADIUS authentication message, before it is declared FAILED. Authentication Response Timeout The time period to wait for a response from the RADIUS server, before resending the message. This value is displayed in seconds. APN To Be Included The APN associated with the RADIUS authentication. Authenticate Null User Name Indicates whether the authentication of user names that are blank or empty is enabled. Modify NAS IP Indicates whether the RADIUS authentication is attempted after NAS IP is modified. Probe Interval The time interval (in seconds) before sending another probe authentication request to a RADIUS server. Probe Timeout The time period (in seconds) to wait for a response from a RADIUS server before resending the authentication probe. Probe Maximum Retries The number of retries for RADIUS authentication probe response before the authentication is declared as failed. 23-11 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 23 Monitoring AAA Configurations Viewing AAA Configurations in Prime Network Vision Viewing the Charging Trigger Configuration Details for an AAA group To view the radius charging trigger configuration details for an AAA group: Step 1 Right-click on the required device and choose the Inventory option. Step 2 In the Inventory window, choose Logical Inventory > Context > AAA > AAA Groups > AAA Group > Radius Configuration > Charging Trigger. The charging configuration details are displayed in the content pane. Table 23-12 describes the charging trigger configuration details. Table 23-11 Radius Charging Configuration Field Name Description Authentication Server Selection Algorithm The algorithm to select the RADIUS server(s) for active charging service to ensure proper load distribution amongst the available servers used for authentication requests. Value could be one of the following: • first-server • round-robin Accounting Server Selection Algorithm The algorithm to select the RADIUS server(s) for active charging service to ensure proper load distribution amongst the available servers for accounting requests. Value could be one of the following: • first-n n Default • first-server • round-robin Server Deadtime The time period after which the status of the RADIUS server must be changed from Down to Active. Maximum Outstanding Messages The maximum number of outstanding messages that can be queued with the AAA manager. Maximum Retries The maximum number of attempts with the AAA server, before it is declared Not Responding and the detect dead server’s consecutive failures count is incremented. Response Timeout The maximum number of retransmissions for RADIUS authentication requests. Detect Dead Server Consecutive Retries The number of consecutive failures for an AAA manager, before the status of an charging server is changed from Active to Down. 23-12 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 23 Monitoring AAA Configurations Working with AAA Commands Working with AAA Commands The following commands can be launched from the inventory by choosing AAA Group > Commands > Configuration. Before executing any commands, you can preview them and view the results. If desired, you can also schedule the commands. To find out if a device supports these commands, see the Cisco Prime Network 3.10 Supported Cisco VNEs. Note You might be prompted to enter your device access credentials while executing a command. Once you have entered them, these credentials will be used for every subsequent execution of a command in the same GUI client session. If you want to change the credentials, click Edit Credentials. Edit Credentials button will not be available for SNMP commands or if the command is scheduled for a later time. Table 23-12 Radius Charging Triggers Configuration Field Name Description Serving Node Change Indicates whether RADIUS trigger for serving node is enabled. Radio Access Technology Change Indicates whether RADIUS trigger for radio access technology change is enabled. User Location Information Change Indicates whether RADIUS trigger for user location information change is enabled. Routing Area Information Change Indicates whether RADIUS trigger for routing area information change is enabled. Quality of Service Change Indicates whether RADIUS trigger for quality of service change is enabled. Mobile Station Timezone Change Indicates whether RADIUS trigger for mobile station time zone change is enabled. Table 23-13 AAA Commands Command Inputs Required and Notes Create Diameter Accounting Server Server Host Name, Priority Create Diameter Authentication Server Server Host Name, Priority Delete AAA Group Click Execute Now to delete the AAA group. Modify AAA Group Diameter Authentication tab: Dictionary, Delete End Point, End Point, Delete Max Retries, Max Retries, Request Timeout Diameter Accounting tab: Dictionary, Delete End Point, End Point, Delete Max Retries, Max Retries, Request Timeout 23-13 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 23 Monitoring AAA Configurations Working with AAA Commands 23-14 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 23 Monitoring AAA Configurations Working with AAA Commands CHAPTER 24-1 Cisco Prime Network 3.10 User Guide OL-28065-01 24 Monitoring IP Pools An IP pool is a sequential range of IP addresses within a certain network. We can have multiple pool configurations. Each pool can have a priority and can be assigned to a group. IP addresses can be assigned dynamically from a single pool or from a group of pools. The Least Recently Used (LRU) method is used to assign IP addresses. In each pool, the addresses are placed in a queue. At the time of assigning, the address at the head of the queue is assigned, and when released is placed at the end of the queue. When a group of pools have the same priority, an algorithm is used to determine a probability for each pool based on the number of available addresses. A pool is selected based on the probability determined. This method allocates addresses evenly from the group of pools. IP pool supports both IPv4 and IPv6 addresses. With the IP Pool feature, Prime Network provides the flexibility of assigning IP addresses dynamically for services running on a network element. A service running on a network element can refer to an appropriate IP pool and an IP address gets assigned to the service from the IP pool. This chapter contains the following topics: • Viewing the IP Pool Properties, page 24-1 • Working With the IP Pool Commands, page 24-3 Viewing the IP Pool Properties To view the IP pool properties for a device: Step 1 In Prime Network Vision, right-click the required device, and choose Inventory. Step 2 In the Inventory window, choose Logical Inventory > Context > IP Pools. A list of IP pools are displayed in the content pane. Table 24-1 describes the fields that are displayed in the content pane. Table 24-1 IP Pool Properties Field Name Description Table Types Displays the type of table, which is IP Pools. IP Pools Name Name of the IP pool. IP Pool Entries Indicates whether entries exist for this pool. 24-2 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 24 Monitoring IP Pools Step 3 Right-click on an IP pool name and choose Properties. The IP Pool Properties dialog box is displayed as shown in Figure 24-1. Figure 24-1 IP Pool Properties 24-3 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 24 Monitoring IP Pools Table 24-2 describes the fields that are displayed in the IP Pool Properties dialog box. Working With the IP Pool Commands The following commands can be launched from the inventory by right-clicking on an IP pool name and choosing Commands > Configuration. Before executing any commands, you can preview them and view the results. If desired, you can also schedule the commands. To find out if a device supports these commands, see the Cisco Prime Network 3.10 Supported Cisco VNEs. Note You might be prompted to enter your device access credentials while executing a command. Once you have entered them, these credentials will be used for every subsequent execution of a command in the same GUI client session. If you want to change the credentials, click Edit Credentials. Edit Credentials button will not be available for SNMP commands or if the command is scheduled for a later time. Table 24-2 IP Pool Properties Field Name Description Name Name of the IP pool. IP Pool Entries Addresses In Use Number of IP addresses assigned from the pool. Start Address/Subnet Address Could be one of the following: • Starting IP address in the pool, if the pool is configured with a range. • Subnet address, if the pool is configured with a subnet mask. Free Addresses Number of free addresses available in the pool. End Address/Subnet Mask Could be one of the following: • Ending IP address in the pool, if the pool is configured with a range. • Subnet mask, if the pool is configured with a subnet mask. VRF Virtual Routing and Forwarding (VRF) name, if the pool belongs to a VRF. Reserved Addresses Number of reserved addresses in the pool. Group Name Name of the group to which the pool belongs. Pool Status Status of the pool. Pool Type Type of the pool, which could be Public, Private, Static, Resource, or NAT. Pool Priority Priority of the pool, which is used when multiple pools are available. 24-4 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 24 Monitoring IP Pools Table 24-3 IP Pool Commands Command Inputs Required and Notes Delete IP Pool Click Execute Now to delete the IP pool. Modify IP Pool IP Address (IPV4/IPV6), Network Bits, Subnet Mask (IPV4/IPV6), Pool Type, Pool Priority, Group Name, VRF Name CHAPTER 25-1 Cisco Prime Network 3.10 User Guide OL-28065-01 25 Monitoring BNG Configurations These topics provide an overview of the Broadband Network Gateway (BNG) technology and describe how to monitor and view BNG configurations in Prime Network Vision: • Broadband Network Gateway (BNG) - An Overview, page 25-1 • User Roles Required to Work With BNG, page 25-2 • Working with BNG Configurations, page 25-3 • Viewing Policy Container, page 25-12 • Viewing QoS Profile, page 25-15 Broadband Network Gateway (BNG) - An Overview Broadband Network Gateway (BNG) provides capabilities that help to improve the service provider's ability to manage the subscriber's services, and simplify overall network operations. BNG is a functionality that comprises subscriber management at a logical aggregation point in the network, which manages the subscriber’s user experience through identification, address assignment, authentication, authorization, accounting, and various other features such as security, Quality of Service (QoS), and subscriber forwarding. BNG represents the subscriber as a session, which is a logical point to enable services for a given subscriber. A subscriber is usually identified with the protocol that provides the IP address of the subscriber for address assignment. For example, a subscriber that uses the Point-to-Point Protocol (PPP) to connect to the network, receives its IP address through the PPP IP Control Protocol (IPCP) negotiation, and is represented as a PPP session. A subscriber that uses Ethernet to connect to the network receives its IP address through Dynamic Host Control Protocol (DHCP) and is represented as an IP session. The purpose of deploying BNG at the provider edge is to better manage and enrich the subscriber experience. BNG separates subscriber access functions from provider services and yields these benefits: • Comprehensive session management and billing functions are supported by means of communication with an authentication, authorization, and accounting (AAA) server that is separate from the BNG. • Subscribers can obtain services based on their subscriber ID or a combination of their subscriber ID and access line. 25-2 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 25 Monitoring BNG Configurations User Roles Required to Work With BNG The network topology for BNG can be explained using the following models: • BNG Retail Model—The subscriber connects to the network over a digital subscriber line (DSL) circuit into a DSL access multiplexor (DSLAM), which aggregates a number of subscribers. The DSLAMs are connected to an aggregation network, which grooms the subscriber traffic and switches it to BNG. A sample of the retail model is shown in Figure 25-1. Figure 25-1 BNG Retail Model • BNG Wholesale Model—The subscriber’s traffic is handed off by the carrier (who still owns the infrastructure) toone of the several Internet Service Providers (ISP). There are different ways to make this handoff, Layer 2 Tunneling Protocol (L2TP) or Layer 3 virtual private networking (VPN) being two such methods. The BNG Retail model is used for deployment in Prime Network. Prime Network provides BNG support for Cisco Aggregation Service Router (ASR) 9000 series network elements. The following topics describe more about the BNG configuration details: • User Roles Required to Work With BNG, page 25-2 • Working with BNG Configurations, page 25-3 User Roles Required to Work With BNG This topic identifies the roles that are required to work with BNG. Prime Network determines whether you are authorized to perform a task as follows: • For GUI-based tasks (tasks that do not affect elements), authorization is based on the default permission that is assigned to your user account. • For element-based tasks (tasks that do affect elements), authorization is based on the default permission that is assigned to your account. That is, whether the element is in one of your assigned scopes and whether you meet the minimum security level for that scope. For more information on user authorization, see the topic on device scopes in the Cisco Prime Network 3.10 Administrator Guide. AGG CORE Phone PC STB/TV HG DSLAM BNG 283650 25-3 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 25 Monitoring BNG Configurations Working with BNG Configurations Working with BNG Configurations This topic contains the following sections: • View Broadband Access (BBA) Groups, page 25-3 • View Subscriber Access Points, page 25-5 • Diagnose Subscriber Access Points, page 25-6 • View Dynamic Host Configuration Protocol (DHCP) Service Profile, page 25-7 • View Dynamic Config Templates, page 25-9 • Viewing Policy Container, page 25-12 • Viewing QoS Profile, page 25-15 • Viewing AAA Configurations in Prime Network Vision, page 23-2 View Broadband Access (BBA) Groups BBA groups refer to the configuration settings applicable to a subscriber session that are accessing the network through an access interface. The same group can be applied to multiple access interfaces. For example, the maximum session limit for an access interface. To view the BBA group profile: Step 1 Right-click on the device and choose the Inventory option. Step 2 In the Inventory window, choose Logical Inventory > BNG > BBA Groups. A list of BBA groups is displayed in the content pane as shown in Figure 25-2. Table 25-1 Default Permission/Security Level Required for BNG Task Viewer Operator OperatorPlus Configurator Administrator View BBA profiles X X X X X View Subscriber Access Points X X X X X Diagnose Subscriber Access Points — — — X X View DHCP Service Profile X X X X X View IP Subscriber Template X X X X X View PPP Templates X X X X X View Service Templates X X X X X View policy details X X X X X View QoS profile X X X X X View AAA Group profile X X X X X View Dynamic Authorization profile X X X X X View Radius Global Configuration details XX X X X 25-4 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 25 Monitoring BNG Configurations Working with BNG Configurations Figure 25-2 BBA Groups Content Pane Step 3 Right-click on a group from the list and choose Properties. The BBA Group Properties dialog box is displayed. Table 25-2 describes the fields that are displayed in the BBA Group Properties dialog box. Table 25-2 BBA Group Properties Field Name Description Name The name of the BBA Group. MTU (Bytes) The default maximum payload, which can be any value between 500 and 2000. Service Name The name of the service configured under the specified BBA group. Maximum Access Interface Limit The maximum limit of PPP over Ethernet (PPPoE) sessions on the access interface. Maximum Circuit ID Limit The maximum limit of PPPoE sessions for the circuit ID. Maximum Session Limit The maximum session limit per card. A warning is displayed if the session exceeds the limit specified here. Maximum MAC Address Access Limit The maximum limit for MAC address access. A warning is displayed if the access exceeds the limit specified here. Maximum Payload Limit The maximum payload limit. Service Selection Indicates the status of advertising of unrequested services names. By default, this service is enabled. 25-5 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 25 Monitoring BNG Configurations Working with BNG Configurations View Subscriber Access Points Subscriber access points refer to the access interfaces that are named based on the parent interface. For example, bundle-ether 2.100.pppoe312. The subscribers on bundles (or bundle-VLANs) interfaces allow redundancy and are managed on the route processor (RP). However, the subscribers over physical interfaces are created and managed on the line card (LC) and are not redundant. To view the subscriber access points profile: Step 1 Right-click on the device and choose the Inventory option. Step 2 In the Inventory window, choose Logical Inventory > BNG > Subscriber Access Points. A list of access points is displayed in the content pane. Step 3 Right-click on an access point from the list and choose Properties. The Subscriber Access Point Properties dialog box is displayed. Table 25-3 describes the fields that are displayed in the Subscriber Access Point Properties dialog box. Applied Interfaces Interface Name The name of the interface applied to the BBA Group. Entity Association The link to the applied interface. Click this hyperlink to view the relevant node under the Subscriber Access Point node. Table 25-2 BBA Group Properties (continued) Field Name Description Table 25-3 Subscriber Access Point Properties Field Name Description Access Point The name of the access point. Associated Entity The link to the associated entity. Click this hyperlink to view the associated Data Link Aggregation record under the Ethernet Link Aggregation node. Access Type The access type for the subscriber access point, which can be any one of the following: • PPPOE_AND_IP • PPPOE • IP Ingress Service Policy The service policy for the access point, which when clicked will display the relevant policy under the Policy Container node. Ingress QoS Policy The Quality of Service policy for the inbound traffic, which when clicked will display the relevant policy under the Policy Container node. 25-6 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 25 Monitoring BNG Configurations Working with BNG Configurations Diagnose Subscriber Access Points The following commands can be launched from the inventory by right-clicking the BNG > Subscriber Access Points node and selecting the Commands > Diagnose option. Before executing any commands, you can preview them and view the results. If desired, you can also schedule the commands. To find out if a device supports these commands, see the Cisco Prime Network 3.10 Supported Cisco VNEs. Egress QoS Policy The Quality of Service policy for the outbound traffic of the access point, which when clicked will display the relevant policy under the Policy Container node. BBA Group The BBA group to which the access point is associated. Click this hyperlink to view the relevant group under the BBA group node. DHCP Profile The DHCP profile to which the access point is associated. Click this hyperlink to view the relevant profile under the DHCP node. IP Address The destination address for User Datagram Protocol (UDP) broadcasts. VRF The Virtual Routing and Forwarding (VRF) in which the access points operates. Table 25-3 Subscriber Access Point Properties (continued) Field Name Description Table 25-4 Diagnose Subscriber Access Points Diagnose command Input parameters Show DHCP Binding Binding Type Show IP Subscriber Management Trace • Trace Event Type • Trace Count Show PPoE Trace • Trace Filter Type • Trace Count Show Subscriber Dynamic Template Trace All • Trace Filter Type • Trace Event Type • Trace Count Show Subscriber Manager Disconnect History Disconnect History Filter Type Show Subscriber Manager Session History • Session Type • ID Value 25-7 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 25 Monitoring BNG Configurations Working with BNG Configurations View Dynamic Host Configuration Protocol (DHCP) Service Profile DHCP is used to automate host configuration by assigning IP addresses, delegating prefixes (in IPv6), and providing extensive configuration information to network computers. DHCP has the capability to allocate IP addresses only for a specified period of time, which is known as the lease period. If a client device wants to retain the IP addresses for a period longer than the lease period, then the client must renew the lease before it expires. A client can renew the lease depending on the configuration time sent from the server. A REQUEST message is unicast by the client using the server's IP address. On receiving the REQUEST message, the server responds with an acknowledgment, and the client's lease is extended by the lease time configured in the acknowledgment message. To view the DHCP service profile: Step 1 Right-click on the required device and choose the Inventory option. Step 2 In the Inventory window, choose Logical Inventory > DHCP Service > DHCP Profiles - IPv4. A list of DHCP profiles are displayed in the content pane as shown in Figure 25-3. Show Subscriber Manager Trace • Trace Filter Type • Trace Event Type • Trace Count Show Subscriber Session Details by Filter • Session Filter Type • Filter Value • Filter State Table 25-4 Diagnose Subscriber Access Points (continued) Diagnose command Input parameters 25-8 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 25 Monitoring BNG Configurations Working with BNG Configurations Figure 25-3 DHCP Profiles Step 3 Right-click on a service from the list and choose Properties. The DHCP Profile Properties dialog box is displayed. Table 25-5 describes the fields that are displayed in the DHCP Profile Properties dialog box. Table 25-5 DHCP Profile Properties Field Name Description Profile Name The name of the DHCP profile. Profile Type The network protocol that the profile belongs to. The profile type can be IPV4 or IPV6. Agent Mode The DHCP agent mode, which can be Relay, Snoop or Proxy. Lease Limit The lease limit for the profile. Lease Limit Type The lease limit type. Relay Information Check Indicates whether the relay information check is enabled or disabled. Relay Information Policy The relay information policy. DHCP Agent Information Options Option The relay agent information options key parameter. 25-9 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 25 Monitoring BNG Configurations Working with BNG Configurations View Dynamic Config Templates A dynamic template is used to group configuration items, which are later applied to a group of subscribers. This template is globally configured through the command line interface (CLI). However, the template does not get applied to a subscriber interface as soon as it is configured. It must be activated using a control policy. Similarly, you must deactivate the template using a control policy to remove its association with the subscriber interface. Ideally, you can activate more than one dynamic template on the same subscriber interface, for the same event or different events. The same dynamic-template can be activated on multiple subscriber interfaces through the same control policy. Prime Network supports the following types of dynamic templates: • IP subscriber templates • PPP templates • Service templates To view the configuration templates: Step 1 Right-click on the device and choose the Inventory option. Step 2 In the Inventory window, choose Logical Inventory > Dynamic Config Templates > IP Subscriber Templates or PPP template or Service template. A list of templates is displayed in the content pane. Step 3 Select a template from the list, right-click and choose Properties to view its details. Table 25-6 describes the fields that are displayed in the corresponding dialog box. Value The value of the relay agent information options. Applied Interfaces Interface Name The name of the interface applied to the DHCP Group. Entity Association The link to the applied interface. Click this hyperlink to view the relevant node under the Subscriber Access Point node. DHCP Servers Profile Class The profile class. Server Address The IP address of the profile, which is used to relay packets. VRF The VRF of the DHCP profile. Click this hyperlink to view the relevant node under the VRFs node. Gateway Address The IP address of the gateway. Match Option The match option of the DHCP profile. Match Option Value The value of the match option. Match Option Mask The match option mask. Table 25-5 DHCP Profile Properties (continued) Field Name Description 25-10 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 25 Monitoring BNG Configurations Working with BNG Configurations Table 25-6 Template Properties Field Name Description Name The name of the subscriber template. Template Type The template type, which can be IP Subscriber, PPP or Service based on the selected template. Ingress Policy The name of the ingress service policy associated with the subscriber template. This field is applicable only for IP Subscriber and Service templates. Associated Ingress Policy The associated ingress policy. Click this hyperlink to view the relevant node under the Policy Container node. This field is applicable only for IP subscriber templates. Egress Policy The name of the egress service policy associated with the subscriber template. This field is applicable only for IP Subscriber and Service templates. Associated Egress Policy The associated egress policy. Click this hyperlink to view the relevant node under the Policy Container node. This field is applicable only for IP Subscriber and Service templates. Ingress Access-List The name of the ingress access-list associated with the subscriber template. This field is applicable only for IP subscriber templates. Associated Ingress-ACL Entity The associated ingress access list. Click this hyperlink to view the related list in the Access List node. This field is applicable only for IP subscriber templates. Egress Access-List The name of the egress access-list associated with the subscriber template. This field is applicable only for IP subscriber templates. Associated Egress-ACL Entity The associated egress access list. Click this hyperlink to view the related list in the Access List node. This field is applicable only for IP subscriber templates. Mtu The maximum transmission unit for IPv4. Idle Timeout The idle timeout for the subscriber template in seconds. This field is applicable only for IP Subscriber and Service templates. Keep Alive Enabled Indicates whether the Keep alive feature is enabled. This field is applicable only for PPP templates. Keep Alive Interval The keep alive interval time in terms of seconds. This field is applicable only for PPP templates. Maximum Bad Authentication Request The maximum number of authentication failures, which can be any value between 0 and 10. This field is applicable only for PPP templates. Maximum Unacknowledged Request The maximum number of unacknowledged configured requests, which can be any value between 4 and 20. This field is applicable only for PPP templates. Maximum Negative Acknowledgement The maximum number of consecutive configuration negative acknowledgements, which can be any value between 2 and 10. This field is applicable only for PPP templates. 25-11 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 25 Monitoring BNG Configurations Working with BNG Configurations Viewing the Settings for a PPP Template In addition to the above details, you can also view the following settings for a PPP template: • IPCP Settings • LCP Settings • Authentication Settings • PPP Timeout Settings To view the settings: Step 1 Right-click on the device and choose the Inventory option. Step 2 In the Inventory window, choose Logical Inventory > Dynamic Config Templates > PPP template. A list of templates is displayed in the content pane. Step 3 Select a template from the list, right-click and choose Properties to view its details. You can click on the tab to view more details. The IPCP tab is displayed by default. Table 25-7 describes the fields that are displayed in the corresponding dialog box. Table 25-7 PPP Template Settings Field Name Description DNS Server The IPCP negotiation primary and secondary DNS IP address. WINS Server The IPCP negotiation primary and secondary WINS IP address. IPAddress PoolName The IPCP negotiation name of the peer-address pool. Associated IP Pool Entity The associated IP pool entity for the template. ReNegotiation Enabled Indicates whether the attempts by the peer to renegotiate IPCP is enabled. LCP Settings tab Delay The time period (in seconds or milliseconds) to delay before starting active LCP negotiations. ReNegotiation Enabled Indicates whether the attempts by the peer to renegotiate LCP is enabled. Authentication Settings tab Authentication Type The PPP link authentication method, which can be any one of the following: • chap • ms-chap • pap Chap Host Name The Challenge Handshake Authentication Protocol (CHAP) host name. MS Chap Host Name The mobile station CHAP host name. PPP Timeout Settings Absolute Session Timeout The absolute timeout for a PPP session. 25-12 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 25 Monitoring BNG Configurations Viewing Policy Container Viewing Policy Container The Policy Container node in the logical inventory lists all the available service groups and service policies that are associated with service templates, BBA groups, and subscriber access points. To view the service group and service policy profiles: Step 1 Right-click on the required device and choose the Inventory option. Step 2 In the Inventory window, choose Logical Inventory > Policy Container. The Policies and Policy Group tabs are displayed in the content pane. In the Policies tab, a list of existing policies are displayed as shown in Figure 25-4. Figure 25-4 Policy Container Maximum Authentication Response WaitTime The maximum time (in seconds) to wait for an authentication response during a PPP negotiation. Maximum Authentication Retry The maximum time (in seconds) to wait for a response during a PPP negotiation. Table 25-7 PPP Template Settings (continued) Field Name Description 25-13 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 25 Monitoring BNG Configurations Viewing Policy Container Step 3 Click the Policy Group tab. A list of existing groups are displayed. Step 4 Right-click on a group from the list and choose Properties. The Policy Group Properties dialog box is displayed. Table 25-8 describes the fields that are displayed in the Policy Group Properties dialog box. Table 25-8 Policy Group Properties Field Name Description Name The name of the policy group. Type The type of policy group, which can be any one of the following: • Accounting • Control • PBR • Performance Traffic • QoS • Traffic • Redirect Processing Strategy The strategy in applying the policy group, which can be any one of the following: • Match First • Match All Unordered • Match All Ordered Policies Name The name of the service policy map. Type The type of policy map, which can be any one of the following: • Accounting • Control • PBR • Performance Traffic • QoS • Traffic • Redirect Processing Strategy The strategy in applying the policies on the incoming traffic, which can be any one of the following: • Match First • Match All Unordered • Match All Ordered 25-14 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 25 Monitoring BNG Configurations Viewing Policy Container Step 5 Right-click on a policy from the Policies list and choose Properties. The Service Policy Properties dialog box is displayed. Table 25-9 describes the fields that are displayed in the Service Policy Properties dialog box. Table 25-9 Service Policy Properties Field Name Description Name The name of the service policy map. Type The type of policy map, which can be any one of the following: • Accounting • Control • PBR • Performance Traffic • QoS • Traffic • Redirect Processing Strategy The strategy in applying the policies on the incoming traffic, which can be any one of the following: • Match First • Match All Unordered • Match All Ordered Policy Rules Match Condition The class map associated with the policy rule. Type The type of class map associated with the policy, which can be any one of the following: • Control Subscriber • QoS • Traffic Action Execution Strategy The policy execution strategy, which can be any of the following: • Execute All • Execute Until Success • Execute Until Failure Action Lists Sequence Number The sequence number of the policy action. 25-15 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 25 Monitoring BNG Configurations Viewing QoS Profile Viewing QoS Profile QoS or Quality of services is the technique of prioritizing traffic flows and specifying preferences for forwarding packets with higher priority. The QoS node in the logical inventory lists all the services configured for the selected network element. To view the QoS profile: Step 1 Right-click on the device and choose the Inventory option. Step 2 In the Inventory window, choose Logical Inventory > QoS > Class of Services. A list of existing policies are displayed in the content pane. Step 3 Right-click on a service in the list and choose Properties. The Class of Services Properties dialog box is displayed. You can click on the tabs to view more details. Table 25-10 describes the fields that are displayed in the Class of Services Properties dialog box. Action Type The type of policy action, which can be any one of the following: • Active • Deactivate • Apply • Authenticate • Authorize • Set Timer • Stop Timer • Drop • Accounting • Conform Action • Conform Color • Exceed Action • Exceed Color • Child Conform Action • Violation Action Entity Type The type of entity affected by the policy rule, which can be Dynamic template or Authorization list. Entity Value The value of the dynamic template or authorization list. Entity Association The associated entity. Click this hyperlink to view the relevant dynamic template or authorization list. Table 25-9 Service Policy Properties (continued) Field Name Description 25-16 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 25 Monitoring BNG Configurations Viewing QoS Profile Table 25-10 Class of Services Properties Field Name Description Name The name of the class of service. Type The type of the class of service. Values are: • Control Subscriber • QoS • Traffic Matching Condition The matching condition for the service, which can be Match All or Match Any. Match Criteria Lists Match Type The match type, which can be any one of the following: • Access group • ATM • Auth status • COS • DEI • Destination-address • Discard-class • Domain • DSCP • Ethertype • FR-DE • Frame-relay • MPLS • Precedence • Protocol • Qos-group • Source-address • Timer • Username • VLAN • VPLS Match Value The value associated with the match type. Associated Entity The entity associated to the selected access group. Click this hyperlink to view the related record in the Access List content pane. CHAPTER 26-1 Cisco Prime Network 3.10 User Guide OL-28065-01 26 Monitoring Mobile Technologies The following topics provide an overview of mobile technologies and describe how to work with mobile technologies in Prime Network Vision: • User Roles Required to Work with Mobile Technologies, page 26-1 • GPRS/UMTS Networks - An Overview, page 26-4 • Working With GPRS/UMTS Network Technologies, page 26-5 • LTE Networks - An Overview, page 26-33 • Working with LTE Network Technologies, page 26-34 • Viewing Operator Policies, APN Remaps, and APN Profiles, page 26-41 • Working with Active Charging Service, page 26-52 • Using Commands to Configure and View Mobile Technologies under a Context, page 26-68 User Roles Required to Work with Mobile Technologies This topic identifies the GUI default permission or scope security level that is required to work with the mobile technologies in Prime Network Vision. Prime Network determines whether you are authorized to perform a task as follows: • For GUI-based tasks (tasks that do not affect elements), authorization is based on the default permission that is assigned to your user account. • For element-based tasks (tasks that do affect elements), authorization is based on the default permission that is assigned to your account. That is, whether the element is in one of your assigned scopes and whether you meet the minimum security level for that scope. For more information on user authorization, see the Cisco Prime Network 3.10 Administrator Guide. The following tables identify the tasks that you can perform: • Table 26-1 identifies the tasks that you can perform if a selected element is not in one of your assigned scopes. • Table 26-2 identifies the tasks that you can perform if a selected element is in one of your assigned scopes. By default, users with the Administrator role have access to all managed elements. To change the Administrator user scope, see the topic on device scopes in the Cisco Prime Network 3.10 Administrator Guide. 26-2 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies User Roles Required to Work with Mobile Technologies Table 26-1 Default Permission/Security Level Required for Viewing GGSN, GTPU, and APN Properties - Element Not in User’s Scope Task Viewer Operator OperatorPlus Configurator Administrator Viewing GGSN properties — — — — X Viewing additional characteristics of a GGSN —— — — X Working with GGSN commands — — — — X Viewing GTPU properties — — — — X Working with GTPU commands — — — — X Viewing APN properties — — — — X Viewing additional characteristics of an APN —— — — X Working with APN commands — — — — X Viewing SAE-GW properties — — — — X Viewing P-GW properties — — — — X Working with P-GW commands — — — — X Viewing S-GW properties — — — — X Working with S-GW commands — — — — X Viewing GTPP properties — — — — X Viewing additional characteristics of a GTPP —— — — X Working with GTPP commands — — — — X Viewing EGTP properties — — — — X Working with EGTP commands — — — — X Viewing operator policies — — — — X Viewing APN remaps — — — — X Viewing APN profiles — — — — X Viewing additional characteristics of an APN profiles —— — — X Viewing active charging services (ACS) —— — — X Working with ACS commands — — — — X Viewing QCI-QoS mapping — — — — X 26-3 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies User Roles Required to Work with Mobile Technologies Table 26-2 Default Permission/Security Level Required for Viewing GGSN, GTPU, and APN Properties - Element in User’s Scope Task Viewer Operator OperatorPlus Configurator Administrator Viewing GGSN properties X X X X X Viewing additional characteristics of a GGSN XX X X X Working with GGSN commands — — — X X Viewing GTPU properties X X X X X Working with GTPU commands — — — X X Viewing APN properties X X X X X Viewing additional characteristics of an APN XX X X X Working with APN commands — — — X X Viewing SAE-GW properties X X X X X Viewing P-GW properties X X X X X Working with P-GW commands — — — X X Viewing S-GW properties X X X X X Working with S-GW commands — — — X X Viewing GTPP properties X X X X X Viewing additional characteristics of a GTPP XX X X X Working with GTPP commands — — — X X Viewing EGTP properties X X X X X Working with EGTP commands — — — X X Viewing operator policies X X X X X Viewing APN remaps X X X X X Viewing APN profiles X X X X X Viewing additional characteristics of an APN profiles XX X X X Viewing active charging services (ACS) XX X X X Working with ACS commands — — — X X Viewing QCI-QoS mapping X X X X X 26-4 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies GPRS/UMTS Networks - An Overview GPRS/UMTS Networks - An Overview General Packet Radio Service (GPRS) and Universal Mobile Telecommunication System (UMTS) are evolutions of Global System for Mobile Communication (GSM) networks. GPRS is a 2.5G mobile communications technology that enables mobile wireless service providers to offer their mobile subscribers packet-based data services over GSM networks. UMTS is a 3G mobile communications technology that provides wideband code division multiple access (CDMA) radio technology. Figure 26-1 shows a basic GPRS/UMTS network topology. Figure 26-1 Basic GPRS/UMTS Network Topology The GPRS/UMTS packet core comprises two major network elements: • Gateway GPRS support node (GGSN)—A gateway that provides mobile cell phone users access to a Packet Data Network (PDN) or specified private Internet Protocol (IP) networks. • Serving GPRS support node (SGSN)—Connects the radio access network (RAN) to the GPRS/UMTS core and tunnels user sessions to the GGSN. The SGSN sends data to and receives data from mobile stations, and maintains information about the location of a mobile station (MS). The SGSN communicates directly with the MS and the GGSN. PDNs are associated with Access Point Names (APNs) configured on the system. Each APN consists of a set of parameters that dictate how subscriber authentication and IP address assignment is to be handled for that APN. Prime Network Vision allows you to configure the mobile technologies by using commands and also view the properties configured for the mobile technologies. Figure 26-2 shows an example of the Inventory window with the mobile technology nodes/containers under the Mobile context. From Prime Network 3.9, the mobile technologies are supported on Cisco Aggregation Service Router (ASR) 5000 series mobile gateways. 26-5 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Working With GPRS/UMTS Network Technologies Figure 26-2 Mobile Technology Nodes in Logical Inventory Working With GPRS/UMTS Network Technologies The following topics explain how to work with GPRS/UMTS network technologies in Prime Network Vision: • Working with GGSN, page 26-5 • Working with GTPU, page 26-10 • Working with APN, page 26-12 • Working with GTPP, page 26-24 • Working with EGTP, page 26-31 Working with GGSN The GGSN works in conjunction with SGSNs within the network to perform the following functions: • Establish and maintain subscriber Internet Protocol (IP) or Point-to-Point Protocol (PPP) type Packet Data Protocol (PDP) contexts originated by either the mobile or the network. • Provide charging detail records (CDRs) to the charging gateway ((CG), also known as the Charging Gateway Function (CGF)). • Route data traffic between the subscriber’s Mobile Station (MS) and a PDN such as the Internet or an intranet. 26-6 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Working With GPRS/UMTS Network Technologies In addition, to providing basic GGSN functionality as described above, the system can be configured to support Mobile IP and/or Proxy Mobile IP data applications in order to provide mobility for subscriber IP PDP contexts. When supporting these services, the system can be configured to function as a GGSN and Foreign Agent (FA), a stand-alone Home Agent (HA), or a GGSN, FA, and HA simultaneously within the carrier's network. The following topics explain how to work with GGSN in Prime Network Vision: • Viewing GGSN Properties, page 26-6 • Viewing Additional Characteristics of a GGSN, page 26-7 • GGSN Commands, page 26-9 Viewing GGSN Properties Prime Network Vision displays the GGSNs in a GGSN container under the Mobile node in the logical inventory. The icon used for representing GGSNs in the logical inventory is explained in Logical Inventory Icons, page A-6. To view GGSN properties: Step 1 Right-click the required device in Prime Network Vision and choose Inventory. Step 2 In the logical inventory window, choose Logical Inventory > Context > Mobile > GGSN Container. Prime Network Vision displays the list of GGSNs configured under the container. You can view the individual GGSN details from the table on the right pane or by choosing Logical Inventory > Context > Mobile > GGSN Container > GGSN. Table 26-3 describes the details available for each GGSN. Table 26-3 GGSN Properties in Logical Inventory Field Description Service Name The name of the GGSN service. Status The status of the GGSN service. Value could be Unknown, Running, or Down. PLMN Policy The PLMN policy for handling communications from SGSNs that are not configured to communicate with. Newcall Policy Specifies whether to accept or reject a new incoming call. Authentication Server Timeout The code used by the GGSN as a response message if communication with an authentication server times out. Value could be System Failure or User Authentication Failed. Accounting Server Timeout The code used by the GGSN as a response message if communication with an accounting server times out. Value could be System Failure or No Resouces. GTPU The GTPU that is associated with the GGSN and manages the GTP messages between GGSN and a radio access network equipment (RNC). Accounting Context The context that processes accounting for PDP contexts handled by the GGSN service. Local IP Address The local IP address bounded with the GGSN service. 26-7 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Working With GPRS/UMTS Network Technologies If the GGSN is associated with SGSNs and Public Land Mobile Networks (PLMNs), you can view the details from the respective tabs for that GGSN. Table 26-4 describes the SGSN and PLMN information associated with the GGSN. Viewing Additional Characteristics of a GGSN To view additional characteristics of a GGSN: Step 1 Right-click the required device in Prime Network Vision and choose Inventory. Step 2 In the logical inventory window, choose Logical Inventory > Mobile > GGSN Container >GGSN. Step 3 Expand the GGSN node. The following list of characteristics configured for the GGSN are displayed: • Charging Characteristics • Timers And QoS Step 4 Choose Charging Characteristics to view the properties on the right pane. See Table 26-5 for more details on the charging characteristics configured for the GGSN. Table 26-4 SGSN and PLMN information for a GGSN Field Description SGSNs IP Address The IP address of the SGSN. Subnet Mask The subnet mask of the SGSN. PLMN ID The PLMN ID associated with the SGSN. MCC The mobile country code (MCC) portion of the PLMN. MNC The mobile network code (MNC) portion of the PLMN. PLMN Foreign Indicates whether the SGSN belongs to a home or foreign PLMN. This field is available only if MCC and MNC are not available. Reject Foreign Subscriber Specifies whether to accept or reject foreign subscriber. Value could be True or False. RAT Type The type of radio access technology (RAT) that is used for communication. Description The description of the SGSN entry in the GGSN service. PLMNs PLMN ID The ID of the PLMN associated with the GGSN. Primary Indicates whether the PLMN ID is the primary PLMN ID for the GGSN. Value could be True or False. When multiple PLMN IDs are configured, the one configured as primary is used for the Authentication, Authorization, and Accounting (AAA) attribute. 26-8 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Working With GPRS/UMTS Network Technologies Step 5 Under the GGSN node, choose Timers and QoS to view the properties on the right pane. See Table 26-6 for more details on the Timers and QoS parameters configured for the GGSN. Table 26-5 GGSN Charging Characteristics Field Description Profiles Profile No Type of billing. For example: • 1—Hot billing • 2—Flat billing • 4—Prepaid billing • 8—Normal billing All other profiles from 0 - 15 are customized billing types. Buckets Denotes container changes in the GGSN Call Detail Record (GCDR). Prepaid Prepaid type, which could be Prohibited or Use-rulebase-configuration. Down Link Octets Downlink traffic volume of the bucket. Uplink Octets Uplink traffic volume of the bucket. Total Octets Total traffic volume of the bucket. Tariff Time Triggers Profile No Type of billing. Time1, Time2, and so on First time-of-day time values, and so on, to close the current statistics container. Intervals Profile No Type of billing. No. of SGSNs Number of SGSN changes (inter-SGSN switchovers) resulting in a new Routing Area Identity (RAI) that can occur before closing an accounting record. Interval Normal time duration that must elapse before closing an accounting record. Down Link Octets Downlink traffic volume reached within the time interval. Up Link Octets Uplink traffic volume reached within the time interval. Total Octets Total traffic volume reached within the time interval. 26-9 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Working With GPRS/UMTS Network Technologies GGSN Commands The following commands can be launched from the inventory by right-clicking a GGSN and choosing GGSN > Commands > Configuration. Before executing any commands, you can preview them and view the results. If desired, you can also schedule the commands. To find out if a device supports these commands, see the Cisco Prime Network 3.10 Supported Cisco VNEs. Note You might be prompted to enter your device access credentials while executing a command. Once you have entered them, these credentials will be used for every subsequent execution of a command in the same GUI client session. If you want to change the credentials, click Edit Credentials. Edit Credentials button will not be available for SNMP commands or if the command is scheduled for a later time. Table 26-6 GGSN Timers and QoS Field Description Retransmission Timeout Timeout, in seconds, for retransmission of GTP control packets. Max Retransmissions Maximum retries for transmitting GTP control packets. Setup Timeout Maximum time, in seconds, allowed for session setup. Echo Interval Echo interval, in seconds, for GTP. Guard Interval Interval, in seconds, for which the GGSN maintains responses sent to SGSN. This optimizes the handling of retransmitted messages. QCI to DSCP Mapping QoS class index A set of transport characteristics used to differentiate various packet flows. DSCP Differentiated Services Code Point (DSCP), a mechanism for classifying and managing network traffic and providing QoS. QCI & ARP DSCP Mapping QoS class index A set of transport characteristics used to differentiate various packet flows. Allocation retention priority The priority of allocation and retention of the service data flow. This parameter allows prioritizing allocation of resources during bearer establishment and modification. During network traffic congestions, a lower ARP flow is dropped to free up the capacity. DSCP A mechanism for classifying and managing network traffic and providing QoS. 26-10 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Working With GPRS/UMTS Network Technologies Working with GTPU The GGSN communicates with SGSNs on a Public Land Mobile Network (PLMN) using the GPRS Tunneling Protocol (GTP). The signaling or control aspect of this protocol is referred to as the GTP Control Plane (GTPC) while the encapsulated user data traffic is referred to as the GTP User Plane (GTPU). GTPU is used for transferring user data in separated tunnels for each PDP context. You can configure various parameters for a GTPU using the configuration commands in Prime Network Vision. You can view the configured parameters for a GTPU in the logical inventory. The following topics explain how to work with GTPU in Prime Network Vision: • Viewing GTPU Properties, page 26-10 • GTPU Commands, page 26-11 Viewing GTPU Properties Prime Network Vision displays the GTPUs in a GTPU container under the Mobile node in the logical inventory. The icon used for representing GTPUs in the logical inventory is explained in Logical Inventory Icons, page A-6. Table 26-7 GGSN Commands Command Inputs Required and Notes Create PLMN Identifier • MCC Number • MNC Number • PLMN Type: Primary or None Create SGSN IP Address (IPv4/IPv 6), Mask, Description, MCC Number, MNC Number, Reject Foreign Subscriber, Disable GTPC Echo, PLMN Foreign, and RAT Type. Delete GGSN Click Execute Now to delete the GGSN. Modify GGSN General tab: • Delete Accounting Context Name, Accounting Context Name, Delete CC Behavior ID, CC Behavior ID, Delete GTPU, Service Name, GTPU Service Name, Delete P-GW Service Name, P-GW Service Name, Port Number, PLMN Unlisted Value Bind Address tab: • Delete Bind Address, Bind Address (IPv4), Max PPP PDP Context, Max Total PDP Context Timing Interval tab: • Retransmission Timeout, Echo Retransmission Timeout, Setup Timeout, Delete Echo Interval, Echo Interval, Dynamic, Smooth Factor, Delete Guard Interval, Guard Interval, Max Retransmission 26-11 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Working With GPRS/UMTS Network Technologies To view GTPU properties: Step 1 Right-click the required device in Prime Network Vision and choose Inventory. Step 2 In the logical inventory window, choose Logical Inventory > Context > Mobile > GTPU Container. Prime Network Vision displays the list of GTPUs configured under the container. You can view the individual GTPU details from the table on the right pane or by choosing Logical Inventory >Context > Mobile > GTPU Container > GTPU. Table 26-8 describes the details available for each GTPU. GTPU Commands The following commands can be launched from the inventory by right-clicking a GTPU and choosing Commands > Configuration. Before executing any commands, you can preview them and view the results. If desired, you can also schedule the commands. To find out if a device supports these commands, see the Cisco Prime Network 3.10 Supported Cisco VNEs. Note You might be prompted to enter your device access credentials while executing a command. Once you have entered them, these credentials will be used for every subsequent execution of a command in the same GUI client session. If you want to change the credentials, click Edit Credentials. Edit Credentials button will not be available for SNMP commands or if the command is scheduled for a later time. Table 26-8 GTPU Properties in Logical Inventory Field Description Service Name The name of the GTPU service. State The status of the GTPU service. Status could be Unknown, Running, or Down. Max Retransmissions The maximum limit for GTPU echo retransmissions. Default value is 4. Retransmission Timeout The timeout in seconds for GTPU echo retransmissions. Default value is 5 Secs. Echo Interval The rate at which the GTPU echo packets are sent. IPSEC Tunnel Idle Timeout The IPSec tunnel idle timeout after which IPSec tunnel deletion is triggered. Default value is 60 Secs. Allow Error Indication Specifies whether error indication is dropped or sent without IPSec tunnel. Default value is Disabled. Include UDP Port Ext Hdr Specifies whether to include an extension header in the GTPU packet for error indication messages. Default value is False. IP Address The list of IP addresses configured on the GTPU. The IP addresses are available only when configured for the GTPU. 26-12 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Working With GPRS/UMTS Network Technologies Working with APN APN is the access point name that is configured in the GGSN configurations. The GGSN’s APN support offers the following benefits: • Extensive parameter configuration flexibility for the APN. • Extensive QoS support. • Virtual APNs to allow differentiated services within a single APN. The APN that is supplied by the mobile station is evaluated by the GGSN in conjunction with multiple configurable parameters. Then the GGSN selects an APN configuration based on the supplied APN and those configurable parameters. • Traffic policing that governs the subscriber traffic flow if it violates or exceeds configured peak or committed data rates. The traffic policing attributes represent a QoS data rate limit configuration for both uplink and downlink directions. Up to 1024 APNs can be configured in the GGSN. An APN may be configured for any type of PDP context, i.e., PPP, IPv4, IPv6 or both IPv4 and IPv6. Many parameters can be configured independently for each APN on the device. They are categorized as given below: • Accounting—Various parameters regarding accounting possibilities, such as, charging characteristics, accounting mode (RADIUS server-based accounting, GTPP-based accounting, and so on.) • Authentication—Various parameters regarding authentication, such as, protocols used, like, Challenge Handshake Authentication Protocol (CHAP), Password Authentication Protocol (PAP), or none, default username/password, server group to use, and limit for number of PDP contexts. • Enhanced Charging—Name of rulebase to use, which holds the enhanced charging configuration (for example, eG-CDR variations, charging rules, prepaid/postpaid options, etc.). Table 26-9 GTPU Commands Command Inputs Required and Notes Create GTPU Bind IP Address Bind IP Address Type, Bind Address (IPv4/IPv6) Modify GTPU Bind IP Address (Right-click on an IP address in the content pane and choose Commands > Configuration > Modify GTPU Bind IP Address Bind Address Type, Delete Bind Address, Bind Address (IPv4/IPv6) Delete GTPU Bind IP Address (Right-click on an IP address in the content pane and choose Commands > Configuration > Delete GTPU Bind IP Address Click Execute Now to delete the bind IP address. Delete GTPU Click Execute Now to delete the GTPU. Modify GTPU Retransmission Timeout, Echo Retransmission Timeout, Maximum Retransmission, Delete Echo Interval, Echo Interval 26-13 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Working With GPRS/UMTS Network Technologies • IP: Method for IP address allocation (e.g., local allocation by GGSN, Mobile IP, Dynamic Host Control Protocol (DHCP), DHCP relay, etc.). IP address ranges, with or without overlapping ranges across APNs. • Tunneling: PPP may be tunneled with L2TP. IPv4 may be tunneled with GRE, IP-in-IP or L2TP. Load-balancing across multiple tunnels. IPv6 is tunneled in IPv4. Additional tunneling techniques, such as, IPsec and VLAN tagging may be selected by the APN, but are configured in the GGSN independently from the APN. • QoS: IPv4 header ToS handling. Traffic rate limits for different 3GPP traffic classes. Mapping of R98 QoS attributes to work around particular handset defections. Dynamic QoS renegotiation (described elsewhere). You can configure the APN parameters using Prime Network Vision. You can view the configured parameters for an APN in the logical inventory. After an APN is determined by the GGSN, the subscriber may be authenticated/authorized with an AAA server. The GGSN allows the AAA server to return Vendor Specific Attributes (VSAs) that override any or all of the APN configuration. This allows different subscriber tier profiles to be configured in the AAA server, and passed to the GGSN during subscriber authentication/authorization. The following topics explain how to work with APN in Prime Network Vision: • Viewing APN Properties, page 26-13 • Viewing Additional Characteristics of an APN, page 26-18 • APN Commands, page 26-23 Viewing APN Properties Prime Network Vision displays the APNs in an APN container under the Mobile node in the logical inventory. You can also view additional characteristics configured on the APN as explained in Viewing Additional Characteristics of an APN, page 26-18. The icon used for representing APNs in the logical inventory is explained in Logical Inventory Icons, page A-6. To view APN properties: Step 1 Right-click the required device in Prime Network Vision and choose Inventory. Step 2 In the logical inventory window, choose Logical Inventory >Context > Mobile > APN Container >APN. Table 26-10 describes the information that is available for the APN. The information that is displayed depends on the configuration of the APN. Table 26-10 APN Properties in Logical Inventory Field Description APN Name The APN name. Accounting Mode The accounting protocol in use in the APN. Values are GTPP (GPRS Tunneling Protocol Prime), RADIUS (Remote Authentication Dial In User Service), or None. Selection Mode The selection mode in use in the APN. Selection mode indicates the origin of the requested APN and whether or not the Home Location Register (HLR) has verified the user subscription. L3 to L2 Address Policy The layer 2 to layer 3 IP address allocation or validation policy. 26-14 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Working With GPRS/UMTS Network Technologies Step 3 To view additional details configured for the APN, use the following tabs: • Virtual APNs—A virtual APN is a non-physical entity that represents an access point that does not itself provide direct access to a real target network. A virtual APN can be used to consolidate access to multiple, physical target networks through a single access point. • QCI to DSCP Mapping—Shows the mapping between QoS Class Indices (QCI) to Differentiated Services Code Point (DSCP). • QCI & ARP DSCP Mapping—Shows the mapping between QCI and Allocation/Retention Priority (ARP) to DSCP. • QoS Downlink Traffic Policing—Shows the attributes that represent QoS data rate limit configuration for downlink direction within the APN profile. • QoS Uplink Traffic Policing—Shows the attributes that represent QoS data rate limit configuration for uplink direction within the APN profile. Allocation Type The method by which the APN obtains IP addresses for PDP contexts. IP Header Compression IP packet header compression parameters for the APN. New Call Policy Specifies whether to accept or reject a new incoming call in case of duplicate session calls with a request for same IP address. Table 26-10 APN Properties in Logical Inventory (continued) Field Description Field Description Virtual APNs Preference Specifies the order in which the referenced APNs are compared by the system. Can be configured to any integer value from 1 (highest priority) to 1000 (lowest priority). APN Specifies the name of an alternative APN configured on the system that is to be used for PDP contexts with matching properties. Value can be from 1 to 62, alpha and/or numeric characters, and is not case-sensitive. It may also contain dots ( . ) and/or dashes (- ). 26-15 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Working With GPRS/UMTS Network Technologies Rule Definition The virtual APN rule definition can be one of the following: • access-gw-address—Specifies the access gateway (SGSN/SGW/Others) address for the virtual APN. The IP address can be an IPv4 or IPv6 address in decimal notation. IPv6 also supports :: notation for the IP address. • bearer-access-service—Specifies the bearer access service name for the virtual APN. • service name—Specifies the service name. Service name is unique across all the contexts. Value is a string of size 1 to 63. • cc-profile—Specifies the APN for charging characteristics (CC) profile index. Value is an integer from 1 to 15. • Domain name—Specifies the subscriber’s domain name (realm). Domain name can be from 1 to 79 alpha and/or numeric characters. • MCC—Specifies the MCC portion of the PLMN identifier. Value is an integer between 100 to 999. • MNC—Specifies the MNC portion of the PLMN identifier. Value is an integer between 100 to 999. • msisdn-range—Specifies the APN for this MSISDN range. The starting and ending values of the range is a string of size 2 to 15 with values between 00 and 999999999999999. • Rat-Type—Specifies the rat-type option, which could be gan, geran, hspa, utran, or wlan. • Roaming mode—Specifies the roaming mode, which could be Home, Visiting, or Roaming. Field Description 26-16 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Working With GPRS/UMTS Network Technologies QCI to DSCP Mapping QoS class index Denotes a set of transport characteristics used to differentiate various packet flows. DSCP Denotes a mechanism for classifying and managing network traffic and providing QoS. QCI & ARP DSCP Mapping QoS class index Denotes a set of transport characteristics used to differentiate various packet flows. Allocation retention priority Indicates the priority of allocation and retention of the service data flow. This parameter allows prioritizing allocation of resources during bearer establishment and modification. During network traffic congestions, a lower ARP flow is dropped to free up the capacity. DSCP Denotes a mechanism for classifying and managing network traffic and providing QoS. QoS Downlink Traffic Policing QCI A scalar that denotes a set of transport characteristics and used to infer nodes specific parameters that control packet forwarding treatment. Peak Data Rate The peak data rate allowed, in bytes, for the downlink direction and QoS traffic class. Committed Data Rate The committed data rate allowed, in bytes, for the downlink direction and QoS traffic class. Negotiate Limit Indicates whether negotiation limit is enabled or disabled for the downlink direction and Qos traffic class. Rate Limit Indicates whether the rate limit is enabled or disabled for the downlink direction and Qos traffic class. Burst Size Auto Readjust Indicates whether the auto readjustment of burst size is enabled or disabled. This parameter is used in dynamic burst size calculation, for traffic policing, at the time of PDP activation of modification. Burst Size Auto Readjust Duration The burst size readjustment duration in seconds. This parameter indicates the number of seconds that the dynamic burst size calculation will last for. This allows the traffic to be throttled at the negotiated rates. Peak Burst Size (bytes) The peak burst size allowed, in bytes, for the downlink direction and QoS class. Guaranteed Burst Size (bytes) The guaranteed burst size allowed, in bytes, for the downlink direction and QoS class. Exceed Action The action to be taken on packets that exceed the committed data rate, but do not violate the peak data rate. The action could be one of the following: • Drop • Lower IP Precedence • Transmit Field Description 26-17 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Working With GPRS/UMTS Network Technologies Violate Action The action to be taken on packets that exceed both committed and peak data rates. The action could be one of the following: • Drop • Lower IP Precedence • Shape • Transmit QoS Uplink Traffic Policing QCI A scalar that denotes a set of transport characteristics and used to infer nodes specific parameters that control packet forwarding treatment. Peak Data Rate The peak data rate allowed, in bytes, for the uplink direction and QoS traffic class. Committed Data Rate The committed data rate allowed, in bytes, for the uplink direction and QoS traffic class. Negotiate Limit Indicates whether negotiation limit is enabled or disabled for the uplink direction and Qos traffic class. Rate Limit Indicates whether the rate limit is enabled or disabled for the uplink direction and Qos traffic class. Burst Size Auto Readjust Indicates whether the auto readjustment of burst size is enabled or disabled. This parameter is used in dynamic burst size calculation, for traffic policing, at the time PDP. Burst Size Auto Readjust Duration The burst size readjustment duration in seconds. This parameter indicates the number of seconds that the dynamic burst size calculation will last for. This allows the traffic to be throttled at the negotiated rates. Peak Burst Size (bytes) The peak burst size allowed, in bytes, for the uplink direction and QoS class. Guaranteed Burst Size (bytes) The guaranteed burst size allowed, in bytes, for the uplink direction and QoS class. Exceed Action The action to be taken on packets that exceed the committed data rate, but do not violate the peak data rate. The action could be one of the following: • Drop • Lower IP Precedence • Transmit Violate Action The action to be taken on packets that exceed both committed and peak data rates. The action could be one of the following: • Drop • Lower IP Precedence • Shape • Transmit Field Description 26-18 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Working With GPRS/UMTS Network Technologies Viewing Additional Characteristics of an APN To view additional characteristics of an APN: Step 1 Right-click the required device in Prime Network Vision and choose Inventory. Step 2 In the logical inventory window, choose Logical Inventory > Context > Mobile > APN Container >APN. Step 3 Expand the APN node. The following list of characteristics configured for the APN are displayed: – Charging Characteristics—Charging characteristics configured on the APN for different subscribers. – DHCP—Dynamic Host Control Protocol (DHCP) parameter configured, if the APN supports dynamic address assignment for PDP contexts. – GSM-QoS—Represents the negotiated QoS attribute reliability class based on the configuration provided for service data unit (SDU) error ratio and residual bit error rate (BER) attributes in the APN. – IP Parameters—Represents the APN parameters related to IP. – IPv6—Represents IPv6 configurations and related services for the APN. – Mediation Device—Represents the mediation device used by the APN for communication with the subscriber. – Mobile IP—Represents mobile IP configuration of the APN. – Net BIOS—Represents the NetBIOS server configuration used by the APN. – PDP Contexts Parameters—Represents the PDP contexts supported by the APN. – PPP Profile—Represents the PPP profile used by the APN. – RADIUS—Represents the APN parameters related to communication with the RADIUS server. – Timeout—Represents the timeout parameters of the APN. – Tunnel Parameters—Represents the parameters configured for tunneling between the GGSN and an external gateway for the APN. – DNS Configuration—Represents the Domain Name System (DNS) settings configured on the APN. 26-19 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Working With GPRS/UMTS Network Technologies Step 4 Click each of one of these characteristics to view its properties on the right pane. See Table 26-11 for more details on the properties of each characteristics configured for the APN. Table 26-11 APN Characteristics Field Description Charging Characteristics Home Bit Behavior The behavior bit for charging a home subscriber. Home Profile The profile index for a home subscriber. Roaming Bit Behavior The behavior bit for charging a roaming subscriber. Roaming Profile The profile index for a roaming subscriber. Visiting Bit Behavior The behavior bit for charging a visiting subscriber. Visiting Profile The profile index for a visiting subscriber. All Bit Behavior The behavior bit for charging all subscribers. This value is used only if all subscribers are configured to use the same charging characteristics. This value is overridden by the behavior bit set for a subscriber type. All Profile The profile index for all subscribers. Use GGSN The type of the subscriber using the charging characteristics configured on the APN. Value could be Home, Roaming, Visitor, or None. None indicates that the subscriber is using the charging characteristics from the SGSN. Use RADIUS Returned Specifies whether the GGSN accepts charging characteristics returned from the RADIUS server for all subscribers for the APN. Value could be True or False. DHCP Lease Expiration Policy The action taken when leases for IP addresses assigned to PDP contexts that are facilitated by the APN, are about to expire. For example, auto renew. GSM-QoS SDU Error Ratio Code The SDU error ratio code based on which the negotiation of QoS attribute reliability class needs to be configured on the APN. Value is an integer between the range 1 and 7. Each code has an assigned value. Residual BER Code The residual bit error rate (BER) based on which the negotiation of QoS attribute reliability class needs to be configured on the APN. This value is specified if the SDU error ratio code is 1, 2, 3, or 7. Residual BER code is an integer in the range 1 and 9. Each code has an assigned value. IP Parameters In Access Group The name of the IPv4/IPv6 access group for the APN when configured for inbound traffic. Out Access Group The name of the IPv4/IPv6 access group for the APN when configured for outbound traffic. Local Address The static local IP address assigned to the APN. Next Hop Gateway Address The IP address of the next hop gateway for the APN. This parameter is available only if it is configured on the APN. 26-20 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Working With GPRS/UMTS Network Technologies Is Discard Enabled Specifies whether multicast discard is enabled or disabled. Value could be True or False. IPv6 Inbound Access Group Name The name of the IPv6 access group for the APN when configured for inbound traffic. Outbound Access Group Name The name of the IPv6 access group for the APN when configured for outbound traffic. Router Advertisement Interval The time interval (in milliseconds) the initial IPv6 router advertisement is sent to the mobile node. Value is an integer in the range 100 and 16,000. Smaller the advertisement interval greater is the chance of the router being discovered quickly. Router Advertisement Number The number of initial IPv6 router advertisements sent to the mobile node. Value is an integer in the range of 1 and 16. Prefix Pool Name The name of the IPv6 address prefix pool configured for the subscriber. You can configure upto a maximum of four pools per subscriber. Egress Address Filtering Specifies whether filtering of packets not meant for the mobile interface, is enabled or disabled. Mediation Device Mediation Accounting Enabled Indicates whether mediation accounting is enabled or disabled. No Early PDUs Indicates whether protocol data units (PDUs) must be delayed or not until a response to the GGSN's accounting start request is received from the mediation device. If No Early PDUs is ‘true’, the chassis does not send any uplink or downlink data from or to a MS, until it receives a command from the mediation device. No Interims Indicates whether radius interim updates are sent to the mediation device or not for the APN for radius accounting. Delay GTP Response Indicates whether the GTP response must be delayed or not. If this value is ‘true’, the GTP response is delayed and is sent to the SGSN only if the AAA server is up. If the value is ‘false’, the subscriber will be connected to the SGSN even if the AAA server is down. Mobile IP Home Agent The IP address of the home agent (HA) used by the current APN to facilitate subscriber mobile IP sessions. Mobile Node Home Agent SPI The mobile node Security Parameter Index (SPI) configured for the APN. Value is an integer between 256 and 4294967295. Mobile Node Home Agent Hash Algorithm The encryption algorithm used (if any) by the APN for security. Mobile Node AAA Removal Indication Specifies whether the system is configured to remove various information elements when relaying registration request (RRQ) messages to HA. Value could be Enabled or Disabled. Net BIOS Primary NBNS Address Primary service address of the NetBIOS server. Table 26-11 APN Characteristics (continued) Field Description 26-21 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Working With GPRS/UMTS Network Technologies Secondary NBNS Address Secondary service address of the NetBIOS server. PDP Contexts Parameters Total Contexts The total number of primary and secondary PDP contexts that can be supported by the APN. Value is an integer between 1 and 4,000,000. PDP Type The type of the PDP contexts supported by the APN. Primary Contexts The status of the primary contexts of the APN. PPP Profile Data Compression Protocols The compression protocol used by the APN for compression of data packets. Keep Alive The frequency (in seconds) of sending the Link Control Protocol (LCP) keep alive messages. A value zero denotes that the keep alive messages are disabled completely. Data Compression Mode The compression mode used by the compression protocol which could be: • Normal—Packets are compressed using the packet history. • Stateless—Each packet is compressed individually. MTU (bytes) The maximum transmission unit (MTU) for packets accessing the APN. Min. Compression Size (bytes) The smallest packet to which compression may be applied. RADIUS RADIUS Group The Authentication, Authorization, and Accounting (AAA) group name for the subscriber. If no group is set, the value is displayed as Default. RADIUS Secondary Group The secondary AAA group for the APN. If no group is set, the value is displayed as None. Returned Framed IP Address Policy The policy which indicates whether to accept or reject a call when the RADIUS server supplies 255.255.255.255 as the framed IP address and when the MS does not supply an IP address. Timeout Absolute Absolute timeout of a session, in seconds, for the APN. Idle Maximum duration, in seconds, after which the system considers the session as dormant or idle and invokes the long duration timer action. Long Duration Maximum duration, in seconds, before the system automatically reports or terminates the session. This is the maximum duration before the specified timeout action is activated for the session. Long Duration Inactivity Maximum duration, in seconds, before the session is marked as dormant. Emergency Inactivity Timeout duration, in seconds, to check inactivity on the emergency session. Idle Activity Downlink State Indicates whether the system must ignore the downlink traffic to consider as activity for idle-timeout. Only uplink packets will be able to reset the idle-timeout. Table 26-11 APN Characteristics (continued) Field Description 26-22 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Working With GPRS/UMTS Network Technologies MBMS Bearer Absolute Maximum time a Multimedia Broadcast and Multicast Server (MBMS) bearer can exist in active or idle state. MBMS Bearer Idle Maximum time an MBMS bearer context can be idle. MBMS UE Absolute Session timeout value for the MBMS user equipment. IPv6 Init Solicit Wait IPv6 initial router solicit wait timeout. Long Duration Action Type The action taken on long duration sessions. For example, the system performs any of the following actions: • Detects a long duration session and sends an SNMP trap and CORBA notification. • Disconnects the session after sending an SNMP trap and CORBA notification. • Suppresses the SNMP trap and CORBA notification after detecting and disconnecting long duration session. Tunnel Parameters Address Policy The address allocation / validation policy for all tunneled calls except Layer 2 Tunneling Protocol (L2TP) calls. Peer Load Balancing The algorithm that defines how the tunnel peers are selected by the APN when multiple peers are configured in the APN. DNS Configuration Primary DNS Address The primary DNS server for the APN. Secondary DNS Address The secondary DNS server for the APN. Table 26-11 APN Characteristics (continued) Field Description 26-23 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Working With GPRS/UMTS Network Technologies APN Commands The following commands can be launched from the inventory by right-clicking an APN and choosing Commands > Configuration. Before executing any commands, you can preview them and view the results. If desired, you can also schedule the commands. To find out if a device supports these commands, see the Cisco Prime Network 3.10 Supported Cisco VNEs. Note You might be prompted to enter your device access credentials while executing a command. Once you have entered them, these credentials will be used for every subsequent execution of a command in the same GUI client session. If you want to change the credentials, click Edit Credentials. Edit Credentials button will not be available for SNMP commands or if the command is scheduled for a later time. Table 26-12 APN Commands Command Inputs Required and Notes Create QoS to DSCP Mapping QCI Attribute, DSCP Value Create Virtual APN Virtual APN Reference, Virtual APN Name, Virtual APN Optional Parameters, Access Gateway Address (IPV4/IPV6), Bearer Access Service Name, CC Profile Index, Domain Name, MCC Number, MNC Number, MSISDN Start Range, MSISDN End Range, RAT Type, Roaming Mode Delete APN Click Execute Now to delete the APN. 26-24 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Working With GPRS/UMTS Network Technologies Working with GTPP GPRS Tunneling Protocol Prime (GTPP) is used for communicating accounting messages to CGs. Enhanced Charging Service (ECS) supports different accounting and charging interfaces for prepaid and postpaid charging and record generation. GTPP accounting in ECS allows the collection of counters for different types of data traffic including the data in a GGSN CDR (G-CDR) that is sent to the CGF. Modify APN General tab: Selection Mode, Accounting Mode, Authentication Type, Authentication Protocol Priority, Bearer Control Mode, Delete Home Agent IP Address, Home Agent IP Address (IPV4) PDP Context tab: Primary Contexts, Total Contexts, PDP Type, Delete Destination Context Name, Destination Context Name Charging Characteristics tab: Delete CC SGSN Type, CC SGSN Type, Home Behavior, Home Profile Bit, Roaming Behavior, Roaming Profile Bit, Visiting Behavior, Visiting Profile Bit Timeout tab: Delete Timeout Type, Timeout Type, Absolute Duration, Emergency Inactivity Duration, Idle Duration, Long Duration, Long Duration Inactivity Time, Long Duration Action Type, Long Duration Disconnection Type IP tab: IP Address Allocation Method, DHCP Proxy: Allow Deferred, DHCP Proxy: Allow User Specified, DHCP Proxy: Prefer DHCP Options, DHCP Relay: Allow User Specified, Local: Allow Deferred, Local: Allow User Specified, No Dynamic: Allow Deferred, No Dynamic: Allow User Specified, Delete IP Pool Name, IP Pool Name IPV6 tab: Delete IPV6 Pool Name, IPV6 Pool Name, Delete IPV6 DNS Type, IPV6 DNS Type, IPV6 DNS Address (IPV6), IPV6 Advertisement Interval, IPV6 Number of Advertisements AAA/DNS tab: Delete AAA Type, AAA Type, AAA Group Name, AAA Secondary Group Name, Delete DNS Type, DNS Type, DNS IP Address(IPV4) GTPP Group tab: Delete GTPP Group, GTPP Group Name, Accounting Context Name Miscellaneous tab: Source Violation Type, Drop Limit, Delete Restriction Value, Restriction Value Table 26-12 APN Commands (continued) Command Inputs Required and Notes 26-25 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Working With GPRS/UMTS Network Technologies GTPP performs the following functions: • Transfers CDRs between the Charging Data Function (CDF) and CGF. • Redirects CDRs to another CGF. • Advertises to peers about its CDR transfer capability; for example, after a period of service down time. • Prevents duplicate CDRs that might arise during redundancy operations. The CDR duplication prevention function is carried out by marking potentially duplicated CDR packets, and delegating the final duplicate deletion task to a CGF or the billing domain, instead of handling the possible duplicates solely by GTPP messaging. Prime Network provides support on gathering the GTPP accounting setup details that are configured in the mobile gateway for transferring the different types of CDRs from charging agent to a GTPP server or accounting server. GTPP is configured within the accounting context of an APN and is also used by GGSN, P-GW, and S-GW to transmit CDRs to CGF. The following topics provide details on how to work with GTPP in Prime Network Vision: • Viewing GTPP Properties, page 26-25 • Viewing Additional Characteristics of a GTPP, page 26-26 • GTPP Commands, page 26-30 Viewing GTPP Properties Prime Network Vision displays the GTPPs in a GTPP container under the Mobile node in the logical inventory. The icon used for representing GTPPs in the logical inventory is explained in Logical Inventory Icons, page A-6. To view GTPP properties: Step 1 Right-click the required device in Prime Network Vision and choose Inventory. Step 2 In the logical inventory window, choose Logical Inventory > Context > Mobile > GTPP Container. Prime Network Vision displays the list of GTPP groups configured under the container. You can view the individual GTPP group details from the table on the right pane or by choosing Logical Inventory >Context > Mobile > GTPP Container > GTPP Group. Table 26-13 describes the details available for each GTPP group. 26-26 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Working With GPRS/UMTS Network Technologies Viewing Additional Characteristics of a GTPP To view additional characteristics of a GTPP: Step 1 Right-click the required device in Prime Network Vision and choose Inventory. Step 2 In the logical inventory window, choose Logical Inventory > Context > Mobile > GTPP Container >GTPP. Table 26-13 GTPP Properties in Logical Inventory Field Description Group Name Name of the GTPP group. CDR Storage Mode Storage mode for CDRs, which could be Local or Remote. CDR Timeout Maximum amount of time the system waits for a response from the CGF before assuming the packet is lost. CDR Max Retries Number of times the system attempts to a CGF that is not responding. Max CDR Size (bytes) Maximum payload size of the GTPP packet. Max CDR Wait Time Maximum payload size of the GTPP packet. The payload includes the CDR and the GTPP header. Max CDRs in Message Maximum number of CDRs allowed in a single packet. Recover Files Sequence Number Indicates whether recovery of file sequence number is enabled or not. If enabled, everytime the machine is rebooted, the file sequence number continues from the last sequence number. Data Request Start Sequence Number The starting sequence number to be used in the GTPP data record transfer (DRT) record. Start File Sequence Number Starting value of the file sequence number. Source Port Validation Indicates whether port checking is enabled or disabled for node alive/echo/redirection requests from the CGF. Dictionary Dictionary supported by the GTPP group. Accounting Server Group GTPP group, in which the accounting server is configured. Context Name Name of the context, in which the CGF is configured. Primary Accounting Server Address IPv4 or IPv6 address of the CGF. Port UDP port over which the GGSN communicates with the CGF. State Status of the CGF, which could be Active or Inactive. Priority Relative priority of the CGF. This priority determines which CGF server to send the accounting data to. 26-27 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Working With GPRS/UMTS Network Technologies Step 3 Expand the GTPP node. The following list of characteristics configured for the GGSN are displayed: – Accounting Server Failure Detection—Attributes of the CGF accounting server within the GTPP server group. – CDR Attributes Indicator—Indicates whether associated attributes are enabled or disabled for CDR generation. – CDR Triggers—Attributes that trigger CDR generation. – Charging Agent— IP address and port of the system interface within the current context used to communicate with the CGF or the GTPP Storage Server (GSS). – EGCDR Data Generation Configuration—Attributes that represent the GTPP eG-CDR data generation configuration. – Local Storage—Storage server information, if CDR storage mode is Local. – MBMS CDR Triggers—Attributes that trigger the MBMS CDR generation. – Storage Server—Configuration information for the GTPP backup storage server. Step 4 Click each of one of these characteristics to view its properties on the right pane. See Table 26-14 for more details on the properties of each characteristics configured for the GTPP. Table 26-14 GTPP Characteristics Field Description Accounting Server Failure Detection Detect Dead Server Consecutive Failures Number of failures that could occur before marking a CGF as dead (down). Dead Server Suppress CDRs Indicates whether suppression of CDRs is enabled or disabled when the GTPP server is detected as dead or unreachable. Dead Time Maximum duration, in seconds, before marking a CGF as dead on consecutive failures. Echo Timeout The amount of time that must elapse before the system attempts to communicate with a CGF that was previously unreachable. Echo Max Retries Number of times the system attempts to communicate with a GTPP backup storage server that is not responding. Redirection Allowed Indicates whether redirection of CDRs is allowed or not, when the primary CGF is unavailable. Duplicate Hold Time Minutes Number of minutes to hold on to CDRs that may be duplicates, when the primary CGF is down. 26-28 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Working With GPRS/UMTS Network Technologies CDR Attributes Indicator Indicators Indicates whether the following CDR attributes are enabled or not: • PDP Type • PDP Address • Dynamic Flag • Diagnostics • Node ID • Charging Characteristic Selection Mode • Local Record Sequence Number • MSISDN • PLMN ID • PGW PLMN ID • IMEI • RAT • User Location Information • List of Service Data • Served MNAI • Start Time • Stop Time • PDN Connection ID • Served PDP PDN Address Extension • Duration CDR Triggers Triggers Indicates whether the following CDR triggers are enabled or not: • Volume Limit • Time Limit • Tariff Time Change • Serving Node Change Limit • Intra SGSN Group Change • Inter PLMN SGSN Change • EGCDR Max LOSDV Limit • QOS Change • RAT Change • MS Timezone Change • Direct Tunnel Table 26-14 GTPP Characteristics (continued) Field Description 26-29 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Working With GPRS/UMTS Network Technologies Charging Agent IP Address IP address of the charging agent. Port Port of the charging agent. EGCDR Data Generation Configuration Service Interval The volume octet counts for the generation of the interim eG-CDRs to service data flow container in flow-based charging (FBC). Service Idle Timeout Time interval, in seconds, to close the eG-CDR, if the minimum time duration thresholds for service data flow containers are satisfied in FBC. Delete Service Thresholds Configured threshold in eG-CDR to be deleted in the service. Include All LOSDVs Indicates whether all content IDs are included in the final eG-CDR or not. LOSDV Max Containers Maximum number of List of Service Data Volume (LoSDV) containers in one eG-CDR. LOTDV Max Containers Maximum number of List of Service Data Volume (LoSDV) containers in one eG-CDR. Closing Cause Unique Indicates whether the same closing cause needs to be included for multiple final eG-CDRs or not. Local Storage File Format File format to store CDRs. File Compression Type of compression used on CDR files stored locally. None indicates that file compression is disabled. File Rotation Time Interval Time duration, in seconds, after which CDR file rotation happens. File Rotation Volume Limit (MB) Volume of CDR file, in MB, after which CDR file rotation happens. File Rotation CDR Count Number of CDRs to include in a CDR file after which CDR file rotation happens. Force File Rotation by Time Interval Indicates whether file rotation is forced or not. If this is enabled, the system is forced to do a file rotation at specified interval, even if there are no CDRs generated. Purge Processed Files Indicates whether processed files must be processed or not. MBMS CDR Triggers Interval Specifies the normal time duration that must elapse before closing an accounting record provided that any or all of the following conditions are satisfied: • Down link traffic volume is reached within the time interval • Tariff time based trigger occurred within the time interval • Data volume (uplink and downlink) bucket trigger occurred within the time interval Buckets Total number of data buckets configured for MBMS CDR trigger service. Storage Server Table 26-14 GTPP Characteristics (continued) Field Description 26-30 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Working With GPRS/UMTS Network Technologies GTPP Commands The following commands can be launched from the inventory by right-clicking a GTPP and choosing Commands > Configuration or Commands > Show. Before executing any commands, you can preview them and view the results. If desired, you can also schedule the commands. To find out if a device supports these commands, see the Cisco Prime Network 3.10 Supported Cisco VNEs. Note You might be prompted to enter your device access credentials while executing a command. Once you have entered them, these credentials will be used for every subsequent execution of a command in the same GUI client session. If you want to change the credentials, click Edit Credentials. Edit Credentials button will not be available for SNMP commands or if the command is scheduled for a later time. IP Address IP address of the backup storage server. Port UDP port number over which the GGSN communicates with the backup storage server. Timeout Maximum amount of time, in seconds, the system waits for a response from the GTPP backup storage server before assuming the packet is lost. Max Retries Number of times the system attempts to communicate with a GTPP backup storage server that is not responding. Table 26-14 GTPP Characteristics (continued) Field Description 26-31 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Working With GPRS/UMTS Network Technologies Working with EGTP Evolved GPRS Tunneling Protocol (EGTP) formulates the primary bearer plane protocol within an LTE / EPC architecture. It provides support for tunnel management including handover procedures within and across LTE networks. This topic contains the following sections: • Viewing EGTP Properties, page 26-31 • EGTP Commands, page 26-32 Viewing EGTP Properties Prime Network Vision displays the EGTPs in an EGTP container under the Mobile node in the logical inventory. The icon used for representing EGTPs in the logical inventory is explained in Logical Inventory Icons, page A-6. To view EGTP properties: Step 1 Right-click the required device in Prime Network Vision and choose Inventory. Step 2 In the logical inventory window, choose Logical Inventory > Context > Mobile > EGTP Container. Table 26-15 GTPP Commands Command Type Command Inputs Required and Notes Configuration Create CGF Server Address (IPV4), Server Port, Server Priority, Server Max Create Storage Server IP Address (IPV4), Port Number, Max Retries, Timeout, Mode Type Modify Storage Server (GTPP Container > GTPP Group > Storage Server) Max Retries, Timeout, Mode Type Delete Storage Server (GTPP Container > GTPP Group > Storage Server) Click Execute Now to delete the storage server. Delete CGF Server Address (IPV4), Server Port Click Execute Now to delete the CGF. Delete GTPP Click Execute Now to delete the GTPP. Modify CGF Server Address (IPV4), Server Port, Server Priority, Server Max Modify GTPP Dictionary, Transport Layer Protocols, Delete Accounting Type, Accounting Type, RAT Generation Type Show Show CGF Click Execute Now to view the CGF. 26-32 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Working With GPRS/UMTS Network Technologies Prime Network Vision displays the list of EGTPs configured under the container. You can view the individual EGTP details from the table on the right pane or by choosing Logical Inventory >Context > Mobile > EGTP Container > EGTP. Table 26-16 describes the details available for each EGTP. EGTP Commands The following commands can be launched from the inventory by right-clicking an EGTP and choosing Commands > Configuration. Before executing any commands, you can preview them and view the results. If desired, you can also schedule the commands. To find out if a device supports these commands, see the Cisco Prime Network 3.10 Supported Cisco VNEs. Note You might be prompted to enter your device access credentials while executing a command. Once you have entered them, these credentials will be used for every subsequent execution of a command in the same GUI client session. If you want to change the credentials, click Edit Credentials. Edit Credentials button will not be available for SNMP commands or if the command is scheduled for a later time. Table 26-16 EGTP Properties in Logical Inventory Field Description Service Name Name of the EGTP service. Status Status of the EGTP service. Message Validation Mode Mode of message validation for the EGTP service. Interface Type Interface type for the EGTP service. Restart Counter Restart counter value for the EGTP service. GTPC Retransmission Timeout Control packet retransmission timeout for the EGTP service. GTPC Max Request Retransmissions Maximum number of request retransmissions for the EGTP service. GTPC IP QoS DSCP Value The IP QoS DSCP value for the EGTP service. GTPC Echo Indicates whether GTPC echo is configured for the EGTP service or not. GTPC Echo Interval GTPC echo interval for the EGTP service. GTPC Echo Mode GTPC echo mode, which could be Dynamic or Default. GTPC Smooth Factor Smooth factor used in the dynamic echo timer for the EGTP service. 26-33 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies LTE Networks - An Overview LTE Networks - An Overview Long Term Evolution (LTE) is the latest step in moving forward from the cellular 3G services, such as GSM to UMTS to HSPA to LTE or CDMA to LTE. LTE is based on standards developed by the Third Generation Partnership Project (3GPP). LTE may also be referred more formally as Evolved UMTS Terrestrial Radio Access Network (E-UTRAN). Following are the main objectives of an LTE network. • Increased downlink and uplink peak data rates • Scalable bandwidth • Improved spectral efficiency • All IP network Figure 26-3 provides the topology of a basic LTE network. Table 26-17 EGTP Commands Command Type Command Inputs Required and Notes Configuration Modify EGTP General tab: Delete GTPU Service, GTPU Service, Interface, Validation Mode GTPC Attributes tab: Retransmission Timeout, Echo Retransmission Timeout, Maximum Retries, Delete Echo Interval, Echo Interval, Dynamic Echo Timer, Smooth Factor, IP QoS DSCP, Delete Bind Address, Bind Address Type, Bind Address, Delete Path Failure Detection Policy, Path Failure Detection Policy Delete EGTP Click Execute Now to delete the EGTP. 26-34 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Working with LTE Network Technologies Figure 26-3 Basic LTE Network Topology Working with LTE Network Technologies The E-UTRAN uses a simplified single node architecture consisting of the eNodeBs (E-UTRAN Node B). The eNB communicates with the Evolved Packet Core (EPC) using the S1 interface, specifically with the Mobility Management Entity (MME) and Serving Gateway (S-GW) using S1-U interface. The PDN Gateway (P-GW0 provides connectivity to the external packet data networks. Following sections provide more details on these services and their support in Prime Network: • Monitoring SAE-GW, page 26-34 • Working with PDN-Gateway, page 26-36 • Working with Serving Gateway, page 26-38 • Viewing QCI-QoS Mapping, page 26-40 Monitoring SAE-GW Systems Architecture Evolution (SAE) has a flat all-IP architecture with separation of control plane and user plane traffic. The main component of SAE architecture is the Evolved Packet Core (EPC), also known as SAE Core. The EPC serves as an equivalent to GPRS networks by using its subcomponents Mobility Management Entities (MMEs), Serving Gateway (S-GW), and PDN Gateway (P-GW). 26-35 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Working with LTE Network Technologies Mobility Management Entity (MME) MME is the key control node for a Long Term Evolution (LTE) access network. It is responsible for idle mode User Equipment (UE) tracking and paging procedure including retransmissions. It is involved in the bearer activation/deactivation process and is also responsible for choosing the S-GW for a UE at the initial attach and at time of intra-LTE handover involving Core Network (CN) node relocation. The MME also provides the control plane function for mobility between LTE and 2G/3G access networks with the S3 interface terminating at the MME from the SGSN. Serving Gateway (S-GW) The S-GW routes and forwards user data packets, while also acting as the mobility anchor for the user plane during inter-eNodeB handovers and as the anchor for mobility between LTE and other 3GPP technologies. For idle state UEs, the S-GW terminates the downlink data path and triggers paging when downlink data arrives for the UE. It manages and stores UE contexts, such as parameters of the IP bearer service, network internal routing information, and so on. It also performs replication of the user traffic in case of lawful interception. For more information, see Working with Serving Gateway, page 26-38. PDN Gateway (P-GW) The P-GW provides connectivity from the UE to external packet data networks by being the point of exit and entry of traffic for the UE. A UE may have simultaneous connectivity with more than one P-GW for accessing multiple PDNs. The P-GW performs policy enforcement, packet filtering for each user, charging support, lawful interception, and packet screening. Another key role of the P-GW is to act as the anchor for mobility between 3GPP and non-3GPP technologies such as WiMAX and 3GPP2. For more information, see Working with PDN-Gateway, page 26-36. Running S-GW and P-GW services together as a SAE-GW provides the following benefits: • Higher capacity—For a UE with one PDN connection that is passing through standalone S-GW and P-GW services consumes 2 license units because both S-GW and P-GW services account for it separately. SAE-GW as a single node consumes only one license unit for the same, thus increasing the capacity. • Cohesive configuration—Configuration and management of SAE-GW as a node is simpler to follow and logical to explain. See Viewing SAE-GW Properties, page 26-35 for details on how to view SAE-GW properties in Prime Network Vision. Viewing SAE-GW Properties Prime Network Vision displays the SAE-GWs in a SAE-GW container under the Mobile node in the logical inventory. The icon used for representing SAE-GW in the logical inventory is explained in Logical Inventory Icons, page A-6. To view SAE-GW properties: Step 1 Right-click the required device in Prime Network Vision and choose Inventory. Step 2 In the logical inventory window, choose Logical Inventory > Context > Mobile > SAE-GW Container. Prime Network Vision displays the list of SAE-GW services configured under the container. You can view the individual SAE-GW service details from the table on the right pane or by choosing Logical Inventory > Context > Mobile > SAE-GW Container > SAE-GW. Table 26-18 describes the details available for each SAE-GW. 26-36 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Working with LTE Network Technologies Working with PDN-Gateway PDN Gateway (P-GW) is the node that terminates the SGi interface towards the PDN. If a user equipment (UE) is accessing multiple PDNs, there may be more than one P-GW for that UE. The P-GW provides connectivity to the UE to external packet data networks by being the point of exit and entry of traffic for the UE. A UE may have simultaneous connectivity with more than one P-GW for accessing multiple PDNs. The P-GW facilitates policy enforcement, packet filtering for each user, charging support, lawful interception, and packet screening. The features of P-GW include: • Integration of multiple core network functions in a single node • Multiple instances of P-GW can enable call localization and local breakout • High performance across all parameters like, signaling, throughput, density, and latency • Integrated in-line services • Support for enhanced content charging, content filtering with blacklisting, dynamic network-based traffic optimization, application detection and optimization, stateful firewall, NAT translation, and lawful intercept • High-availability helps to ensure subscriber satisfaction The following topics explain how to work with P-GW in Prime Network Vision: • Viewing P-GW Properties, page 26-36 • P-GW Commands, page 26-37 Viewing P-GW Properties Prime Network Vision displays the P-GWs in a P-GW container under the Mobile node in the logical inventory. The icon used for representing P-GW in the logical inventory is explained in Logical Inventory Icons, page A-6. To view P-GW properties: Step 1 Right-click the required device in Prime Network Vision and choose Inventory. Table 26-18 SAE-GW Properties in Logical Inventory Field Description Service Name Name of the SAE-GW service. Service ID ID of the SAE-GW service. Status Status of the SAE-GW service. P-GW Service The P-GW service associated with the SAE-GW. S-GW Service The S-GW service associated with the SAE-GW. New Call Policy Specifies if the new call related behavior of SAE-GW service is enabled or disabled, when duplicate sessions with same IP address request is received. 26-37 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Working with LTE Network Technologies Step 2 In the logical inventory window, choose Logical Inventory > Context > Mobile > P-GW Container. Prime Network Vision displays the list of P-GW services configured under the container. You can view the individual P-GW service details from the table on the right pane or by choosing Logical Inventory >Context > Mobile > P-GW Container > P-GW. Table 26-19 describes the details available for each P-GW. Step 3 If the P-GW is associated with PLMNs, you can view the details of the PLMNs on clicking the specified P-GW. P-GW Commands The following commands can be launched from the inventory by right-clicking a P-GW and choosing Commands > Configuration. Before executing any commands, you can preview them and view the results. If desired, you can also schedule the commands. To find out if a device supports these commands, see the Cisco Prime Network 3.10 Supported Cisco VNEs. Note You might be prompted to enter your device access credentials while executing a command. Once you have entered them, these credentials will be used for every subsequent execution of a command in the same GUI client session. If you want to change the credentials, click Edit Credentials. Edit Credentials button will not be available for SNMP commands or if the command is scheduled for a later time. Table 26-19 P-GW Properties in Logical Inventory Field Description Service Name Name of the P-GW service. Service Status Status of the P-GW service. EGTP Service Evolved GPRS Tunneling Protocol (EGTP) service associated with the P-GW. EGTP provides tunneling support for the P-GW. GGSN Service GGSN service associated with the P-GW. LMA Service Local Mobility Anchor (LMA) that facilitates proxy mobile IP on the P-GW. QCI QoS Mapping Table Name Table name of QoS class indices that enfore QoS parameters. New Call Policy Specifies if the new call related behavior of P-GW service is enabled or disabled, when duplicate sessions with same IP address request is received. Session Delete Delay Timeout Duration, in seconds, to retain a session before terminating it. SAE-GW Service Systems Architecture Evolution (SAE) gateway service associated with the P-GW. Table 26-20 P-GW Commands Command Inputs Required and Notes Create P-GW PLMN MCC Number, MNC Number, PLMN Type Delete P-GW Click Execute Now to delete the P-GW. 26-38 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Working with LTE Network Technologies Working with Serving Gateway In a Long Term Evolution (LTE) / Systems Architecture Evolution (SAE) network, a Serving Gateway (S-GW) acts as a demarcation point between the Radio Access Network (RAN) and core network, and manages user plane mobility. It serves as the mobility anchor when terminals move across areas served by different eNode-B elements in Evolved UMTS Terrestrial Radio Access Network (E-UTRAN), as well as across other 3GPP radio networks such as GSM EDGE Radio Access Network(GERAN) and UTRAN. S-GW buffers downlink packets and initiates network-triggered service request procedures. Other functions include lawful interception, packet routing and forwarding, transport level packet marking in the uplink and the downlink, accounting support for per user, and inter-operator charging. The S-GW routes and forwards user data packets, while also acting as the mobility anchor for the user plane during inter-eNode-B handovers and as the anchor for mobility between LTE and other 3GPP technologies. For idle state user equipment (UE), the S-GW terminates the downlink data path and triggers paging when downlink data arrives for the UE. It manages and stores UE contexts, such as parameters of the IP bearer service, network internal routing information, and so on. It also performs replication of the user traffic in case of lawful interception. The following topics provide details on how to work with S-GWs in Prime Network Vision: • Viewing S-GW Properties, page 26-38 • S-GW Commands, page 26-40 Viewing S-GW Properties Prime Network Vision displays the S-GWs in a S-GW container under the Mobile node in the logical inventory. The icon used for representing S-GW in the logical inventory is explained in Logical Inventory Icons, page A-6. To view S-GW properties: Step 1 Right-click the required device in Prime Network Vision and choose Inventory. Step 2 In the logical inventory window, choose Logical Inventory > Context > Mobile > S-GW Container. Prime Network Vision displays the list of S-GW services configured under the container. You can view the individual S-GW service details from the table on the right pane or by choosing Logical Inventory >Context > Mobile > S-GW Container > S-GW. Modify P-GW General tab: Delete Associate Service, Associate Service Name, Accociate Service Type, Delete QCI-QoS Mapping Name, QCI-QoS Mapping Name, Delete New Call Policy, New Call Policy, Delete Session DeleteDelay, Session Delete Delay, Session Delay Timeout FQDN tab: Delete FQDN, FQDN Host Name, Realm Name Table 26-20 P-GW Commands Command Inputs Required and Notes 26-39 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Working with LTE Network Technologies Table 26-21 describes the details available for each S-GW. Step 3 If the S-GW is associated with PLMNs, you can view the PLMN entries on clicking the specified S-GW. Table 26-21 S-GW Properties in Logical Inventory Field Description Service Name Name of the S-GW service. Service Status Status of the S-GW service. Accounting Context Name of the context configured on the system that processes accounting for service requests handled by the S-GW service. Accounting GTPP Group Name of the accounting GTPP group associated with the S-GW service. This will hold the configured GTPP server group (for GTPP servers redundancy) on a S-GW service for CGF accounting functionality. Accounting Mode Accounting protocol, which could be GTPP or Radius-Diameter. Egress Protocol Egress protocol used for the S-GW service, which could be GTP, GTP-PMIP, or PMIP. Ingress EGTP Service Ingress EGTP service associated with the S-GW. EGTP provides tunneling support for the S-GW. Egress Context Context used for S-GW service egress. Egress ETGP Service Ingress EGTP service associated with the S-GW. EGTP provides tunneling support for the S-GW. Egress Mag Service Mobile Access Gateway (MAG) egress service through calls are routed to the S-GW. IMS Authorization Service IMS authorization service associated with the S-GW. Accounting Policy Accounting policy configured for the S-GW. New Call Policy Specifies if the new call related behavior of S-GW service is enabled or disabled, when duplicate sessions with same IP address request is received. QCI QoS Mapping Table Table name of QoS class indices that enfore QoS parameters. SAE GW Service Systems Architecture Evolution (SAE) gateway service associated with the S-GW. 26-40 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Working with LTE Network Technologies S-GW Commands The following commands can be launched from the inventory by right-clicking an S-W and choosing Commands > Configuration. Before executing any commands, you can preview them and view the results. If desired, you can also schedule the commands. To find out if a device supports these commands, see the Cisco Prime Network 3.10 Supported Cisco VNEs. Note You might be prompted to enter your device access credentials while executing a command. Once you have entered them, these credentials will be used for every subsequent execution of a command in the same GUI client session. If you want to change the credentials, click Edit Credentials. Edit Credentials button will not be available for SNMP commands or if the command is scheduled for a later time. Viewing QCI-QoS Mapping The QoS Class Index (QCI) to QoS mapping configuration mode is used to map QCIs to enforceable QoS parameters. Mapping can occur between the RAN and the S-GW, the MME, and/or the P-GW in an LTE network or between the RAN and the eHRPD Serving Gateway (HSGW) in an eHRPD network. This is a global configuration. These maps can be imported by P-gateway and S-gateway to enforce these parameters on upstream/downstream traffic. Prime Network Vision displays the QCI-QoS mapping information under the Mobile node in the logical inventory. See Figure 26-4. Note QCI-QoS mapping is applicable only for the ‘local’ context in the logical inventory. To view QCI-QoS mapping: Step 1 Right-click the required device in Prime Network Vision and choose Inventory. Step 2 In the logical inventory window, choose Logical Inventory > local > Mobile > QCI-QoS Mapping. Table 26-22 S-GW Commands Command Inputs Required and Notes Create S-GW PLMN MCC Number, MNC Number, PLMN Type Delete S-GW Click Execute Now to delete the P-GW. Modify S-GW General tab: Accounting Mode, Delete Accounting Context Name, Accounting Context Name, Gtpp Group Name, Delete QCI-QoS Mapping Name, QCI-QoS Mapping Name, Egress Protocol, Delete Egress Context Name, Egress Context Name, Delete EGTP Service Name, EGTP Service Name, Delete MAG Service Name, MAG Service Name, Delete Ingress EGTP Service Name, Ingress EGTP Service Name, Delete Accounting Policy Name, Accounting Policy Name, Delete IMS Authorization Service Name, IMS Authorization Service Name, Delete New Call Policy, New Call Policy 26-41 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Viewing Operator Policies, APN Remaps, and APN Profiles Prime Network Vision displays the list of QCI-QoS mapping records configured under the container. You can view the individual record from the table on the right pane or by choosing Logical Inventory >Context > Mobile > QCI-QoS Mapping > Mapping Name. Table 26-23 describes the QCI-QoS mapping details. Viewing Operator Policies, APN Remaps, and APN Profiles Operator policy provides mechanisms to fine tune the behavior of subsets of subscribers above and beyond the behaviors described in the user profile. It can also be used to control the behavior of visiting subscribers in roaming scenarios, enforcing roaming agreements, and providing a measure of local protection against foreign subscribers. An operator policy associates APNs, APN profiles, an APN remap table, and a call-control profile to ranges of International Mobile Subscriber Identities (IMSIs). These profiles and tables are created and defined within their own configuration modes to generate sets of rules and instructions that can be reused and assigned to multiple policies. In this manner, an operator policy manages the application of rules governing the services, facilities, and privileges available to subscribers. These policies can override standard behaviors and provide mechanisms for an operator to get around the limitations of other infrastructure elements, such as DNS servers and HSSs. Note Operator policies and APN profiles are applicable only for the ‘local’ context in the logical inventory. Table 26-23 QCI-QoS Mapping Field Description Mapping Name Name of the QCI-QoS mapping record. QCI-QoS Mapping Table QCI Number QCI number. QCI Type QCI type. Uplink DSCP marking to be used for encapsulation and UDP for uplink traffic Downlink DSCP marking to be used for encapsulation and UDP for downlink traffic Max Packet Delay Maximum packet delay, in milliseconds, that can be applied to the data. Max Error Rate Maximum error loss rate of non congestion related packet loss. Delay Class Packet delay. Precedence Class Indicates packet precedence. Reliability Class Indicates packet reliability. Traffic Policing Interval Traffic policing interval. 26-42 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Viewing Operator Policies, APN Remaps, and APN Profiles The following topics explain how to view operator policies, APN remaps, and APN profiles in Prime Network Vision: • Viewing Operator Policies, page 26-42 • Viewing APN Remaps, page 26-44 • Viewing APN Profiles, page 26-46 Viewing Operator Policies Operator policies provide an operator with a range of control to manage the services, facilities, and privileges available to subscribers. By configuring the various components of an operator policy, the operator fine tunes any desired restrictions or limitations needed to control call handling and this can be done for a group of callers within a defined IMSI range or per subscriber. Besides enhancing operator control through configuration, the operator policy feature minimizes configuration by drastically reducing the number of configuration lines needed. Operator policy maximizes configurations by breaking them into the following reusable components that can be shared across IMSI ranges or subscribers: • Call-control profiles • IMEI profiles (SGSN only) • APN profiles • APN remap tables • Operator policies • IMSI ranges To view operator policies in logical inventory: Step 1 Right-click the required device in Prime Network Vision and choose Inventory. Step 2 In the logical inventory window, choose Logical Inventory > local > Mobile > Policy > Operator Policies Prime Network Vision displays the list of operator policies configured under the container. You can view the individual policy details from the table on the right pane or by choosing Logical Inventory > local > Mobile > Policy > Operator Policies > Policy. Table 26-24 describes the details available for each operator policy. If an operator policy is configured with IMEI ranges and APN entries, the details are displayed in the respective tabs IMEI Ranges and APN Entries on the content pane. Table 26-24 Operator Policies in Logical Inventory Field Description Name Name of the operator policy. Description Description of the operator policy. Call Control Profile Name Name of the call control profile associated with the operator policy. 26-43 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Viewing Operator Policies, APN Remaps, and APN Profiles Call Control Validity Indicates whether the call control profile name associated with the operator policy is valid or is not created yet (invalid). APN Remap Table Name Name of the APN remap table associated with the operator policy. APN Remap Table Validity Indicates whether the APN remap table name associated with the operator policy is valid or is not created yet (invalid). Default APN Profile Name Name of the default APN profile associated with the operator policy. Default APN Profile Validity Indicates whether the default APN profile name associated with the operator policy is valid or is not created yet (invalid). IMEI Ranges Start Range The starting number in the range of IMEI profiles. To Range The ending number in the range of IMEI profiles. Software Version Software version to fine tune the IMEI definition. Profile Name Name of the IMEI profile associated with the IMEI range. Displays ‘None’, if no profile is associated with the range. Validity Validity of the IMEI profile. APN Entries NI APN network identifier. NI APN Profile Name of the APN profile associated with the network identifier. An APN profile groups a set of APN-specific parameters that may be applicable to one or more APNs. When a subscriber requests an APN that has been identified in a selected operator policy, the parameter values configured in the associated APN profile are applied. NI APN Profile Validity Indicates whether the NI APN profile associated with the operator policy is valid or is not created yet (invalid). OI APN operator identifier. OI APN Profile Name of the APN profile associated with the operator identifier. An APN profile groups a set of APN-specific parameters that may be applicable to one or more APNs. When a subscriber requests an APN that has been identified in a selected operator policy, the parameter values configured in the associated APN profile are applied. OI APN Profile Indicates whether the OI APN profile associated with the operator policy is valid or is not created yet (invalid). Table 26-24 Operator Policies in Logical Inventory (continued) Field Description 26-44 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Viewing Operator Policies, APN Remaps, and APN Profiles Viewing APN Remaps An APN remap tables allow an operator to override an APN specified by a user, or the APN selected during the normal APN selection procedure, as specified by 3GPP TS 23.060. This level of control enables operators to deal with situations such as: • An APN is provided in the activation request that does not match with any of the subscribed APNs; either a different APN was entered or the APN could have been misspelled. In such situations, the SGSN rejects the activation request. It is possible to correct the APN, creating a valid name so that the activation request is not rejected. • In some cases, an operator might want to force certain devices or users to use a specific APN. For example, a set of mobile users may need to be directed to a specific APN. In such situations, the operator needs to override the selected APN. An APN remap table group is a set of APN-handling configurations that may be applicable to one or more subscribers. When a subscriber requests an APN that has been identified in a selected operator policy, the parameter values configured in the associated APN remap table are applied. For example, an APN remap table allows configuration of the following: • APN aliasing—Maps incoming APN to a different APN, based on partial string match (MME and SGSN) or matching charging characteristic (SGSN only). • Wildcard APN—Allows APN to be provided by the SGSN, when wildcard subscription is present and the user has not requested an APN. • Default APN—Allows a configured default APN to be used, when the requested APN cannot be used. APN remap tables are configured with commands in the APN Remap Table configuration mode. A single APN remap table can be associated with multiple operator policies, but an operator policy can only be associated with a single APN remap table. To view APN remap properties in logical inventory: Step 1 Right-click the required device in Prime Network Vision and choose Inventory. Step 2 In the logical inventory window, choose Logical Inventory > local > Mobile > > Profile > APN Remaps Prime Network Vision displays the list of APN remaps configured under the container. You can view the individual APN remap details from the table on the right pane or by choosing Logical Inventory > local > Mobile > Profile > APN Remaps > APN Remap. Table 26-25 describes the details available for each APN remap. If an APN remap is configured with charging characteristics and NI and OI entries, the details are displayed in the respective tabs Charging Characteristics and Network And Operator Identifier Entries on the content pane. Table 26-25 APN Remap Properties in Logical Inventory Field Description Name Name of the APN remap. Description Description of the APN remap. APN When No APN Requested APN network identifier that will be used when no APN is requested. 26-45 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Viewing Operator Policies, APN Remaps, and APN Profiles Step 3 If a default APN is configured for the remap, click the Default APN node under the APN remap. You can view the following details on the content pane. Wildcard APN for IPv4 Wildcard APN included in the subscriber record, with PDP type as IPv4 context. Wildcard APN for IPv6 Wildcard APN included in the subscriber record, with PDP type as IPv6 context. Wildcard APN for IPv4v6 Wildcard APN included in the subscriber record, with PDP type as both IPv4 and IPv6 contexts. Wildcard APN for PPP Wildcard APN included in the subscriber record, with PDP type as PPP context. Charging Characteristics Profile Index Profile index in charging characteristics. Behavior Bit Value Behavior bit in charging characteristics. APN For Overriding Name of the APN profile that the charging characteristic attributes must be applied to, to generate CDRs. Network And Operator Identifier Entries Requested NI The old network identifier that is being mapped for replacement. Mapped to NI The new network identifier. NI Wildcard Replace String When a wildcard character is included in the old APN network identifier, this parameter identifies the information to replace the wildcard in the new APN network identifier. Requested OI The old operator identifier that is being mapped for replacement. Mapped to OI The new operator identifier. OI MNC Replace String When a wildcard character is included in the MNC portion of the old APN operator identifier, this parameter identifies the information to replace the wildcard in the new APN operator identifier. OI MCC Replace String When a wildcard character is included in the MCC portion of the old APN operator identifier, this parameter identifies the information to replace the wildcard in the new APN operator identifier. Table 26-25 APN Remap Properties in Logical Inventory (continued) Field Description 26-46 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Viewing Operator Policies, APN Remaps, and APN Profiles Viewing APN Profiles APN Profile defines a set of parameters controlling the SGSN or MME behavior, when a specific APN is received or no APN is received in a request. An APN profile is a key element in the Operator Policy feature. An APN profile is not used or valid unless it is associated with an APN and this association is specified in an operator policy. Essentially, an APN profile is a template which groups a set of APN-specific commands that may be applicable to one or more APNs. When a subscriber requests an APN that has been identified in a selected operator policy, then the set of commands in the associated APN profile will be applied. The same APN profile can be associated with multiple APNs and multiple operator policies. An APN profile groups a set of APN-specific parameters that may be applicable to one or more APNs. When a subscriber requests an APN that has been identified in a selected operator policy, the parameter values configured in the associated APN profile are applied. For example: • Enable or disable a direct tunnel (DT) per APN (SGSN). • Define charging characters for calls associated with a specific APN. • Identify a specific GGSN to be used for calls associated with a specific APN (SGSN). • Define various quality of service (QoS) parameters to be applied to calls associated with a specific APN. • Restrict or allow PDP context activation on the basis of access type for calls associated with a specific APN. A single APN profile can be associated with multiple operator policies. To view APN profile properties in logical inventory: Step 1 Right-click the required device in Prime Network Vision and choose Inventory. Step 2 In the logical inventory window, choose Logical Inventory > local > Mobile > Profile > APN Profiles. Table 26-26 Default APN Properties in Logical Inventory Field Description Default APN Name Name of the default APN. Use Default APN When No APN is Requested Indicates whether the configured default APN can be used or not, if there is no APN in the request. Use Default APN When DNS Query Fails Indicates whether the configured default APN can be used or not, if DNS query fails. Fallback APN to Use A fallback APN to be used when the configured default APN is not present in the subscription, so that activation does not fail. Fallback APN in First Subscription Indicates whether APN from the first subscription record must be used, when the configured default APN is not available. Use APN From Single Subscription Record Indicates whether APN from the subscription record must be used, if it is the only record available and the normal APN selection fails. 26-47 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Viewing Operator Policies, APN Remaps, and APN Profiles Prime Network Vision displays the list of APN profiles configured under the container. You can view the individual APN profile details from the table on the right pane or by choosing Logical Inventory > local > Mobile > Profile > APN Profiles > APN Profile. Table 26-27 describes the details available for each APN remap. If additional properties are configured for the APN profile, you can click the respective tabs on the content pane to view the details: – Gateway Entries – RANAP ARP Entries – QoS Class Entries – Uplink Traffic Policing Entries/Downlink Traffic Policing Entries Table 26-27 APN Profile Properties in Logical Inventory Field Description Name Name of the APN profile. Description Description of the APN profile. QoS Service Capping Prefer Type Operational preferences for QoS parameters, specifically QoS bit rates. Value could be one of the following: • both-hlr-and-local—Instructs the SGSN to use the locally configured QoS or HLR subscription. • hlr-subscription—Instructs the SGSN to use QoS bit rate from HLR configuration and use the same for session establishment. • local—Instructs the SGSN to use the locally configured QoS bit rate and use the same for session establishment. Address Resolution Mode Address resolution mode of the APN profile, which could be one of the following: • fallback-for-dns—Uses DNS query for address resolution. • local—Uses locally configured address. CC Preferred Source Charging characteristic settings to be used for S-CDRs, which could be one of the following: • hlr-value-for-scdrs—Instructs the system to use charging characteristic settings received from the HLR for S-CDRs. • local-value-for-scdrs—Instructs the profile preference to use only locally configured/stored charging characteristic settings for S-CDRs. CC Local SCDR Behavior Bit Value of the behavior bit for the charging characteristics for S-CDRs. CC Local SCDR Behavior Profile Index Value of the profile index for the charging characteristics for S-CDRs. GGSN Algorithm Applicable Selection algorithm for GGSNs. This parameter allows the operator to configure multiple GGSN pools by assigning the GGSN to a secondary pool of GGSNs. 26-48 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Viewing Operator Policies, APN Remaps, and APN Profiles IP Source Validation Configures settings related to IP source violation detection with one of the following criteria: • deactivate—Deactivates the PDP context with one of the following conditions: – Deactivates all PDP contexts of the MS/UE. Default is to deactivate errant PDP contexts. – Excludes packets having an invalid source IP address from the statistics used in the accounting records. – Deactivates all assosiated PDP contexts (primary/secondary). Default is to deactivate errant PDP contexts. – Configures maximum number of allowed IP source violations before the session is deactivated. • discard—Discards errant packets and excludes packets having an invalid source IP address from the statistics used in the accounting records. • ignore—Ignores checking of packets for MS/UE IP source violation. IP Source Validation Tolerance Limit Maximum number of allowed IP source violations before the session is deactivated. Direct Tunnel Permission for direct tunnel establishment by GGSNs, which could be not-permitted-by-ggsn or remove. Private Extension LORC IE to GGSN Indicates whether GTPC private extension is enabled or not for the over charging protection feature of the GGSN. Private Extension LORC IE to SGSN Indicates whether GTPC private extension is enabled or not for the over charging protection feature of the SGSN. Idle Mode Access Control List IPV4 Group of IPv4 Access Control Lists (ACLs) that define rules to apply to downlink data destined for UEs in an idle mode. Idle Mode Access Control List IPV6 Group of IPv6 ACLs that define rules to apply to downlink data destined for UEs in an idle mode. DNS Query with MSISDN Start Offset Position The position of the first digit in the MSISDN to start an offset and create a new APN DNS query string that is intended to assist roaming subscribers to use the local GGSN. DNS Query with MSISDN End Offset Position The position of the last digit in the MSISDN to be part of the offset. DNS Query with LAC or RAC Indicates whether geographical information must be appended to the APN string that is sent to the DNS query or not. This information is used during the DNS query process to select the geographically closest GGSN. DNS Query with RNC ID Indicates whether the SGSN must include the ID of the calling RNC in the APN DNS query string or not. DNS Query with Charging Characteristics Indicates whether charging characteristic configuration is enabled for the APN profile or not. Table 26-27 APN Profile Properties in Logical Inventory (continued) Field Description 26-49 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Viewing Operator Policies, APN Remaps, and APN Profiles DNS Query Charging Characteristics ID Format Format of the charging characteristic information to be included. Gateway Entries Gateway Entry Gateway entry configured for the APN profile. IP Address IPv4 or IPv6 addresses of the gateway configured. Priority Priority of the gateway to consider during address selection. Weight Weightage or importance assigned to the gateway for load balancing. Pool Gateway pool assigned. Gateway Type Type of gateway configured, which could be GGSN or P-GW. RANAP ARP Entries Traffic Class Traffic class of the Radio Access Network Application Part (RANAP) configuration. Subscription Priority Subscription priority of the traffic class; the lowest number denoting the highest priority. Priority Level Priority level for the subscription priority. Preemption Capability Preemption capability value of the traffic class. Preemption Vulnerability Preemption vulnerability value of the traffic class. Queuing Allowed Indicates whether queuing is allowed for the traffic class or not. QoS Class Entries Class Name Traffing class of the QoS configuration. Service Delivery Unit Delivery Order Indicates whether bearer should provide in-sequence delivery of service data units (SDUs) or not. Delivery of Erroneous Service Delivery Units Indicates whether SDUs detected as erroneous should be delivered or discarded. Max Bit Rate Uplink Maximum bit rate, in kbps, allowed for uplink between MS and the core network. Max Bit Rate Downlink Maximum bit rate, in kbps, allowed for downlink between MS and the core network. Allocation Retention Priority Relative importance compared to other Radio Access Bearers (RABs) for allocation and retention of the RAB. Traffic Handling Priority Relative importance for traffic handling when compared to other RABs. SDU Max Size Maximum allowed SDU size, in bytes. SDU Error Ratio Fraction of SDUs lost or detected as erroneous. Guaranteed Bit Rate Uplink Uplink bit rate, in kbps, that is assured for a given RAB between MS and the core network. Guaranteed Bit Rate Downlink Downlink bit rate, in kbps, that is assured for a given RAB between MS and the core network. Table 26-27 APN Profile Properties in Logical Inventory (continued) Field Description 26-50 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Viewing Operator Policies, APN Remaps, and APN Profiles Viewing Additional Characteristics of an APN Profile To view additional characteristics of an APN profile: Step 1 Right-click the required device in Prime Network Vision and choose Inventory. Step 2 In the logical inventory window, choose Logical Inventory > local > Mobile > Profile > APN Profiles > APN Profile. Minimum Transfer Delay Minimum transfer delay, in milliseconds. Residual BER Undetected bit error ratio (BER) in the delivered SDUs. MBR Map Down Attribute that maps or converts the received HLR maximum bit rate (MBR) (from value) to a locally configured downlink MBR value (to value). MBR Map Up Attribute that maps or converts the received HLR MBR (from value) to a locally configured uplink MBR value (to value). Uplink Traffic Policing Entries/Downlink Traffic Policing Entries Traffic Class Traffic class of the QoS configuration. Burst Size Auto Readjust Indicates whether the auto readjustment of burst size is enabled or disabled. This parameter is used in dynamic burst size calculation, for traffic policing, at the time of PDP activation or modification. Burst Size Auto Readjust Duration The burst size readjustment duration in seconds. This parameter indicates the number of seconds that the dynamic burst size calculation will last for. This allows the traffic to be throttled at the negotiated rates. Peak Burst Size (bytes) The peak burst size allowed, in bytes, for the uplink/downlink direction and QoS class. Guaranteed Burst Size (bytes) The guaranteed burst size allowed, in bytes, for the uplink/downlink direction and QoS class. Exceed Action The action to be taken on packets that exceed the committed data rate, but do not violate the peak data rate. The action could be one of the following: • Drop • Lower IP Precedence • Transmit Violate Action The action to be taken on packets that exceed both committed and peak data rates. The action could be one of the following: • Drop • Lower IP Precedence • Shape • Transmit Table 26-27 APN Profile Properties in Logical Inventory (continued) Field Description 26-51 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Viewing Operator Policies, APN Remaps, and APN Profiles Step 3 Expand the APN Profile node. The following list of characteristics configured for the APN profile are displayed: – PDP Inactivity Actions—Attributes related to PDP data inactivity. Once a data communication is in progress there are cases where this data communication can be inactive after some time, for example, when the user has locked the phone after browsing the internet or when the battery suddenly drains out. In such a case, the SGSN can take a configured action based on this inactivity. The inactivity timeout and the actions that can be taken based on certain conditions are modeled in this configuration. – QoS to DSCP Mapping (Downlink) / Qos to DSCP Mapping (Uplink)—Mapping of QoS parameters to DSCP. Configuration of the local values for the traffic class (TC) parameters for QoS configured for the APN. – PDP Restrictions (UMTS) / PDP Restrictions (GPRS)—Activation restrictions on PDP. Step 4 Click each of one of these characteristics to view its properties on the right pane. See Table 26-28 for more details on the properties of each characteristics configured for the APN profile. Table 26-28 APN Profile Additional Characteristics Field Description PDP Inactivity Actions PDP Inactivity Idle Timeout Timeout duration for PDP inactivity. PDP context is deactivated, if it is inactive for the given duration. PDP Inactivity Idle Timeout Action Action to be taken when the PDP data communication is inactive for the timeout duration. PDP Inactivity Idle Timeout Action Condition Condition when the GPRS detach procedure should be executed on the PDP context, when the timeout is reached or exceeded. PDP IPV4 IPV6 Override PDP type to use, per APN, if dual PDP type addressing is not supported by the network. QoS to DSCP Mapping (Downlink) / Qos to DSCP Mapping (Uplink) Conversational Real time conversational traffic class of service, which is reserved for voice traffic. Streaming Streaming traffic class of service, which handes one-way, real-time data transmission, such as streaming video or audio. Interactive Threshold Priority 1/2/3 Interactive traffic class of service with threshold priorities 1, 2, and 3. Background Background traffic class of service. This best-effort class manages traffic that is handled as a background function, such as e-mail, where time to delivery is not a key factor. Interactive TP1 Alloc P1/P2/P3 Interactive traffic class of service, with threshold priority 1 and allocation priorities 1, 2, and 3. Interactive TP2 Alloc P1/P2/P3 Interactive traffic class of service, with threshold priority 2 and allocation priorities 1, 2, and 3. Interactive TP3 Alloc P1/P2/P3 Interactive traffic class of service, with threshold priority 3 and allocation priorities 1, 2, and 3. 26-52 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Working with Active Charging Service Working with Active Charging Service Enhanced Charging Service (ECS), also known as Active Charging Service (ACS), is an in-line service, which is integrated within the platform and provides mobile operators the ability to offer tiered, detailed, and itemized billing to subscribers. Data packets flow through the ECS subsystem and relevant actions are performed based on the configured rules. Charging records (xCDRs) will be generated and forwarded to ESS or billing systems for prepaid and post paid billing. The major components and functions of an ECS solution are given below. Content Service Steering Content Service Steering (CSS) enables directing selective subscriber traffic into the ECS subsystem. CSS uses Access Control Lists (ACLs) to redirect selective subscriber traffic flows. ACLs control the flow of packets into and out of the system. ACLs consist of rules (ACL rules) or filters that control the action taken on packets matching the filter criteria. ACLs are configurable on a per-context basis and apply to a subscriber through either a subscriber profile (for PDSN) or an APN profile (for GGSN) in the destination context. Protocol Analyzer Protocol analyzer stack is responsible for analyzing the individual protocol fields during packet inspection. The analyzer supports the following types of packet inspection: • Shallow Packet Inspection—Inspection of the Layer 3 (IP header) and Layer 4 (for example, UDP or TCP header) information. • Deep Packet Inspection—Inspection of Layer 7 and above information. This functionality includes: – Detection of Uniform Resource Identifier (URI) information at level 7 (example, HTTP) – Identification of true destination in the case of terminating proxies, where shallow packet inspection only reveals the destination IP address/port number of a terminating proxy Rule Definitions Rule definitions (ruledefs) are user-defined expressions, based on protocol fields and protocol states, which define what actions to take when specific field values are true. PDP Restrictions (UMTS) / PDP Restrictions (GPRS) QoS Class Background Indicates whether background traffic class of service is enabled or not. QoS Class Interactive Indicates whether interactive traffic class of service is enabled or not. QoS Class Streaming Indicates whether streaming traffic class of service is enabled or not. QoS Class Conversational Indicates whether conversational traffic class of service is enabled or not. Table 26-28 APN Profile Additional Characteristics (continued) Field Description 26-53 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Working with Active Charging Service Most important rule definitions are related to Routing and Charging as explained below: • Routing Ruledefs—Routing ruledefs are used to route packets to content analyzers. Routing ruledefs determine which content analyzer to route the packet to, when the protocol fields and/or protocol states in ruledef expression are true. • Charging Ruledefs—Charging ruledefs are used to specify what action to take based on the analysis done by the content analyzers. Actions can include redirection, charge value, and billing record emission. Rule Base A rule base is a collection of rule definitions and their associated billing policy. The rule base determines the action to be taken when a rule is matched. Rule bases can also be used to apply the same rule definitions for several subscribers, which eliminate the need to have unique rule definition for each subscriber. We can set priority, default bandwidth policy, type of billing for subscriber sessions, for a rule definition or group of rule definitions in the rule base. Content Filtering ACS also offers a content filtering mechanism. Content filtering is an in-line service available for 3GPP and 3GPP2 networks to filter HTTP and WAP requests from mobile subscribers, based on the URLs in the requests. Content filtering uses the DPI feature of ECS to discern HTTP and WAP requests. This enables operators to filter and control the content that an individual subscriber can access, so that subscribers are inadvertently not exposed to universally unacceptable content and/or content inappropriate as per the subscribers’ preferences. The content filtering service offers the following solutions: • URL Blacklisting—With this solution, all HTTP/WAP URLs in subscriber requests are matched against a database of blacklisted URLs. If there is a match, the flow is discarded, redirected, or terminated as configured. If there is no match, subscribers view the content as they would normally. • Category-based Content Filtering – Category-based Static Content Filtering—In this method, all HTTP/WAP URLs in subscriber requests are matched against a static URL categorization database. Action is taken based on a URL’s category, and the action configured for that category in the subscriber’s content filtering policy. Possible actions include permitting, blocking, redirecting, and inserting content. – Category-based Static-and-Dynamic Content Filtering—In this method, each URL first undergoes static rating. If the URL cannot be rated by the static database or if the URL static rating categorizes a URL as either Dynamic or Unknown, the requested content is sent for dynamic rating; wherein the requested content is analyzed and categorized. Action is taken based on the category determined by dynamic rating, and the action configured for that category in the subscriber’s content filtering policy. Possible actions include permitting, blocking, redirecting, and inserting content. Note ACS is applicable only for the ‘local’ context in the logical inventory. The following topics explain how to work with ACS in Prime Network Vision: • Viewing Active Charging Services, page 26-54 • ACS Commands, page 26-67 26-54 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Working with Active Charging Service Viewing Active Charging Services You can view the active charging services in logical inventory as shown in Figure 26-4. Figure 26-4 Mobile Technology Setup Nodes Additionally, you can also perform the following for each ACS: • Viewing Content Filtering Categories, page 26-56 • Viewing Credit Control Properties, page 26-56 • Viewing Charging Action Properties • Viewing Rule Definitions • Viewing Rule Base for the Charging Action • Viewing Bandwidth Policies • Viewing Fair Usage Properties To view ACS details in logical inventory: Step 1 Right-click the required device in Prime Network Vision and choose Inventory. Step 2 In the logical inventory window, choose Logical Inventory > local > Mobile > Active Charging Services. Prime Network Vision displays the list of active charging services configured under the container. You can view the individual ACS details from the table on the right pane or by choosing Logical Inventory > local > Mobile > Active Charging Services > ACS. 26-55 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Working with Active Charging Service Table 26-29 describes the details available for each ACS. Table 26-29 Active Charging Services in Logical Inventory Field Description Service Name Name of the active charging service. TCP Flow Idle Timeout Maximum duration, in seconds, a TCP flow can remain idle. UDP Flow Idle Timeout Maximum duration, in seconds, a UDP flow can remain idle. ICMP Flow Idle Timeout Maximum duration, in seconds, an Internet Control Message Protocol (ICMP) flow can remain idle. ALG Media Idle Timeout Maximum duration, in seconds, an application level gateway (ALG) media flow can remain idle. TCP Flow Mapping Idle Timeout The time for which the TCP flow mapping timer holds the resources. UDP Flow Mapping Idle Timeout The time for which the UDP flow mapping timer holds the resources. Deep Packet Inspection Indicates whether configuration of DPI is enabled or disabled in the mobile video gateway. Passive Mode Indicates whether the ACS is in or out of passive mode operation. CDR Flow Control Indicates whether flow control is enabled or disabled between the ACS Manager (ACSMGR) and Charging Data Record Module (CDRMOD). CDR Flow Control Unsent Queue Size Flow control unsent queue size at ACSMGR level. Unsent Queue High Watermark Highest flow control unsent queue size at ACSMGR level. Unsent Queue Low Watermark Lowest flow control unsent queue size at ACSMGR level. Content Filtering Indicates whether content filtering is enabled or disabled for the ACS. Dynamic Content Filtering Indicates whether dynamic content filtering is enabled or disabled for the ACS. URL Blacklisting Indicates whether URL blacklisting is enabled or disabled for the ACS. URL Blacklisting Match Method Method to look up the URLs in the URL blacklisting database. Content Filtering Match Method Method to look up the URLs in the category-based content filtering database. Interpretation of Charging Rulebase Name Charging rulebase configured for the ACS. Selected Charging Rulebase Name for AVP Charging rulebase name for attribute value pair (AVP) configured for the ACS. 26-56 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Working with Active Charging Service Viewing Content Filtering Categories To view content filtering categories in logical inventory: Step 1 Right-click the required device in Prime Network Vision and choose Inventory. Step 2 In the logical inventory window, choose Logical Inventory > local > Mobile > Active Charging Services >ACS >Content Filtering Categories. Prime Network Vision displays the list of content filtering categories configured under the container. You can view the individual content filtering category details from the table on the right pane or by choosing Logical Inventory > local > Mobile > Active Charging Services > ACS >Content Filtering Categories > Content Filtering Category. Table 26-30 describes the details available for each content filtering category. Viewing Credit Control Properties In a prepaid environment, the subscribers pay for a service prior to using it. While the subscriber is using the service, credit is deducted from subscriber’s account until it is exhausted or the call ends. In prepaid charging, ECS performs the metering function. Credits are deducted in real time from an account balance or quota. A fixed quota is reserved from the account balance and given to the system by a prepaid rating and charging server, which interfaces with an external billing system platform. The system deducts Table 26-30 Content Filtering Categories in Logical Inventory Field Description Policy ID ID of the content filtering policy. Failure Action Action to take for the content filtering analysis result. EDR File The EDR file name. Content Category Name of the content filtering category. Content Insert Content string to insert in place of the message returned from prohibited or restricted site or content server. Content Priority Precedence of the category in the content filtering policy. Content Failure Action Action to take for the indicated result of the content filtering analysis, which could be one of the following: • allow • content-insert • discard • redirect URL • terminate flow • www-reply-code-and-terminate-flow Content Redirect Content string to redirect the subscriber to a specified URL. Content Reply Code Reply code to terminate flow. EDR File Format Predefined EDR file format. 26-57 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Working with Active Charging Service volume from the quota according to the traffic analysis rules. When the subscriber’s quota gets to the threshold level specified by the prepaid rating and charging server, system sends a new access request message to the server and server updates the subscriber's quota. The charging server is also updated at the end of the call. ECS supports the following credit control applications for prepaid charging: • RADIUS Credit Control Application—RADIUS is used as the interface between ECS and the prepaid charging server. • Diameter Credit Control Application—The Diameter Credit Control Application (DCCA) is used to implement real-time credit control for a variety of services, such as networks access, messaging services, and download services. To view credit control properties in logical inventory: Step 1 Right-click the required device in Prime Network Vision and choose Inventory. Step 2 In the logical inventory window, choose Logical Inventory > local > Mobile > Active Charging Services >ACS > Credit Control. Prime Network Vision displays the list of credit control groups configured under the container. You can view the individual credit control group details from the table on the right pane or by choosing Logical Inventory > local > Mobile > Active Charging Services > ACS > Credit Control > Credit Control Group. You can also view the following details by clicking the respective node under the credit control group: • Diameter • Failure Handling • Pending Traffic Treatment • Quota • Server Unreachable Failure Handling Table 26-31 describes the details available for each credit control group. Table 26-31 Credit Control Properties in Logical Inventory Field Description Group Name of the credit control group for the subscriber. Mode Prepaid charging application mode, which could be Diameter or Radius. APN Name to be Included Type of APN name sent in the credit control application (CCA) message. Trigger Type Condition based on which credit reauthorization is triggered from the server. Diameter MSCC Final Unit Action Terminate Indicates whether to terminate a PDP session immediately when the Final-Unit-Action (FUA) in a particular multi service credit control (MSCC) is set as Terminate and the quota is exhausted for that service, or to terminate the session after all MSCCs (categories) have used their available quota. Diameter Peer Select table Peer Primary hostname. Realm Realm for the primary host. Secondary Peer Secondary hostname. 26-58 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Working with Active Charging Service Secondary Realm Realm for the secondary host. IMSI Range Mode Mode of peer selection based on IMSI prefix or suffix. IMSI Start Value Starting value of the IMSI range for peer selection. IMSI End Value Ending value of the IMSI range for peer selection. Diameter End Point Name Name of the diameter endpoint. End Point Realm Realm of the diameter endpoint. Pending Timeout Maximum time to wait for response from a diameter peer. Session Failover Indicates whether diameter session failover is enabled or not. Dictionary Diameter credit control dictionary for the ACS. Failure Handling Initial Request Failure handling behavior, if failure takes place during initial session establishment. Value could be continue, retry-and-terminate, and terminate. Update Request Failure handling behavior, if failure takes place during update request. Value could be continue, retry-and-terminate, and terminate. Terminate Request Failure handling behavior, if failure takes place during terminate request. Value could be continue, retry-and-terminate, and terminate. Pending Traffic Treatment Trigger Indicates whether to allow or drop a trigger while waiting for the credit information from the server. Value could be pass or drop. Forced Reauth Indicates whether to allow or drop reauthorization while waiting for the credit information from the server. Value could be pass or drop. NoQuota Indicates whether to allow or drop traffic, if there is no quota present. Value could be pass, drop, or buffer. Quota Exhausted Indicates whether to allow or drop traffic, if quota is exhausted. Value could be pass, drop, or buffer. Validity Expired Indicates whether to allow or drop traffic, if quota validity is expired. Value could be pass or drop. Quota Request Trigger Action taken on the packet that triggers the credit control application to request quota. Value could be exclude-packet-causing-trigger or include-packet-causing-trigger. Holding Time Duration for which ECS can hold the quota before returning to the credit control server. Validity Time Lifetime for which subscriber quota retrieved from the billing server is valid. Time Threshold Time threshold limit for subscriber quota in the prepaid credit control service. Units Threshold Unit threshold limit for subscriber quota in the prepaid credit control service. Volume Threshold Volume threshold limit for subscriber quota in the prepaid credit control service. Table 26-31 Credit Control Properties in Logical Inventory (continued) Field Description 26-59 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Working with Active Charging Service Viewing Charging Action Properties Charging Action is an action taken on the incoming data packets once the data packets are treated by the routing and charging rule components. User can configure independent actions such as allow, forward, and block traffic, and bind these actions with other routing and charging rule components. To view charging action properties in logical inventory: Step 1 Right-click the required device in Prime Network Vision and choose Inventory. Step 2 In the logical inventory window, choose Logical Inventory > local > Mobile > Active Charging Services >ACS > Charging Action. Prime Network Vision displays the list of charging actions configured under the container as shown. You can view the individual charging action details from the table on the right pane or by choosing Logical Inventory > local > Mobile > Active Charging Services > ACS > Charging Action > Charging Action. You can also view the following details by clicking the respective node under the Charging Action node: • Allocation Retention Priority • Bandwidth • Flow Action • QoS • Video • Billing Action Table 26-32 describes the details available for each charging action record. Server Unreachable Failure Handling Initial Request Failure handling behavior if server is unreachable during initial session establishment. Value could be continue or terminate. Update Request Failure handling behavior if server is unreachable during update request. Value could be continue or terminate. Table 26-31 Credit Control Properties in Logical Inventory (continued) Field Description Table 26-32 Charging Action Properties in Logical Inventory Field Description Name Name of the charging action. Content ID Content ID to use in the generated billing records as well the AVP used by the credit control application. Service ID Configured service ID used to associate the charging action in rule definitions configuration. Charging EDR Name Name of the EDR format for the billing action in the ACS. 26-60 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Working with Active Charging Service EGCDRs Indicates whether eG-CDRs must be generated when the subscriber session ends or an interim trigger condition occurs. Rf Indicates whether Rf accounting is enabled or not. UDRs Indicates whether UDRs must be generated based on the UDR format declared in the rule base. Flow Idle Timeout Maximum duration a flow can remain idle after which the system automatically terminates the flow. Limit for Flow Type State Indicates whether the limit for flow type is configured or not. Limit for Flow Type Value Maximum number of flows of a particular type. Limit for Flow Type Action Action to be taken, if the number of flows exceeds the maximum limit. IP Type of Service IP Type of Service (ToS) octets used in the charging action. Retransmission Count Indicates whether to count the number of packet retransmissions when the charging action is applied on the incoming data packets. Content Filtering Indicates whether content filtering must be applied on the incoming packets or not. Credit Control Indicates whether to apply credit control or not. Credit Rating Group Coupon ID used in prepaid charging as rating group. Charge Volume Method used for charge volume calculation based on the protocol and packet. Next Hop Forwarding Address Next hop forwarding address for a charging action. VLAN ID VLAN ID configured for the subscriber Flow Mapping Idle Timeout Maximum duration, in seconds, a flow can remain idle after which the system automatically terminates the flow. Allocation Retention Priority Priority Level Priority value that indicates whether to accept or reject a request for establishment or modification of a bearer in a limited resource condition. Priority Vulnerability Indicator Defines whether an active bearer can be preempted by a preemption-capable high priority bearer. Priority Capability Indicator Defines whether the bearer request can preempt the resources from the Low Priority Pre-empatable Active Bearers. Bandwidth Bandwidth ID The bandwidth policy ID for the ACS. Uplink Indicates whether uplink flow limit is configured for the subscriber or not. Downlink Indicates whether downlink flow limit is configured for the subscriber or not. Charging Action Bandwidth Direction Direction Direction of the packet flow: Uplink or Downlink Table 26-32 Charging Action Properties in Logical Inventory (continued) Field Description 26-61 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Working with Active Charging Service Peak Data Rate Peak data rate configured for the uplink or downlink packet flow. Peak Burst Size Peak burst size allowed for the uplink or downlink packets. Committed Data Rate Committed data rate for the uplink or downlink packet flow. Committed Burst Size Committed burst size allowed for the uplink or downlink packets. Exceed Action Action to take on packets that exceed committed data rate but do not violate the peak data rate. Violate Action Action to take on packets that exceed both committed and peak data rates. Bandwidth Limiting ID Identifier for bandwidth limiting. Flow Action Redirect URL Indicates whether packets matched to the rule definition must be redirected to a specified URL or not. Clear Quota Retry Timer Indicates whether to reset the CCA quota retry timer for a specific subscriber upon redirection of data packets. Conditional Redirect Indicates whether packets matching to a configured user agent must be conditionally redirected to a specified URL. Discard Discards packets associated with the charging action. Random Drop Indicates whether to degrade voice quality and specify the time interval in seconds at which the voice packets will be dropped. Readdress Redirects unknown gateway traffic based on the destination IP address of the packets to known or trusted gateways. Terminate Flow Indicates whether to terminate the flow by terminating the TCP connection gracefully between the subscriber and external server. Terminate Session Indicates whether to terminate the session. QoS Traffic Class QoS traffic class for the charging action, which could be background, conversational, interactive, or streaming. Class Identifier The QCI value. Video Bit Rate Bits per second, at which the TCP video flow must be paced during video pacing. CAE Readdressing Indicates whether Content Adaptation Engine (CAE) readdressing is enabled, allowing video traffic to be fetched from the CAEs in the CAE group. Transrating Indicates whether transrating is enabled or not. Transrating is a mobile video feature that reduces the encoded bit rates by adjusting video encoding. Target Rate Reduction Percentage of the input bit rate of a video flow. Billing Action EDR Name of the EDR format for the billing action in the ACS. EGCDR Indicates whether eG-CDRs must be generated when the subscriber session ends or an interim trigger condition occurs. Table 26-32 Charging Action Properties in Logical Inventory (continued) Field Description 26-62 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Working with Active Charging Service Viewing Rule Definitions Rule definitions are user-defined expressions, based on protocol fields and protocol states, which define what actions to take when specific field values are true. Each rule definition configuration consists of multiple expressions applicable to any of the fields or states supported by the respective analyzers. Rule definitions areof the following types: • Routing—Used to route packets to content analyzers. Routing rule definitions determine which content analyzer to route the packet to when the protocol fields and/or protocol states in the rule definition expression are true. Up to 256 rule definitions can be configured for routing. • CharginG—Used to specify what action to take based on the analysis done by the content analyzers. Actions can include redirection, charge value, and billing record emission. Up to 2048 charging rule definitions can be configured in the system. • Post-processing—Used for post-processing purposes. Enables processing of packets even if the rule matching for them has been disabled. • TPO—Used for Traffic Performance Optimization (TPO) in-line service match-rule and match advertisement features. To view rule definitions in logical inventory: Step 1 Right-click the required device in Prime Network Vision and choose Inventory. Step 2 In the logical inventory window, choose Logical Inventory > local > Mobile > Active Charging Services > ACS > Rule Definitions. Prime Network Vision displays the list of rule definitions configured under the container. You can view the individual rule definition details from the table on the right pane or by choosing Logical Inventory > local > Mobile > Active Charging Services >ACS > Rule Definitions > Rule Definition. Table 26-33 describes the details available for each rule definition. Rf Indicates whether Rf accounting is enabled or not. UDRs Indicates whether UDRs must be generated based on the UDR format declared in the rule base. Radius Accounting Record Indicates whether radius accounting is enabled or not. Table 26-32 Charging Action Properties in Logical Inventory (continued) Field Description 26-63 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Working with Active Charging Service Viewing Rule Definition Groups A rule definition group enables grouping the rule definitions into categories. A rule definition group may contain optimizable rule definitions. Whether a group is optimized or not is decided on whether all the rule definitions in the group can be optimized. When a new rule definition is added, it is checked if it is included in any rule definition group and whether it needs to be optimized or not. To view rule definition groups in logical inventory: Step 1 Right-click the required device in Prime Network Vision and choose Inventory. Step 2 In the logical inventory window, choose Logical Inventory > local > Mobile > Active Charging Services > ACS > Group of Rule Definitions. Prime Network Vision displays the list of rule definition groups configured under the container. You can view the individual rule definition group details from the table on the right pane or by choosing Logical Inventory > local > Mobile > Active Charging Services >ACS > Group of Rule Definitions > Rule Definition Group. Table 26-33 Rule Definition Group Properties in Logical Inventory Field Description Name Name of the rule definition group. Application Type Purpose of the rule definition, which could be charging, routing, post-processing, or Traffic Performance Optimization (TPO). Copy Packet To Log Indicates whether to copy every packet that matches the rule to a log file. Tethered Flow Check Indicates whether tethered flow check if enabled or not. Tethering detection flow check feature enables detection of subscriber data traffic flow originating from PC devices tethered to mobile smart phones, and also provides effective reporting to enable service providers take business decisions on how to manage such usage and to bill subscribers accordingly. Multiline OR Indicates whether to apply the OR operator to all lines in a rule definition. This allows a single rule definition to specify multiple URL expressions. Protocol Configuration Protocol The protocol that this rule definition is applied on. Fields Particular protocol field, which is applied on the data packets for inspection. Value could be, host, payload, or domain. Operator Logical operator that indicates how to logically match the value in the field analyzed based on the data type. Value Value of a particular protocol in a rule definition which has to be applied on the incoming data packets for inspection. 26-64 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Working with Active Charging Service Table 26-33 describes the details available for each rule definition group. Rule Definition Group Commands The following commands can be launched from the inventory by right-clicking a rule definition group and choosing Commands > Configuration or Commands > Show. Before executing any commands, you can preview them and view the results. If desired, you can also schedule the commands. To find out if a device supports these commands, see the Cisco Prime Network 3.10 Supported Cisco VNEs. Note You might be prompted to enter your device access credentials while executing a command. Once you have entered them, these credentials will be used for every subsequent execution of a command in the same GUI client session. If you want to change the credentials, click Edit Credentials. Edit Credentials button will not be available for SNMP commands or if the command is scheduled for a later time. Viewing Rule Base for the Charging Action A rule base is a collection of rule definitions and their associated billing policy. The rule base determines the action to be taken when a rule is matched. A maximum of 512 rule bases can be specified in the ECS service. It is possible to define a rule definition with different actions. Rule bases can also be used to apply the same rule definitions for several subscribers, which eliminate the need to have unique rule definition for each subscriber. We can set priority, default bandwidth policy, type of billing for subscriber sessions, for a rule definition/ group of rule definitions in the rule base. Additionally we can configure content based billing and firewall/NAT constituent to rule base. To view a rule base in logical inventory: Step 1 Right-click the required device in Prime Network Vision and choose Inventory. Table 26-34 Rule Definition Group Properties in Logical Inventory Field Description Name Name of the rule definition group. Application Type Purpose of the rule definition group, which could be charging, routing, content filtering, post-processing, or Traffic Performance Optimization (TPO). Dynamic Command Content Filtering Policy ID Content filtering policy ID to add or remove dynamic commands from the rule definition group. Table 26-35 Rule Definition Group Commands Command Type Command Inputs Required and Notes Configuration Delete Group of RuleDefs Click Execute Now to delete the rule definition group. Show Show Group of RuleDefs Click Execute Now to display the group of rule definitions. 26-65 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Working with Active Charging Service Step 2 In the logical inventory window, choose Logical Inventory > local > Mobile > Active Charging Services > ACS > Rulebase Container. Prime Network Vision displays the list of rule bases configured under the container. You can view the individual rule base details from the table on the right pane or by choosing Logical Inventory > local > Mobile > Active Charging Services >ACS > Rulebase Container > Rule Base. Table 26-36 describes the details available for each rule base record. Table 26-36 Rule Base Properties in Logical Inventory Field Description Rulebase Name Name of the rule base. Flow Any Error Charging Action Charging action to be used for packets dropped due to any error conditions after data session is created. Limit for Total Flows Maximum number of simultaneous uplink and downlink packet flows. Limit for TCP Flows Maximum number simultaneous TCP packet flows per subscriber or APN allowed for a rulebase. Limit for Non TCP Flows Maximum number simultaneous non-TCP packet flows per subscriber or APN allowed for a rulebase. Charging Rule Optimization Internal optimization level to use, for improved performance, when evaluating each instance of the action. QoS Renegotiation Timeout Timeout value after which QoS renegotiation is performed. RTP Dynamic Routing Indicates whether the Real Time Streaming Protocol (RTSP) and SDP analyzers are enabled to detect the start/stop of RTP (a Transport Protocol for Real-Time Applications) and RTP Control Protocol (RCP) flows. Ignore Port Number In Application Header Indicates whether to consider or ignore the port number embedded in the application. Delayed Charging Indicates how to charge for the control traffic associated with an application. XHeader Certificate Name Name of the encryption certificate to be used for x-header encryption. XHeader Reencryption Period Indicates how often to regenerate the encryption key for x-header encryption. Default Bandwidth Policy Name of the default bandwidth policy per subscriber. P2P Dynamic Routing Indicates whether P2P analyzer is enabled to detect the P2P applications flow configured in ACS. Fair Usage Waiver Percentage Waiver percent on top of the average available memory credits per session for the Fair Usage feature of active charging. URL Blacklisting Action Configured URL blacklisting action to take when the URL matches ones of the blacklisted URLs. URL Blacklisting Content ID Specific content ID for which URL blacklisting is enabled in the rulebase. Charging Action Priorities tab Charging rule definitions and their priorities in the rulebase. 26-66 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Working with Active Charging Service Viewing Bandwidth Policies Bandwidth policies are helpful in applying rate limit to potentially bandwidth intensive and service disruptive applications. Using this policy, the operator can police and prioritize subscribers’ traffic to ensure that no single or group of subscribers’ traffic negatively impacts another subscribers’ traffic. Each policy will be identified by a unique ID, which will be associated to a particular group. Bandwidth policies are used to control the direction (uplink/downlink) of bandwidth, peak data rate, and peak burst size, and the actions that need to be taken on violation, if the bandwidth exceeds the burst size and data rate. To view bandwidth policy in logical inventory: Step 1 Right-click the required device in Prime Network Vision and choose Inventory. Step 2 In the logical inventory window, choose Logical Inventory > local > Mobile > Active Charging Services > ACS > Bandwidth Policy Container. Prime Network Vision displays the list of bandwidth policies configured under the container. You can view the individual bandwidth policy details from the table on the right pane or by choosing Logical Inventory > local > Mobile > Active Charging Services > ACS > Bandwidth Policy Container > Bandwidth Policy. Table 26-37 describes the details available for each bandwidth policy. Routing Action Priorities tab Routing actions and their priorities in the rulebase. Post Processing Action Priorities Post-processing actions and their priorities in the rulebase. Table 26-36 Rule Base Properties in Logical Inventory (continued) Field Description Table 26-37 Bandwidth Policy Properties in Logical Inventory Field Description Name Name of the bandwidth policy configured. Total Bandwidth ID Configured Total number of bandwidth IDs configured. Total Group Limit Configured Total number of bandwidth group limits configured. Flow Limit for Bandwidth ID and Group ID Associations and Group ID tables Holds all bandwidth IDs and group IDs of the bandwidth policy. 26-67 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Working with Active Charging Service Viewing Fair Usage Properties To view fair usage properties configured for the ACS: Step 1 Right-click the required device in Prime Network Vision and choose Inventory. Step 2 In the logical inventory window, choose Logical Inventory > local > Mobile > Active Charging Services > ACS > Fair Usage. Prime Network Vision displays the details on the content pane. Table 26-38 describes the fair usage properties. ACS Commands The following commands can be launched from the inventory by right-clicking an ACS and choosing Commands > Configuration or Commands > Show. Before executing any commands, you can preview them and view the results. If desired, you can also schedule the commands. To find out if a device supports these commands, see the Cisco Prime Network 3.10 Supported Cisco VNEs. Note You might be prompted to enter your device access credentials while executing a command. Once you have entered them, these credentials will be used for every subsequent execution of a command in the same GUI client session. If you want to change the credentials, click Edit Credentials. Edit Credentials button will not be available for SNMP commands or if the command is scheduled for a later time. Table 26-38 Fair Usage Properties in Logical Inventory Field Description CPU Threshold Percent Percentage of system CPU resources that the dynamic inline transrating feature is allowed to use. Threshold Percent Percentage of system resources that the dynamic inline transrating feature is allowed to use. Deactivate Margin Percent Fair usage deactivate margin, below which monitor action is disabled. 26-68 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Using Commands to Configure and View Mobile Technologies under a Context Using Commands to Configure and View Mobile Technologies under a Context The following commands can be used to configure and view mobile technologies under a particular context in the Prime Network Vision. These commands can be launched from the logical inventory by choosing the Context > Commands > Configuration or Context > Commands > Show. Before executing any command, you can preview them and view the results. If desired, you can also schedule the commands. To find out if a device supports these commands, see the Cisco Prime Network 3.10 Supported Cisco VNEs. Note You might be prompted to enter your device access credentials while executing a command. Once you have entered them, these credentials will be used for every subsequent execution of a command in the same GUI client session. If you want to change the credentials, click Edit Credentials. Edit Credentials button will not be available for SNMP commands or if the command is scheduled for a later time. Table 26-39 ACS Commands Command Type Command Inputs Required and Notes Configuration Create Group of Ruledefs Group of Ruledefs Name, Group of Ruledefs Configuration Create Rulebase Rulebase Name, Rulebase Configuration Create Ruledef Ruledef Name, Ruledef Configuration Delete Active Charging Service Click Execute Now to delete the ACS. Modify Active Charging Service Access Ruledef, Ruledef, Group of Ruledefs, Rulebase Create Access Ruledef (ACS > Commands > Configuration > Access Ruledef Access Ruledef Name, Access Ruledef Configuration Delete Access Ruledef (ACS > Commands > Configuration > Access Ruledef Access Ruledef Name Show Show Access Ruledef Access Ruledef Name 26-69 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Using Commands to Configure and View Mobile Technologies under a Context Table 26-40 Configuration Commands Command Inputs Required and Notes Configure BFD • Protocol • Echo Create AAA Group Create Group Name tab: • Group Name Diameter Authentication/Diameter Accounting tab: • Dictionary • End Point • Max Retries • Request Timeout 26-70 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Using Commands to Configure and View Mobile Technologies under a Context Create APN General tab: • APN Name • Selection Mode • Accounting Mode • Authentication Type • Authentication Protocol Priority • Bearer Control Mode • Home-Agent IP Address (IPV4) PDP/Context tab: • Primary Contexts • Total Contexts • PDP Type • Destination Context Name Charging Characteristics tab: • CC SGSN Type • Home Behavior • Home Profile Bit • Roaming Behavior • Roaming Profile Bit • Visiting Behavior • Visiting Profile Bit Timeout tab: • TimeOut Type • Absolute Duration • Emergency Inactivity Duration • Idle Duration • Long Duration • Long Duration Inactivity Time • Long Duration Action Type • Long Duration Disconnection Type Table 26-40 Configuration Commands (continued) Command Inputs Required and Notes 26-71 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Using Commands to Configure and View Mobile Technologies under a Context IP tab: • IP Address Allocation Method • DHCP Proxy : Allow Deferred • DHCP Proxy : Allow User Specified • DHCP Proxy : Prefer DHCP Options • DHCP Relay : Allow User Specified • Local : Allow Deferred • Local : Allow User Specified • No Dynamic : Allow Deferred • No Dynamic : Allow User Specified • IP Pool Name IPV6 tab: • IPV6 Pool Name • IPV6 DNS Type • IPV6 DNS Address (IPV6) • IPV6 Advertisement Interval • IPV6 Number of Advertisement AAA/DNS tab: • AAA Type • AAA Group Name • AAA Secondary Group Name • DNS Type • DNS IP Address (IPV4) GTPP Group tab: • GTPP Group Name • Accounting Context Name Miscellaneous tab: • Source Violation Type • Drop Limit • Restriction Value Create Active Charging Service Active Charging Service Name Table 26-40 Configuration Commands (continued) Command Inputs Required and Notes 26-72 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Using Commands to Configure and View Mobile Technologies under a Context Create EGTP General tab: • Service Name • GTPU Service • Interface • Validation Mode GTPC Attributes tab: • Retransmission Timeout • Ech Retransmission Timeout • Maximum Retries • Echo Interval • Dynamic Echo Timer • Smooth Factor • IP Qos DSCP • Bind Address Type • Bind Address • Path Failure Detection Policy Create GGSN General tab: • Service Name • Accounting Context Name • CC Behavior ID • GTPU Service Name • P-GW Service Name • Port Number • PLMN Unlisted Value Timing Interval tab: • Retransmission Count • Echo Retransmission Count • Setup Timeout • Echo Interval • Dynamic • Smooth Factor • Guard Interval • Max Retransmission Table 26-40 Configuration Commands (continued) Command Inputs Required and Notes 26-73 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Using Commands to Configure and View Mobile Technologies under a Context Bind Address tab: • Bind Address (IPV4) • PPP PDP Context • Total PDP Context Create GTPP General tab: • Group Name • Dictionary • Transport Layer Protocols • Accounting Type • RAT Generation Type Charging Address/CDR tab: • Charging Agent Address (IPV4) • Charging Agent Port • Max CDRS Number • Max CDRS Wait Time (Sec) Create GTPU • GTPU Name • Retransmission Timeout • Echo Retransmission Timeout • Maximum Retransmission • Echo Interval Create IP Pool • Pool Name • IP Address (IPV4) • Network Bits • Subnet Mask (IPV4) • Pool Type • Pool Priority • Group Name • VRF Name Table 26-40 Configuration Commands (continued) Command Inputs Required and Notes 26-74 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Using Commands to Configure and View Mobile Technologies under a Context Create P-GW General tab: • P-GW Service Name • Associate Service Type • Associate Service Name • QCI-QoS Mapping Name • New Call Policy • Session Delete Delay • Session Delete Delay Timeout FQDN tab: • FQDN Host Name • Realm Name Create QCI-QOS Mapping Name Create S-GW • S-GW Service Name • Accounting Mode • Accounting Context Name • Accounting GTPP Group Name • QCI-QOS Mapping Name • Egress Protocol • Egress Context Name • EGTP Service Name • MAG Service Name • Ingress EGTP Service Name • Accounting Policy Name • IMS Authorization Service • New Call Policy Create VRF General tab: • VRF Name • Router BGP Route Distinguisher tab: • Route Distinguisher Type • IP (IPV4) • ASN • RT Table 26-40 Configuration Commands (continued) Command Inputs Required and Notes 26-75 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Using Commands to Configure and View Mobile Technologies under a Context The following commands can be launched from the logical inventory by choosing Context > Commands > Configuration > DHCP. Route Target tab: • IP Import (IPV4) • ASN Import • RT Import • IP Export (IPV4) • ASN Export • RT Export • IP Both (IPV4) • ASN Both • RT Both Delete Context NA Modify License License Key Table 26-40 Configuration Commands (continued) Command Inputs Required and Notes Command Inputs Required and Notes Create DHCP General tab: • Service Name • Bind Address (IPV4) • Nexthop IP (IPV4/IPV6) • Server Address (IPV4) • Server Algorithm Timing Interval tab: • Retransmission Timeout • Max Retransmission • Lease Min Value • Lease Max Value • DeadTime Delete DHCP Service Name 26-76 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Using Commands to Configure and View Mobile Technologies under a Context The following commands can be launched from the logical inventory by choosing Context > Commands > Configuration > HA SPI List. The following commands can be launched from the logical inventory by choosing Context > Commands > Configuration > HA Service. Modify DHCP General tab: • Service Name • Bind Address (IPV4) • Nexthop IP (IPV4/IPV6) • Server Address (IPV4) • Server Algorithm Timing Interval tab: • Retransmission Timeout • Max Retransmission • Lease Min Value • Lease Max Value • DeadTime Command Inputs Required and Notes Command Inputs Required and Notes Create HA SPI List • HP SPI List Name • Remote Address (IPV4 and IVP6). • Remote Address Prefix • SPI Number • Encrypted • Secret Value • Hash Algorithm • Description Delete HA SPI List HA SPI List Name Modify HA SPI List • HA SPI List Name • Delete SPI Entry • Remote Address (IPV4/IPV6) • Remote Address Prefix • SPI Number • Encrypted • Secret Value • Hash Algorithm • Description 26-77 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Using Commands to Configure and View Mobile Technologies under a Context The following commands can be launched from the logical inventory by choosing Context > Commands > Configuration > PDP Context. The following commands can be launched from the logical inventory by choosing Context > Commands > Configuration > Proxy DNS. Command Inputs Required and Notes Create HA Service • Service Name • Local Port • Authentication • Fa-Ha-SPI Configuration • Mn-Ha-SPI Configuration • Lifetime • Binding • Bind Address (IPV4) • Max-Subscribers Delete HA Service Service Name Modify HA Service • Service Name • Local Port • Authentication • Fa-Ha-SPI Configuration • Mn-Ha-SPI Configuration • Delete Lifetime • Lifetime • Binding • Delete Bind Address • Bind Address (IPV4) • Max-Subscribers Command Inputs Required and Notes Create Network Requested PDP Context • IP Address (IPV4/IPV6) • GSN Map IpAddress (IPV4/IPV6) • Destination Context • APN Name • IMS Identifier Delete Network Requested PDP Context • IP Address (IPV4/IPV6) • Destination Context 26-78 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Using Commands to Configure and View Mobile Technologies under a Context The following commands can be launched from the logical inventory by choosing Context > Commands > Configuration > Route Map and Route Access List. Command Inputs Required and Notes Create Proxy DNS • Proxy DNS Intercept List Name • Pass Through (IPV4/IPV6) • Pass Through Prefix • Redirect (IPV4/IPV6) • Redirect Prefix • Primary DNS (IPV4) • Secondary DNS (IPV4) Delete Proxy DNS Proxy DNS Intercept List Name Modify Proxy DNS • Proxy DNS Intercept List Name • Delete Pass Through • Pass Through (IPV4/IPV6) • Pass Through Prefix • Delete Redirect • Redirect (IPV4/IPV6) • Redirect Prefix • Primary DNS (IPV4) • Secondary DNS (IPV4) 26-79 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Using Commands to Configure and View Mobile Technologies under a Context Command Inputs Required and Notes Create Route Access List • Route Access List Type • Route Access List Identifier • Operation Type • Network Parameter • Network Address (IPV4) • Network Mask (IPV4) • Host Network Address (IPV4) • Mask Parameter • Mask (IPV4) • Wildcard Mask (IPV4) • Host Mask (IPV4) • Exact Match Create Route Map • Route Map Name • Operation • Sequence Number • Route Map Configuration Delete Route Access List • Route Access List Type • Route Access List Identifier • Operation Type • Network Parameter • Network Address (IPV4) • Network Mask (IPV4) • Host Network Address (IPV4) • Mask Parameter • Mask (IPV4) • Wildcard Mask (IPV4) • Host Mask (IPV4) • Exact Match Delete Route Map Route Map Name 26-80 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Using Commands to Configure and View Mobile Technologies under a Context The following commands can be launched from the logical inventory by choosing Context > Commands > Configuration > Subscriber. Modify Route Access List • Route Access List Type • Route Access List Identifier • Operation Type • Network Parameter • Network Address (IPV4) • Network Mask (IPV4) • Host Network Address (IPV4) • Mask Parameter • Mask (IPV4) • Wildcard Mask (IPV4) • Host Mask (IPV4) • Exact Match Modify Route Map • Route Map Name • Operation • Sequence Number • Route Map Configuration Command Inputs Required and Notes Command Inputs Required and Notes Create Subscriber Create Subscriber tab: • Subscriber Name • Accounting Mode • IP Context Name • Hide Service Address • IP Address (IPV4) • Allocation Method • IP Address Pool Name • Proxy DNS Intercept List Name • Proxy DNS Subscriber Address As Source Subscriber Configuration tab: • Subscriber Configuration Delete Subscriber Subscriber Name 26-81 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Using Commands to Configure and View Mobile Technologies under a Context The following commands can be launched from the logical inventory by choosing the Context > Commands > Show. Modify Subscriber Modify Subscriber tab: • Subscriber Name • Accounting Mode • Delete IP Context • IP Context Name • Hide Service Address • Delete IP Address • IP Address (IPV4) • Allocation Method • Delete IP Address Pool • IP Address Pool Name • Delete Proxy DNS • Proxy DNS Intercept List Name • Proxy DNS Subscriber Address As Source Subscriber Configuration tab: • Subscriber Configuration Command Inputs Required and Notes Table 26-41 Show Commands Command Inputs Required and Notes Show APN APN Name Show DHCP DHCP Name Show EGTP Service Name Show HA SPI List HA SPI List Name Show HA Service Service Name Show IP Pool Pool Name Show License Show License Show Route Access List Route Access List Identifier Show Route Map Route Map Name Show Subscriber Subscriber Name 26-82 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 26 Monitoring Mobile Technologies Using Commands to Configure and View Mobile Technologies under a Context CHAPTER 27-1 Cisco Prime Network 3.10 User Guide OL-28065-01 27 Monitoring Data Center Configurations Data Center is a centralized repository, either physical or virtual for the storage, management, dissemination of data and information organized around a particular manner. In other words, it is a facility used to house computer systems and associated components, such as telecommunications and storage systems. It generally includes redundant or backup power supplies, redundant data communication connections, environmental controls such as air conditioning or fire suppression, and security devices. Cisco Prime Network supports the following network elements as part of data centers: • Cisco Nexus 1000V network element • Cisco Nexus 2000 network element • Cisco Nexus 5000 network element • Cisco Nexus 7000 network element • Cisco Unified Computing System (UCS) Prime Network supports the following technologies as part of data center: • Virtual Port Channel (vPC), page 27-1 • Cisco FabricPath, page 27-5 • Virtualization, page 27-8 Virtual Port Channel (vPC) A Virtual Port Channel (vPC) allows links that are physically connected to two different Cisco Nexus 7000 or Cisco Nexus 5000 series network elements to appear as a single port channel by a third device as shown in Figure 27-1. The third device can be a switch, server, or any other networking device that supports port channels. A vPC can provide Layer 2 multipathing, which allows you to create redundancy and increase bisectional bandwidth by enabling multiple parallel paths between nodes and allowing load balancing traffic. You can use only Layer 2 port channels in the vPC. 27-2 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 27 Monitoring Data Center Configurations Virtual Port Channel (vPC) Figure 27-1 vPC Architecture A vPC consists of the following components: • Two vPC peer switches, among which one is primary and one is secondary. The system formed by the two peer switches is referred to as a vPC domain. • A peer link, also known as multichassis EtherChannel trunk (MCT), which connects the vPC peer switches. A peer link is a redundant 10 Gigabit Ethernet Port Channel ,which is used to carry traffic from one system to the other when needed and to synchronize forwarding tables. • vPC member ports that form the PortChannel and are split between the vPC peers. • A routed link, called as a vPC peer-keepalive or fault-tolerant link is a Layer 3 Gigabit Ethernet link, used to resolve dual-active scenarios where the peer link connectivity is lost. A vPC domain is associated to a single Virtual Device Context (VDC), so all vPC interfaces belonging to a given vPC domain must be defined in the same VDC. You must have a separate vPC peer link and peer keepalive link infrastructure for each VDC deployed. Consolidating a vPC pair (two vPC peer devices of the same domain) in two VDCs of the same physical device is not supported. The vPC peer link must use 10-Gigabit Ethernet ports for both ends of the link; otherwise, the link will not be formed. A vPC provides the following benefits: • Allows a single device to use a port channel across two upstream devices • Eliminates STP blocked ports • Provides a loop-free topology • Uses all available uplink bandwidth • Provides fast convergence in case of link or a device failure • Provides link level resiliency • Assures high availability Prime Network supports vPC on Cisco Nexus 5000 series and Cisco Nexus 7000 series network elements. This topic contains the following sections: • Viewing Virtual Port Channel Configuration, page 27-3 • Working with the vPC Commands, page 27-4 vPC peer link 273225 Nexus 7000 device Nexus 7000 device vPC device vPC device vPC domain Peer-keepalive link 27-3 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 27 Monitoring Data Center Configurations Virtual Port Channel (vPC) Viewing Virtual Port Channel Configuration To view the vPC configuration details in Prime Network Vision: Step 1 Right-click on the required device and choose the Inventory option. Step 2 In the Inventory window, choose Logical Inventory > VPC Domain. The vPC domain details are displayed in the content pane as shown in Figure 27-2. Figure 27-2 vPC Domain in Logical Inventory Table 27-1 describes the vPC domain details. Table 27-1 vPC Domain Properties Field Name Description Domain ID Unique ID that is used to identify the vPC peer links and ports connected to the vPC downstream devices. Peer Status Status of the peer link. Keep Alive Status Status of the keep alive link, which could be Alive or Down. Consistency Status Consistency status of the vPC, which could be Success or Failed. vPC Role Role of the vPC, which could be Primary or Secondary. Peer Gateway Enabled Status of the peer gateway, which could be Enabled or Disabled. Graceful Consistency Check Enabled Indicates whether graceful consistency check is enabled or disabled. This consistency check helps in preventing traffic drops. Auto Recovery Enabled Indicates whether auto recovery is enabled or disabled. 27-4 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 27 Monitoring Data Center Configurations Virtual Port Channel (vPC) Working with the vPC Commands The following commands can be launched from the inventory by right-clicking VPC Domain and choosing Commands > Show. Before executing any commands, you can preview them and view the results. If desired, you can also schedule the commands. To find out if a device supports these commands, see the Cisco Prime Network 3.10 Supported Cisco VNEs. Note You might be prompted to enter your device access credentials while executing a command. Once you have entered them, these credentials will be used for every subsequent execution of a command in the same GUI client session. If you want to change the credentials, click Edit Credentials. Edit Credentials button will not be available for SNMP commands or if the command is scheduled for a later time. vPC Domain Mac Address MAC address of the vPC domain. FabricPath Switch ID ID of the FabricPath switch connected to the vPC. vPC Peer Link vPC ID Unique ID for vPC peer link. Status Status of the port channel used for communication, which could be Up or Down. Port Channel vPC used as the port channel for communication. Click the hyperlink, to view the relevant Ethernet link aggregation node in the physical inventory. vPC Keep Alive Destination Destination IP address of the peer switch. Status Status of the keep alive link, which could be Alive or Down. Interval Interval time required to check whether the peer switch is active or inactive. Timeout Time taken by the peer switch to respond. Hold Timeout Amount of time during which the peer switch information is stored. Port Interface used for the communication. VPC Port Channel vPC ID Unique virtual Port Channel ID. Port Channel Ethernet link used as the port channel for communication. Click the hyperlink, to view the relevant Ethernet link aggregation node in the physical inventory. Port Status Status of the vPC, which could be Up or Down. Consistency Status Consistency status of the vPC, which could be Success or Failed. Consistency Reason Reason for the consistency status. Table 27-1 vPC Domain Properties (continued) Field Name Description 27-5 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 27 Monitoring Data Center Configurations Cisco FabricPath Cisco FabricPath Cisco FabricPath is an innovation in Cisco NX-OS software that brings the stability and scalability of routing to Layer 2. It provides a foundation to build a scalable fabric—a network that itself looks like a single virtual switch from the perspective of its users. The switched domain does not have to be segmented anymore, providing data center–wide workload mobility. Because traffic is no longer forwarded along a spanning tree, the bisectional bandwidth of the network is not limited, and massive scalability is possible. Cisco FabricPath introduces an entirely new Layer 2 data plane by encapsulating the frames entering the fabric with a header that consists of routable source and destination addresses. These addresses are the address of the switch on which the frame was received and the address of the destination switch to which the frame is heading. From there, the frame is routed until it is reaches the remote switch, where it is de-encapsulated and delivered in its original Ethernet format. Cisco FabricPath provides the following features: • Allows Layer 2 multipathing in the FabricPath network. • Provides built-in loop prevention and mitigation with no need to use the Spanning Tree Protocol (STP). • Provides a single control plane for unknown unicast, broadcast, and multicast traffic. • Enhances mobility and virtualization in the FabricPath network. The system randomly assigns a unique switch ID to each device that is enabled with FabricPath. After you enable FabricPath on the devices, you can configure an Ethernet interface or a port channel interface as a FabricPath interface. If one member of the port channel is in FabricPath mode, then all the other members will also be in FabricPath mode. After you configure the interface as a FabricPath interface, it automatically becomes a trunk port, capable of carrying traffic for multiple Virtual Local Area Networks (VLANs). Prime Network supports Cisco FabricPath on Cisco Nexus 5000 series and Cisco Nexus 7000 series network elements. Figure 27-3 shows a Cisco FabricPath architecture. Table 27-2 vPC Commands Command Inputs Required and Notes Show Port Channel Capacity Click Execute Now to view the port channel capacity. Show vPC Click Execute Now to view the vPCs available for the domain. Show vPC Consistency Parameters Click Execute Now to view the vPC consistency parameters. 27-6 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 27 Monitoring Data Center Configurations Cisco FabricPath Figure 27-3 Cisco FabricPath Architecture This topic contains the following sections: • Viewing Cisco FabricPath Configuration, page 27-6 • Working with the Cisco FabricPath Commands, page 27-8 Viewing Cisco FabricPath Configuration To view the FabricPath configuration in Prime Network Vision: Step 1 Right-click on the required device and choose the Inventory option. Step 2 In the Inventory window, choose Logical Inventory > FabricPath. The FabricPath configuration details are displayed in the content pane as shown in Figure 27-4. You can also view the properties, by right-clicking the FabricPath node and choosing Properties. 279717 FP network S3 B CE S1 S2 A CE FP network S3 B CE S1 S2 A CE S4 vPC vPC+ 27-7 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 27 Monitoring Data Center Configurations Cisco FabricPath Figure 27-4 Cisco FabricPath Node in Logical Inventory Table 27-3 describes the FabricPath configuration details. Table 27-3 Cisco FabricPath Configuration Field Name Description Switch ID Unique ID of the Cisco FabricPath virtual switch. System-ID System MAC address of the Cisco FabricPath. Gracefulmerge Disabled Indicates whether graceful merge feature is enabled are not. Value could be True or False. If this feature is enabled, the switch would be effectively linked to the Cisco FabricPath network. If disabled, you may experience traffic drops. Allocate Delay (sec) Time delay during new resource propagation. Linkup Delay (sec) Time delay for detecting conflicts during linkup sessions. Transition Delay (sec) Time delay during transition of value propagation. FabricPath Interfaces Port Ethernet link, which is configured as a Cisco FabricPath. Click the hyperlink to view the interface link in physical inventory. Interface Name Name of the interface for which switch port mode is configured as a Cisco FabricPath. 27-8 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 27 Monitoring Data Center Configurations Virtualization Working with the Cisco FabricPath Commands The following commands can be launched from the inventory by right-clicking FabricPath and choosing Commands > Show. Before executing any commands, you can preview them and view the results. If desired, you can also schedule the commands. To find out if a device supports these commands, see the Cisco Prime Network 3.10 Supported Cisco VNEs. Note You might be prompted to enter your device access credentials while executing a command. Once you have entered them, these credentials will be used for every subsequent execution of a command in the same GUI client session. If you want to change the credentials, click Edit Credentials. Edit Credentials button will not be available for SNMP commands or if the command is scheduled for a later time. Virtualization Virtualization is a concept of creating a virtual version of any resource, such as hardware platform, operating system, storage device, or network resources, as shown in Figure 27-5. It provides a layer of abstraction between computing, storage and networking hardware, and the applications running on it. Virtual infrastructure gives administrators the advantage of managing pooled resources across the enterprise, allowing IT managers to be more responsive to dynamic organizational needs and to better leverage infrastructure investments. Figure 27-5 Virtualization Concept Table 27-4 Cisco FabricPath Show Commands Command Inputs Required and Notes FabricPath Conflict Click Execute Now to view the Cisco FabricPath conflicts. MAC Address-Table Learning Mode Click Execute Now to view the MAC address-table learning mode. 27-9 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 27 Monitoring Data Center Configurations Virtualization The various components of virtualization are: Hypervisor (Host Server) A hypervisor, also called a blade server, a virtual machine manager, or a host server, is a program that allows multiple operating systems to share a single hardware host. Each operating system appears to have the host's processor, memory, and other resources all to itself. However, the hypervisor is actually controlling the host processor and resources, allocating what is needed to each operating system in turn and making sure that the guest operating systems (called virtual machines) do not disrupt each other. Virtual Machine A virtual representation of a real machine using software that provides an operating environment, which can run or host a guest operating system. Guest Operating System An operating system running in a virtual machine environment that would otherwise run directly on a separate physical system. Data Store A data store represents a storage location for virtual machine files. It can be a Virtual Machine File System (VMFS) volume, a directory on Network Attached Storage, or a local file system path. Data Center Data Center serves as a container for hosts, virtual machines, networks, and data stores. Prime Network supports virtualization on Cisco UCS network element. The following topics explain how to view and monitor virtual data center properties in Prime Network Vision: • Viewing Virtual Data Centers, page 27-9 • Viewing the Data Stores of a Data Center, page 27-10 • Viewing the Host Servers of a Data Center, page 27-10 • Viewing the Virtual Machines of a Data Center, page 27-13 Viewing Virtual Data Centers To view the virtual data centers in the logical inventory: Step 1 Right-click on the required device and choose the Inventory option. Step 2 In the Inventory window, choose Logical Inventory > Fabric Interconnect > Compute Virtualization. The virtual data centers are listed in the content pane. Table 27-5 describes the virtual data center properties. Table 27-5 Virtual Data Center Properties Field Name Description Name Name of the data center. 27-10 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 27 Monitoring Data Center Configurations Virtualization Step 3 Right-click on a data center and choose Properties to view more details. Viewing the Data Stores of a Data Center To view the details of data stores available for a data center: Step 1 Right-click on the required device and choose the Inventory option. Step 2 In the Inventory window, choose Logical Inventory > Fabric Interconnect > Compute Virtualization > Data Center > All Data Stores. The available data stores are displayed in the content pane. You can view the data store properties from the table or by right-clicking the required data store and choosing Properties. Table 27-6 describes the data store properties. Viewing the Host Servers of a Data Center To view the host centers of a data center: Step 1 Right-click on the required device and choose the Inventory option. Step 2 In the Inventory window, choose Logical Inventory > Fabric Interconnect > Compute Virtualization > Data Center > All Host Servers. Choose a host server and the details are displayed in the content pane as shown in Figure 27-6. Manager IP address of the vCenter, which manages the virtual data center. Description The description of the data center. Table 27-5 Virtual Data Center Properties (continued) Field Name Description Table 27-6 Data Store Properties Field Name Description Name Name of the data store. Storage Type Type of data storage for the data store. Capacity Capacity of the data store, in GB. Free Space Free space of the data store, in GB. Accessible Indicates whether the data store is accessible or not. Value could be True or False. 27-11 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 27 Monitoring Data Center Configurations Virtualization Figure 27-6 Host Server Details Table 27-7 describes the host server details. Table 27-7 Host Servers of a Data Center Field Name Description Name Name of the host server. IP Address The IP address of the host server. DNS Name The domain name of the host sever. State Management state of the host server. EVC Mode Enhanced vMotion Capability (Evc) of the host server. VMotion Enabled Indicates whether vMotion service is enabled or not. vMotion service helps in migrating the virtual machines from one host server to another, when a particular host server is down. Fault Tolerance Enabled Indicates whether fault tolerance service is enabled or not. This service provides continuous availability by protecting the primary virtual machine with a secondary virtual machine that runs simultaneously on a separate host. MAC Address MAC address of the host server. UUID The unique ID of the host server. 27-12 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 27 Monitoring Data Center Configurations Virtualization Hypervisor tab Name Name of the hypervisor running on the host server. Description Description of the hypervisor. Hypervisor Type Type of the hypervisor. Software Type Type of software used by the hypervisor. State State of the hypervisor, which could be Running, Runnable, Waiting, Exiting, or Other. Blade Server Link to the blade server in which the host server is located. Click the hyperlink to view the blade server details in the physical inventory. Click the Associated Service link in the blade server properties in the Physical Inventory window, to return to the host server properties. Processor tab Name Name of the processor used by the host server. Description Description of the processor used by the host server. CPU Number of central processing units (CPUs) available for the host server. Cores per CPU Number of cores per CPU available for the host server. Rated Speed Rated speed of the processor, in GHz. Used Speed Actual used speed of the processor, in GHz. Hyper Threading Enabled Indicates whether hyper threading is enabled for the host server or not. Hyper threading helps to improve parallelization of computations. RAM Size RAM size of the processor, in GB. Statistics tab CPU Usage CPU usage by the host server, in GHz. Memory Usage Memory usage by the host server, in GB. Virtual Machines tab Name Name of the virtual machine associated with the host server. IP Address IP address of the virtual machine. DNS Name Domain name of the virtual machine. MAC Address MAC address of the virtual machine. State Execution state of the virtual machine, which could be Powered On, Powered Off, or Suspended. VM Version Hardware version of the virtual machine. Virtual CPU Number of virtual CPUs configured for the virtual machine on the host server. Minimum Required EVC Mode Minimum required EvC of the virtual machine. Software Type Type of the software used by the virtual machine. Table 27-7 Host Servers of a Data Center (continued) Field Name Description 27-13 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 27 Monitoring Data Center Configurations Virtualization Viewing the Virtual Machines of a Data Center To view the virtual machines for a data center: Step 1 Right-click on the required device and choose the Inventory option. Step 2 In the Inventory window, choose Logical Inventory > Compute Virtualization > Data Center > All Virtual Machines. A list of virtual machines is displayed in the content pane as shown in Figure 27-7. Data Stores tab Data Store Name Name of the data store associated with the host server. Associated Data Store Click the hyperlink to view the associated data store under the All Data Stores node. Virtual Interfaces tab Name Name of the network endpoint of the virtual entity. Type Type of the virtual entity network endpoint. IP Address Primary IP address of the virtual entity network endpoint. MAC Address MAC address of the virtual entity network endpoint. Duplex Mode Communication mode, which could be one of the following: • Half—Transmit data in one direction at a time. • Full—Transmit data in both the directions at the same time. Table 27-7 Host Servers of a Data Center (continued) Field Name Description 27-14 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 27 Monitoring Data Center Configurations Virtualization Figure 27-7 Virtual Machine Details Table 27-8 describes the virtual machine details available in the list. Step 3 Click the hyperlinked virtual machine name to view more details about the virtual machine. Prime Network Vision takes you to the virtual machine node under the mapped host server in the logical inventory. You can view the virtual machine properties on the content pane or by right-clicking the virtual machine and choosing Properties. Table 27-8 Virtual Machines Field Name Description Name Name of the associated data center. Virtual Machines Virtual Machine Name of the virtual machine. Hypervisor Name of the hypervisor associated with the virtual machine. IP/DNS Name IP address or the domain name of the virtual machine. Mac Address Mac address of the virtual machine. 27-15 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 27 Monitoring Data Center Configurations Virtualization Table 27-9 describes the properties of the virtual machine. Table 27-9 Virtual Machine Properties Field Name Description Name Name of the virtual machine. IP Address IP address of the virtual machine. DNS Name Domain name of the virtual machine. MAC Address MAC Address of the virtual machine. State Execution state of the virtual machine, which could be Powered On, Powered Off, or Suspended. VM Version Hardware version of the virtual machine. Virtual CPU Number of virtual CPUs configured for the virtual machine on the host server. Minimum Required EVC Mode Minimum required EvC of the virtual machine. Software Type Type of the software used by the virtual machine. Statistics tab CPU Usage CPU usage by the virtual machine, in GHz. Memory Usage Memory usage by the virtual machine, in GB. Disk Usage Amount of disk space used by the virtual machine, in GB. Active Guest Memory Usage Active guest memory used by the virtual machine, in GB. CPU Allocation tab Resource Type The type of resource, which in this instance is CPU. Maximum Allocation Maximum CPU allocation for the virtual machine, in GHz. Unlimited Maximum Allocation Unlimited maximum allocation capacity availability check for the virtual machine. Value could be true or false. Expandable Allocation Expandable allocation availability for the virtual machine. Value could be true or false. Share Relative importance of the virtual machine for CPU allocation, which could be High, Normal, or Low. Custom Share Weight Custom share weight assigned to the virtual machine. Memory Allocation tab Maximum Allocation Maximum memory allocation for the virtual machine, in GB. Overhead Allocation Overhead memory allocation for the virtual machine, in GB. Unlimited Maximum Allocation Unlimited maximum allocation capacity availability check for the virtual machine. Value could be true or false. Expandable Allocation Expandable allocation availability for the virtual machine. Value could be true or false. Share Relative importance of the virtual machine for memory allocation, which could be High, Normal, or Low. 27-16 Cisco Prime Network 3.10 User Guide OL-28065-01 Chapter 27 Monitoring Data Center Configurations Virtualization Custom Share Weight Custom share weight assigned to the virtual machine. Disk Allocation tab Resource Type The type of resource, which in this instance is Disk. Guaranteed Allocation Guaranteed resource allocation for the virtual machine, in GB. Maximum Allocation Maximum disk allocation for the virtual machine, in GB. Unlimited Maximum Allocation Unlimited maximum allocation capacity availability check for the virtual machine. Value could be true or false. Expandable Allocation Expandable allocation availability for the virtual machine. Value could be true or false. Custom Share Weight Custom share weight assigned to the virtual machine. Data Stores tab Data Stores Name Name of the data store associated with the virtual machine. Associated Data Sore Click the hyperlink to view the associated data store under the All Data Stores node. Virtual Interfaces tab Name Name of the network endpoint of the virtual entity. Type Type of the virtual entity network endpoint. IP Address Primary IP address of the virtual entity network endpoint. MAC Address MAC address of the virtual entity network endpoint. Duplex Mode Communication mode, which could be one of the following: • Half—Transmit data in one direction at a time. • Full—Transmit data in both the directions at the same time. Table 27-9 Virtual Machine Properties (continued) Field Name Description A-1 Cisco Prime Network 3.10 User Guide OL-28065-01 APPENDIX A Icon and Button Reference The following topics identify the buttons, icons, and badges used in Cisco Prime Network Vision (Prime Network Vision) and Cisco Prime Network Events (Prime Network Events): • Icons, page A-1 • Links, page A-9 • Severity Icons, page A-12 • Buttons, page A-12 • Badges, page A-18 Icons The following topics describe the icons used in Prime Network Vision: • Network Element Icons, page A-2 • Business Element Icons, page A-4 • Logical Inventory Icons, page A-6 • Physical Inventory Icons, page A-9 A-2 Cisco Prime Network 3.10 User Guide OL-28065-01 Appendix A Icon and Button Reference Icons Network Element Icons Table A-1 Prime Network Vision Network Element Icons Icon Network Element Access pseudowire Router ATM switch Basic rate access (BRA) Cisco 7600 series router Cisco ASR 1000 series router Cisco ASR 5000 series router Cisco ASR 9000 series router Cisco CRS series router Cisco IOS XR 12000 series router Cisco MWR 3941 Cisco Nexus 1000 series Cisco Unified Computing System (UCS) 6100 series Cloud Digital subscriber line access multiplexer (DSLAM) A-3 Cisco Prime Network 3.10 User Guide OL-28065-01 Appendix A Icon and Button Reference Icons Ethernet switch Generic SNMP device Ghost, or unknown device ICMP device Lock, or security violation; viewable by a user with a higher permission level Missing icon, displayed in either of the following situations: • A device has been deleted via Prime Network Administration, but remains in the map. • A unique icon for an element (physical or logical) does not exist. Sun Netra server PC Printer Service control switch WiFi element Table A-1 Prime Network Vision Network Element Icons (continued) Icon Network Element A-4 Cisco Prime Network 3.10 User Guide OL-28065-01 Appendix A Icon and Button Reference Icons Business Element Icons Table A-2 Prime Network Vision Business Element Icons Icon Business Element Aggregation or root node Backup pseudowire edge Business IP interface Connection termination point (TP) Ethernet flow point (EFP) MToP service Customer EFP cross-connect Ethernet service Ethernet virtual connection (EVC) Label-Switched Path (LSP) endpoint LSP midpoint Network LSP Network pseudowire Network TP tunnel A-5 Cisco Prime Network 3.10 User Guide OL-28065-01 Appendix A Icon and Button Reference Icons Network VLAN Protected LSP Pseudowire edge Pseudowire switching entity Site Subnet Switching entity TP tunnel endpoint Virtual router VPLS forward VPLS instance VPN Working LSP Table A-2 Prime Network Vision Business Element Icons (continued) Icon Business Element A-6 Cisco Prime Network 3.10 User Guide OL-28065-01 Appendix A Icon and Button Reference Icons Logical Inventory Icons Table A-3 describes the icons used in logical inventory. Table A-3 Logical Inventory Icons Icon Logical Inventory Item Access Lists ATM Traffic Profiles Bidirectional Forwarding Detection (BFD) Cisco Discovery Protocol (CDP) Clock Ethernet LMI Frame Relay Traffic Profiles IP SLA IP Pool Dynamic Config Templates QoS Link Layer Discovery Protocol (LLDP) Modular OS Operating System Operations, Administration, and Maintenance (OAM) Resilient Ethernet Protocol (REP) Session Border Controller Spanning Tree Protocol Tunnel Traffic Descriptors BBA Groups Policy Container Access Gateway ARP Entity Bridges Ethernet Link Aggregation GRE Tunnels ICCP Redundancy container IMA Groups Local Switching LSEs MLPPP MPBGPs Multicast Multiple Spanning Tree protocol (MST) instance OSPF Processes Pseudowires Routing Entities Traffic Engineering Tunnels VC Switching Entities VRFs VSIs VPC Domain BNG DHCP Service AAA Group Probe Y.1731 Probe Bridge A-7 Cisco Prime Network 3.10 User Guide OL-28065-01 Appendix A Icon and Button Reference Icons Connectivity Fault Management (CFM) Maintenance Association CFM Maintenance Domain Connectivity Fault Management Context, for devices that support multiple virtual contexts Cross-VRF Encapsulation ICCP Redundancy group Inverse Multiplexing over ATM (IMA) group Label switching Layer 2 Tunnel Protocol (TP) peer Logical inventory Virtual Switch Interface (VSI) VLAN Trunk Protocol (VTP) Mobile node GGSN / SAE-GW / P-GW / S-GW / EGTP / GTPP container Table A-3 Logical Inventory Icons (continued) Icon Logical Inventory Item A-8 Cisco Prime Network 3.10 User Guide OL-28065-01 Appendix A Icon and Button Reference Icons GGSN / SAE-GW / P-GW / S-GW / EGTP / GTPP GTPU APN container APN ACS Operator policy APN profile / APN remap Virtual data center Data store Data stores container Host server or hypervisor Host servers/hypervisor container Virtual machine Virtual machines container Table A-3 Logical Inventory Icons (continued) Icon Logical Inventory Item A-9 Cisco Prime Network 3.10 User Guide OL-28065-01 Appendix A Icon and Button Reference Links Physical Inventory Icons Table A-4 describes the icons used in physical inventory. Links The following sections describe link icons and characteristics: • Link Icons, page A-9 • Link Colors, page A-10 • Link Characteristics, page A-11 Link Icons Table A-5 identifies the available link types and their representation in Prime Network Vision. Table A-4 Physical Inventory Icons Icon Device Chassis Satellite Shelf Slot/Subslot Port/Logical Port Unmanaged Port Table A-5 Prime Network Vision Link Icons Icon Description Icon Description Asynchronous Transfer Mode Unknown Bidirectional Forwarding Detection Physical layer Border Gateway Protocol Private Network-to-Network Interface A-10 Cisco Prime Network 3.10 User Guide OL-28065-01 Appendix A Icon and Button Reference Links Link Colors Business link Point-to-Point Protocol Ethernet Pseudowire Frame Relay Serial Generic Routing Encapsulation MPLS TE Tunnel Internal MPLS TP Tunnel IP VLAN Link aggregation group IPv6 VPN over IPv4-MPLS Multilink Point-to-Point Protocol VPN MPLS Table A-6 Link Colors and Severity Color Severity Description Critical Critical alarm is on the link. Major Major alarm is on the link. Minor Minor alarm is on the link. Normal Link is operating normally. Selected Link is selected. Table A-5 Prime Network Vision Link Icons (continued) Icon Description Icon Description A-11 Cisco Prime Network 3.10 User Guide OL-28065-01 Appendix A Icon and Button Reference Links Link Characteristics Table A-7 Link Characteristics Example Description Solid Line vs. Dashed Line Solid line—Physical, topological, or service link, such as a link between two devices. Dashed line—Association or business link between such elements as EVCs, VPLS service instances, or VPN components. Link Widths Normal—Contains links of the same group. Available groups are: • Business • GRE • MPLS-TP • Pseudowire • VLAN • All others Wide—Aggregated links that contain links of different groups. When viewing a map at a low zoom level, aggregated links cannot be distinguished in the GUI. Tunnel—The center color represents the severity of any alarms on the link. Arrowhead vs. No Arrowhead No arrowhead—Bidirectional link. Arrowhead Unidirectional link, with the flow in the direction of the arrowhead. A-12 Cisco Prime Network 3.10 User Guide OL-28065-01 Appendix A Icon and Button Reference Severity Icons Severity Icons Table A-8 identifies the severity icons used in Prime Network Events and Prime Network Vision. The icons and colors are used as follows: • The icons are used to indicate the severity of alarms in Prime Network Events and tickets in the Prime Network Vision ticket pane. • The icons are used as badges in Prime Network Vision maps to indicate the highest severity alarm that is not acknowledged for the associated network element. • The colors are used with network elements in Prime Network Vision to indicate the severity of the highest uncleared ticket on the element. • The colors are used with links in Prime Network Vision to indicate the severity of the alarm on the link. For more information, see Link Colors, page A-10. Buttons The following topics describe the buttons used in Prime Network Vision: • Prime Network Vision Buttons, page A-13 • Table Buttons, page A-15 • Link Filtering Buttons, page A-16 • Prime Network Events Buttons, page A-16 Table A-8 Severity Indicators Icon Color Severity Red Critical Orange Major Yellow Minor Light Blue Warning Green Cleared, Normal, or OK Medium Blue Information Dark Blue Indeterminate A-13 Cisco Prime Network 3.10 User Guide OL-28065-01 Appendix A Icon and Button Reference Buttons • Ticket Properties Buttons, page A-17 • Report Manager Buttons, page A-17 Prime Network Vision Buttons Table A-9 Prime Network Vision Buttons Button Function Map Options Creates a new map in the database. Opens a map saved in the database using the Open dialog box. Adds a network element to the map or to the subnetwork selected in the navigation pane and displayed in the content pane. Saves the current map (the background and the location of devices) to the database. Viewing Options Displays the map view in the Prime Network Vision content pane (the button toggles when selected or deselected). Displays the list view in the Prime Network Vision content pane (the button toggles when selected or deselected). Displays the links view in the Prime Network Vision content pane (the button toggles when selected or deselected). Overlay Tools Chooses and displays an overlay of a specific type on top of the elements displayed in the content pane in the map view. When an overlay is selected, all the elements and links that are part of the overlay are colored, and those that are not part of the overlay are dimmed. Displays or hides a previously defined overlay of a specific type on top of the elements displayed in the content pane in map view. Refreshes the overlay. A-14 Cisco Prime Network 3.10 User Guide OL-28065-01 Appendix A Icon and Button Reference Buttons Navigation Tools Moves up a level in the navigation pane and map pane to enable you to view different information. Opens the Link Filter dialog box, enabling you to display or hide different types of links in the map and links views. If a link filter is applied to the map, the Link Filter Applied button is displayed instead. Indicates a link filter is currently applied to the map and opens the Link Filter dialog box so you can remove or modify the existing link filter. If no link filter is applied to the map, the Link Filter button is displayed instead. Opens a window displaying an overview of the network. Search Tools Finds the previous instance of the search string entered in the Find in Map dialog box. Opens the Find in Map dialog box, enabling you to find a device or aggregation in the map by its name or IP address. Finds the next instance of the search string entered in the Find in Map dialog box. Opens the Find Business Tag dialog box, enabling you to find and detach a business tag according to a name, key, or type. Map Zoom and Layout Tools Defines the way in which the NES are arranged in the Prime Network Vision map view: circular, hierarchical, orthogonal, or symmetric. Fits the entire subnetwork or map in the map pane. Activates the normal selection mode. Activates the zoom selection mode, which enables you to select an area in the map pane to zoom in on by clicking and dragging. Activates the pan mode, which enables you to move around in the map pane by clicking and dragging. Table A-9 Prime Network Vision Buttons (continued) Button Function A-15 Cisco Prime Network 3.10 User Guide OL-28065-01 Appendix A Icon and Button Reference Buttons Table Buttons Opens the Activation dialog box. Opens the Activation List dialog box. Print Preview Options Opens the Printer Setup dialog box so you can specify your print settings. Opens the Print dialog box so you can print the displayed network or map to the required printer. Zooms in on the network or map. Zooms out of the network or map. Displays the entire network or map in the Print Preview window. Table A-10 Table Buttons Icon Name Description Find Searches the current table for the string you enter. Export to CSV Exports the information displayed in the list view. Either the selected rows are exported, or, when nothing is selected, the entire table is exported. Sort Table Values Sorts the information displayed in the list view (for example, according to element category). Filter Filters the information displayed in the table by the criteria you specify. Clear Filter Clears the existing filter. Table A-9 Prime Network Vision Buttons (continued) Button Function A-16 Cisco Prime Network 3.10 User Guide OL-28065-01 Appendix A Icon and Button Reference Buttons Link Filtering Buttons Prime Network Events Buttons Show All Rows Displays all table rows that meet the current filtering criteria. Show Only Selected Rows Displays only the rows that you select. Table A-11 Link Filtering Buttons Button Name Description All Links Displays the complete list of links for the selected context (map or aggregation). In other words, the list is not filtered and all the links are displayed, including external links. External Links Displays links with only one side of the link in this context (map or aggregation) and the other side either not in the map or outside the selected context. Flat Links Displays the links currently visible on the map for the selected context (map or aggregation), excluding any thumbnails. Deep Links Displays the links for the current aggregation where both endpoints are within the currently selected context. Table A-12 Prime Network Events Buttons Button Function Displays the previous page of events in the Prime Network Events window. Displays the next page of events in the Prime Network Events window. Refreshes the events displayed in the log by querying the database. If a filter is active, the refresh is done according to the filter. The log returns to the beginning of the list, displaying the events in ascending or descending order depending on the order of the current list. Descending order means that the last event is displayed first. Displays the Prime Network Events Filter dialog box, which enables you to define a filter for the events displayed in the Prime Network Events log. Table A-10 Table Buttons (continued) Icon Name Description A-17 Cisco Prime Network 3.10 User Guide OL-28065-01 Appendix A Icon and Button Reference Buttons Ticket Properties Buttons Report Manager Buttons Toggles automatic refresh of event data on and off. You define the refresh-time period (in seconds) in the Prime Network Events Options dialog box. The default is 60 seconds. If a filter is active, the refresh is done according to the filter. Displays the properties of the selected event or ticket in the Properties pane. Table A-13 Ticket Properties Window Buttons Icon Description Refreshes the information displayed in the Ticket Properties dialog box. Acknowledges that the ticket is being handled. The status of the ticket is displayed as true in the ticket pane and in the Ticket Properties dialog box. If a ticket was acknowledged, and some events were correlated to it afterward, then the ticket is considered to have not been acknowledged. This button is enabled only if the ticket is not acknowledged. Requests the relevant Prime Network system to remove the faulty network element from the Prime Network Vision networking inventory. In addition, it sets the ticket to Cleared severity or status (the icon is displayed in green) and automatically changes the acknowledged status of the ticket to true. This button is enabled only if the severity of the alarm is higher than Cleared or Normal. Saves the notes for the selected ticket. This button is enabled only when text is entered in the Notes field of the Notes tab. Table A-14 Report Manager Buttons Icon Name Description Define Report of This Type Enables you to define a report of this type that is suited specifically to your environment. Delete Deletes one or more folders that you created. Delete Report Deletes the selected report. Table A-12 Prime Network Events Buttons (continued) Button Function A-18 Cisco Prime Network 3.10 User Guide OL-28065-01 Appendix A Icon and Button Reference Badges Badges Badges are small icons that appear with other network elements, such as element icons or links. The following topics describe the badges used by Prime Network Vision and Prime Network Events: • VNE Communication State Badges, page A-18 • VNE Investigation State Badges, page A-19 • Network Element Technology-Related Badges, page A-20 VNE Communication State Badges Move Moves one or more folders or reports that you created. New Folder Creates a new folder Rename Renames a folder that you created. Run Generates the selected report View Displays the selected report in HTML format. Table A-14 Report Manager Buttons (continued) Icon Name Description Table A-15 VNE Communication State Badges Badge State Name Description None Agent Not Loaded The VNE is not responding to the gateway because it was stopped, or it was just created. This communication state is the equivalent of the Defined Not Started investigation state. VNE/Agent Unreachable The VNE is not responding to the gateway. This can happen if the unit or AVM is overutilized, the connection between the gateway and unit or AVM was lost, or the VNE is not responding in a timely fashion. (A VNE in this state does not mean the device is down; it might still be processing network traffic.) None Connecting The VNE is starting and the initial connection has not yet been made to the device. This is a momentary state. Because the investigation state decorator (the hourglass) will already be displayed, a special GUI decorator is not required. Device Partially Reachable The element is not fully reachable because at least one protocol is not operational. A-19 Cisco Prime Network 3.10 User Guide OL-28065-01 Appendix A Icon and Button Reference Badges VNE Investigation State Badges Device Unreachable The connection between the VNE and the device id down because all of the protocols are down (though the device might be sending traps or syslogs). None Tracking Disabled The reachability detection process is not enabled for any of the protocols used by the VNE. The VNE will not perform reachability tests nor will Prime Network generate reachability-related events. In some cases this is desirable; for example, tracking for Cloud VNEs should be disabled because Cloud VNEs represent unmanaged network segments. Table A-16 VNE Investigation State Badges Badge State Name Description None Defined Not Started A new VNE was created (and is starting); or an existing VNE was stopped. In this state, the VNE is managed and is validating support for the device type. (This investigation state is the equivalent of the Agent Not Loaded communication state.) A VNE remains in this state until it is started (or restarted) by a user. Unsupported The device type is either not supported by Prime Network or is misconfigured (it is using the wrong scheme, or is using reduced polling but the device does not support it). To extend Prime Network functionality so that it recognizes unsupported devices, use the VNE Customization Builder. See the Cisco Prime Network 3.10 Customization Guide. Discovering The VNE is building the model of the device (the device type was found and is supported by Prime Network). A VNE remains in this state until all device commands are successfully executed at least once, or until there is a discovery timeout. None Operational The VNE has a stable model of the device. Modeling may not be fully complete, but there is enough information to monitor the device and make its data available to other applications, such as activation scripts. A VNE remains in this state unless it is stopped or moved to the maintenance state, or there are device errors. Currently Unsynchronized The VNE model is inconsistent with the device. This can be due to a variety of reasons; for a list of these reasons along with troubleshooting tips, see the topic on troubleshooting VNE investigation state issues in the Cisco Prime Network 3.10 Administrator Guide. Table A-15 VNE Communication State Badges (continued) Badge State Name Description A-20 Cisco Prime Network 3.10 User Guide OL-28065-01 Appendix A Icon and Button Reference Badges Network Element Technology-Related Badges Maintenance VNE polling was suspended because it was manually moved to this state (by right-clicking the VNE and choosing Actions > Maintenance). The VNE remains in this state until it is manually restarted. A VNE in the maintenance state has the following characteristics: • Does not poll the device, but handles syslogs and traps. • Maintains the status of any existing links. • Does not fail on VNE reachability requests. • Handles events for correlation flow issues. It does not initiate new service alarms, but does receive events from adjacent VNEs, such as in the case of a Link Down alarm. The VNE is moved to the Stopped state if: it is VNE is moved, the parent AVM is moved or restarted, the parent unit switches to a standby unit, or the gateway is restarted. Partially Discovered The VNE model is inconsistent with the device because a required device command failed, even after repeated retries. A common cause of this state is that the device contains an unsupported module. To extend Prime Network functionality so that it recognizes unsupported modules, use the VNE Customization Builder. See the Cisco Prime Network 3.10 Customization Guide. Shutting Down The VNE has been stopped or deleted by the user, and the VNE is terminating its connection to the device. None Stopped The VNE process has terminated; it will immediately move to Defined Not Started. Table A-17 Network Element Technology-Related Badges Icon Description Access gateway Blocking Clock service Associated LSP is in lockout state Multiple links Reconciliation Table A-16 VNE Investigation State Badges (continued) Badge State Name Description A-21 Cisco Prime Network 3.10 User Guide OL-28065-01 Appendix A Icon and Button Reference Badges Alarm and Ticket Badges See Severity Icons, page A-12 for information about the icons used for alarm and ticket badges. REP blocking primary REP primary Redundancy service STP root Table A-17 Network Element Technology-Related Badges (continued) Icon Description A-22 Cisco Prime Network 3.10 User Guide OL-28065-01 Appendix A Icon and Button Reference Badges GL-1 Cisco Prime Network 3.10 User Guide OL-28065-01 GLOSSARY A AAA AAA refers to Authentication, Authorization, and Accounting, which is a security architecture for distributed systems that determines the access given to users for specific services and the amount of resources they have used. aggregation A user-defined collection of network elements. For example, an aggregation can contain devices, links, VPNs, and other aggregations. alarm Sequence of event notifications that share the same source, cause, or fault. For example, if a single port goes up and then down, these two events in a related sequence may result in a single alarm. An alarm is stateful and is opened when a fault is first detected. Event notifications may be added to the alarm, and it is archived when it is fixed. association A relationship between the following types of network elements: a logical (protocol-oriented) network element and a physical network element; a logical network element and another logical network element; or an existing association and anything else. An example for a VPN would be an association between the physical IP interface and Virtual Routing and Forwarding (VRF) table, which is the associated routing table. An association is not considered a topological link. B BFD Bidirectional Forwarding Detection (BFD) is used to detect communication failures between two elements, or endpoints, that are connected by a link, such as a virtual circuit, tunnel, or LSP. BNG Broadband Network Gateway (BNG) provides capabilities that help to improve the service provider's ability to manage the subscriber's services, and simplify overall network operations. business element Construction or organization of certain network elements and their properties into a logical entity, to provide the ability to track them in a way that makes sense from a business perspective. A virtual private network (VPN) is a business element, which represents a set of interconnected sites that form a single network over a public network. Prime Network organizes the business elements in a way that creates a containment hierarchy that reflects the VPN structure. business tag A string that is meaningful to the business, and that can be used to label a component of a network element for use in Prime Network screens and reports. There are three types of business tags: subscriber, provider, and label. Business tags are stored in the Prime Network gateway database. Glossary GL-2 Cisco Prime Network 3.10 User Guide OL-28065-01 C carrier grade NAT A large-scale Network Address Translation (NAT) that provides translation of millions of private IPv4 addresses to public IPv4 addresses. CCM Change and Configuration Management provides tools that allow you to manage the software and device configuration changes that are made to devices in your network. D data center A centralized repository, either physical or virtual for the storage, management, dissemination of data and information organized around a particular manner. In other words, it is a facility used to house computer systems and associated components, such as telecommunications and storage systems. DHCP Dynamic Host Configuration Protocol is used to automate host configuration by assigning IP addresses, delegating prefixes (in IPv6), and providing extensive configuration information to network computers. dynamic links The physical and logical links that exist between elements in the network. These links are discovered by Prime Network using various protocols (such as STP, CDP, and LLDP). dynamic templates Used to group configuration items, which are later applied to a group of subscribers. This template is globally configured through the command line interface (CLI). E event In the context of network management, a discrete activity that occurred at a specific point in time. E-LMI Ethernet Local Management Interface (E-LMI) is a protocol that operates between the customer edge (CE) network element and the provider edge (PE) network element. Ethernet LMI is a protocol between the CE network element and the provider edge (PE) network element. F FabricPath An innovation in Cisco NX-OS software that brings the stability and scalability of routing to Layer 2. It provides a foundation to build a scalable fabric—a network that itself looks like a single virtual switch from the perspective of its users. G GRE Generic routing encapsulation (GRE) is a tunneling protocol, originated by Cisco Systems and standardized in RFC 2784. GRE encapsulates a variety of network layer packets inside IP tunneling packets, creating a virtual point-to-point link to devices at remote points over an IP network. Glossary GL-3 Cisco Prime Network 3.10 User Guide OL-28065-01 H HSRP Hot Standby Router Protocol (HSRP) is a protocol that provides backup to a router in case of failure. Using HSRP, several routers are connected to the same Ethernet network segment and work together to present the appearance of a single virtual router. H-VPLS Partitions the network into several edge domains that are interconnected using an MPLS core. The edge devices learn only of their local N-PE devices and therefore do not need large routing table support. I IP Multicast A bandwidth-conserving technology that reduces traffic by simultaneously delivering a single stream of information to thousands of corporate recipients and homes. IP Pool An IP pool is a sequential range of IP addresses within a certain network. IP addresses can be assigned dynamically from a single pool or from a group of pools for services running on a network element. IS-IS Intermediate System-to-Intermediate System (IS-IS) protocol is a routing protocol developed by the ISO. It is a link-state protocol where IS routers exchange routing information based on a single metric to determine network topology. L link A physical or logical connection between two devices in the network, a device and an aggregation, or two aggregations. logical link An association between two network elements (based on a chain of physical links between the elements); for example, a tunnel. M managed element A network element that is managed by Prime Network; for example, a device, cloud, or Internet Control Message Protocol (ICMP) VNE. MLPPP Multilink PPP is a protocol that connects multiple links between two systems as needed to provide bandwidth when needed. MLPPP packets are fragmented, and the fragments are sent at the same time over multiple point-to-point links to the same remote address. N Glossary GL-4 Cisco Prime Network 3.10 User Guide OL-28065-01 network clock service The means by which a clock signal is generated or derived and distributed through a network and its individual nodes for the purpose of ensuring synchronized network operation. network element Any physical component or device in the network that can be managed through an IP address. P physical link A link between physical network objects; for example, a connection between two physical ports. provider The party providing a service. Q QoS Quality of services is the technique of prioritizing traffic flows and specifying preferences for forwarding packets with higher priority. S SBC Session Border Controllers control and manage real-time multimedia traffic flows between IP network borders, handling signaling, and media. static links Links that are created at the VNE level but are not updated. These links do not perform any configuration or provisioning on a device or in the network. subscriber The party receiving a service. subscriber access points The access interfaces that are named based on the parent interface. T ticket Object that represents an attention-worthy root alarm whose type is marked in the registry as “ticketable.” A ticket has the same type as the root alarm it represents, and it has a status, which represents the entire correlation tree. A ticket can be acknowledged by the user. Both Prime Network Vision and Cisco Prime Network Events display tickets and allow you to navigate down to view the consequent alarm hierarchy. From an operator’s point of view, a fault is always represented by a complete ticket. Operations such as Acknowledge or Remove are applied to the whole ticket. U unassociated bridges Switching Entities that do not belong to a flow domain, such as a network VLAN, a VPLS instance, or a network pseudowire. Glossary GL-5 Cisco Prime Network 3.10 User Guide OL-28065-01 V virtual cloud or unmanaged network Network, or part of a network, that is not managed by Prime Network. An unmanaged network is often represented in network diagrams by a cloud symbol or image. virtualization A concept of creating a virtual version of any resource, such as hardware platform, operating system, storage device, or network resources VLAN Virtual local-area network (LAN). Group of devices on one or more LANs that are configured (using management software) so that they can communicate as if they were attached to the same wire, when in fact they are located on a number of different LAN segments. Because VLANs are based on logical instead of physical connections, they are extremely flexible. VPC Virtual Port Channel (vPC) allows links that are physically connected to two different Cisco Nexus 7000 or Cisco Nexus 5000 series network elements to appear as a single port channel by a third device. VPLS Virtual Private LAN Service is a Layer 2 VPN technology that provides Ethernet-based multipoint-to-multipoint communication over MPLS networks. VPLS allows geographically dispersed sites to share an Ethernet broadcast domain by connecting sites through pseudowires. VPN Virtual Private Network. Enables IP traffic to travel securely over a public TCP/IP network by encrypting all traffic from one network to another. A VPN uses tunneling to encrypt all information at the IP level. VRRP Virtual Router Redundancy Protocol is a non-proprietary redundancy protocol that is designed to increase the availability of the static default gateway servicing hosts on the same subnet. This increased reliability is achieved by advertising a virtual router (a representation of master and backup routers acting as a group) as a default gateway to the hosts instead of one physical router. Y Y.1731 Y.1731 is an ITU-T recommendation that provides mechanisms for service-level Operation, Administration, and Maintenance (OAM) functionality in Ethernet networks. Glossary GL-6 Cisco Prime Network 3.10 User Guide OL-28065-01 IN-1 Cisco Prime Network 3.10 User Guide OL-28065-01 INDEX Numerics 3.6.x tabs, in Prime Network Events 9-12 6rd tunnels, viewing properties 19-48 6VPE and IPv6 18-1 IPv6 VPN over MPLS 18-1 A AAA diameter configuration 23-6 radius configuration 23-7 AAA configuration 23-1 supported protocols 23-1 AAA configurations view 23-2 AAA group 23-2 aaa groups 23-2 access gateway badge 3-8, A-20 viewing properties 13-19 accumulating affected parties in an alarm 10-23 in the correlation tree 10-23 acknowledged tickets 10-7 acknowledging tickets 10-19 ACS overview 26-52 activating images on devices (NEIM) Cisco IOS XR devices and 4-35 permissions 4-56, 4-57 activation script, launching 2-37, 5-1 active charging service 26-52 adding associated VLANs 13-54 EFP cross-connects 13-75 Ethernet services 13-103 MPLS-TP tunnels 19-5 pseudowires 13-89 unassociated bridges 13-72 VLANs 13-49 VPLS instances 13-78 VPNs existing 19-22 new 19-21 address family ipv4 profile 20-4 address family ipv6 profile 20-5 administration global settings 4-47 Advanced tab events 9-17 tickets 10-18 affected elements, finding 10-19 affected parties 10-22 accumulating 10-23 Affected Parties tab (tickets) 10-14 calculating 10-22 finding 10-19 affected severity, updating over time 10-24 Agent Not Loaded, VNE communication state 2-20 Agent Unreachable, VNE communication state 2-20 aggregation, definition 1-1 aggregations adding elements to 5-18 aggregating network elements 5-16 Index IN-2 Cisco Prime Network 3.10 User Guide OL-28065-01 disaggregating 5-19 viewing thumbnails 5-16 working with thumbnail views 5-15, 5-18 alarm count, definition 10-6 alarms badges A-21 customizing 2-39 definition 1-1 disabling on a port 3-26 severities 10-22 All tab, in Prime Network Events 9-3 APN additional characteristics 26-18 overview 26-12 view properties 26-13 APN profiles 26-41 APN remaps 26-41 application, launching external 2-32, 2-37, 5-1 applying overlays Ethernet service 13-104 MPLS-TP tunnels 19-16 network clock 21-49 pseudowire 13-101 VLAN 13-60 VPLS instance 13-79 VPN 19-24 ARP table 19-35 associated VLANs adding 13-54 tag manipulations 13-54 viewing mapping properties 13-56 service links 13-56 working with 13-54 association, definition 1-1 ATM cross-connects in logical and physical inventory 21-6 overview 21-6 properties 21-7 viewing 21-6 audience, intended xxi audio options, customizing 2-39 Audit tab events 9-17 in Prime Network Events 9-3 auto refresh, in Prime Network Events 9-21 B background images for maps 5-12 backing up files to archive (CM) 4-17, 4-56, 4-57 badges access gateway 3-8, A-20 alarms 2-18, A-21 blocking 3-8, A-20 clock service 3-8, A-20 for elements and links 3-8 icons A-18 lock 3-8, 19-6, A-20 management states A-18 multiple links 3-8, A-20 reconciliation 3-9, 7-7, 13-49, A-20 redundancy service 3-9, A-21 REP primary 3-9, A-21 REP primary blocking 3-9, A-21 STP root 3-9, A-21 technology related A-20 tickets A-21 VNE communication states A-18 VNE investigation states A-19 VNE management states 2-18 bba groups 25-3 BER thresholds, SONET (commands) 21-54 BFD configuration commands 19-56 template commands 19-56 viewing BFD session properties 19-50 viewing MPLS-TP BFD session properties 19-52 Index IN-3 Cisco Prime Network 3.10 User Guide OL-28065-01 BGP, viewing inventory details 19-47 Bidirectional Forwarding Detection. See BFD Blacklists (SBC), configuring 22-15 blacklists (SBC), configuring 22-26 blocked ports, using with Cisco PathTracer 12-4 blocking badge 3-8, A-20 bng 25-1 retail model 25-2 subscriber access points 25-5, 25-6 user roles 25-2 wholesale model 25-2 bridges understanding unassociated 13-72 viewing properties for VLANs 13-69 broadband access groups 25-3 broadband network gateway overview 25-1 bulk lock mpls tp tunnels 19-57 bulk unlock mpls tp tunnels 19-57 business configurations 7-7 business elements definition 1-1 icons 2-10, A-4 roles required 7-1 business tag definition 1-1 roles required 7-1 searching for 7-4 using Chinese characters 7-2 working with 7-3 buttons A-16 for filtering links A-16 in table toolbars A-15 Prime Network Events Auto Refresh 9-21 Refresh Now 9-21 Ticket Properties dialog box A-17 toolbar A-16 Prime Network Vision A-12 link filtering A-16 table toolbar A-15 toolbar A-13 Report Manager toolbar A-17 C CAC Policies (SBC), configuring 22-15, 22-28 callouts, VPN service overlay 19-25 Call Policies (SBC), configuring 22-15, 22-32 Carrier Ethernet services, monitoring 13-1, 14-1 Carrier Grade NAT Add CGNAT or 6rd forwarding 13-116, 14-6 Create CGNAT instance 13-116, 14-6 Pool Utilization (command) 14-5 roles required for viewing properties 14-2 viewing properties logical inventory 14-2 physical inventory 14-5 Carrier Supporting Carrier (CSC) path traces 12-31 CEM groups configured on physical interfaces 21-52 virtual CEM interfaces 21-53 viewing in logical inventory 21-53 physical inventory 21-52 viewing properties 21-51 CEM interfaces properties 21-52 viewing in physical inventory 21-51 CESoPSN, viewing properties 21-3 CFM 16-10 commands 16-10 configure parameters 16-10 description maintenance domains 16-3 maintenance endpoints (MEPs) 16-3 maintenance intermediate points (MIPS) 16-3 Index IN-4 Cisco Prime Network 3.10 User Guide OL-28065-01 maintenance domain, configure 16-10 overview 16-3 service ID, configure 16-10 SNMP server traps, enable 16-10 viewing properties for maintenance associations 16-8 maintenance domains 16-5, 16-7 MEPs 16-8 MIPs 16-6 remote MEPs 16-10 Change and Configuration Management global settings 4-47 change logs (CM) 4-23, 4-56, 4-57 Chinese characters support for business tags 7-2 Circuit Emulation Services over PSN. See CESoPSN Cisco.com credentials for NEIM 4-7 Cisco Discovery Protocol (CDP) properties in logical inventory 13-6 in physical inventory 13-8 viewing 13-6 Cisco IOS XR devices committing image changes (NEIM) 4-39 logical routers and 4-35 rolling back images (NEIM) 4-40 special notes for NEIM 4-35 Cisco PathTracer across CSC configurations 12-31 comparing paths 12-27 counter values, saving 12-26 destinations 12-11 details pane 12-25 details window menu options 12-22 toolbar 12-22 in MPLS networks 12-29 launching from Ethernet Flow Point (EFP) 12-8 Ethernet port 12-12 examples 12-7 IP interface 12-9 MPLS-TP tunnel endpoint 12-13 pseudowire endpoint 12-12 VLAN bridge 12-10 Layer 2 VPNs 12-32 Layer 3 VPNs 12-32 menus 12-16 opening 12-3 overview 12-1, 12-2 path pane 12-18 path trace from inventory 12-7 from map view 12-5 options for starting 12-5 path trace pane 12-18, 12-23 rerunning paths 12-27 right-click options in path trace window 12-19 trace launch options 12-4 roles required 12-1 single-path window 12-16 starting points 12-30 tabs 12-18 toolbar 12-17 viewing Layer 2 Tunnel Protocol path information 12-28 path trace details 12-20 path traces 12-14 QinQ path information 12-27 Cisco Prime Network setup tasks 4-3 clear flash image distribution 4-30 clearing and removing tickets 10-21 clearing tickets 10-7, 10-20 clock recovery, pseudowire properties 21-45 clock service badge 3-8, A-20 Index IN-5 Cisco Prime Network 3.10 User Guide OL-28065-01 properties 21-36 Clock source, SONET (commands) 21-54 CM archive, using 4-11, 4-56, 4-57 backing up files to archive 4-17 change logs 4-23 comparing files 4-13 deleting files from archive 4-22 exporting files 4-15 labels and 4-12 permissions 4-56, 4-57 restoring files from archive to devices 4-20 setup tasks 4-5 synchronizing files 4-16 CMF global parameters, configure 16-10 Codec Lists (SBC), configuring 22-36 Codec lists (SBC), configuring 22-15 color coding, severity icons 8-4 commands fabricpath 27-8 mobile 26-68 vPC 27-4 committing image changes (NEIM) 4-39, 4-56, 4-57 communication status, for VNEs 3-17 comparing files (CM) 4-13, 4-56, 4-57 configuraiton audit schedule 4-44 configuration audit 4-42 view result 4-45 configuration management permissions 4-56, 4-57 configuration policy create 4-43 manage 4-43 sample 4-43 sample CLIs 4-42 configuration scripts, launching 2-37, 5-1 configuring IP SLA parameters 17-11 configuring probe endpoint association 17-5 configuring profiles 17-5 configuring y.1731 probes 17-4 Connecting, VNE communication state 2-20 Connectivity Fault Management. See CFM content pane in Prime Network Vision 2-7 in the Prime Network Vision inventory window 3-13 tabs in logical inventory 3-30 continuity check 16-10 Control Channel (CC), viewing information for pseudowire endpoint 13-97 conventions, used in this document xxiv Correlation tab (tickets) 10-17 counters, SONET (commands) 21-54 CPU usage graph, opening 5-27 create configuration policy 4-43 create on demand probe configuration 17-7 creating maps 5-6 report folders 11-46 VPNs 19-21 cross-connects ATM overview 21-6 properties 21-7 viewing 21-6 EFP adding 13-75 overview 13-74 properties 13-75 cross-VRF routing entries 19-52 Currently Unsynchronized, VNE investigation state 2-21 customizing audio options 2-39 event history size 2-39 Index IN-6 Cisco Prime Network 3.10 User Guide OL-28065-01 D Daily Average and Peak report 11-12 Daily Event Count by device report 11-15 data center 27-1 data store view configuration 27-10 deassociating a profile 17-10 Defined Not Started, VNE investigation state 2-20 defining report types 11-46 deleting business elements 7-7 report folders 11-48 reports 11-44 deleting a profile 17-10 deleting files from archive (CM) 4-22 deleting images from repository (NEIM) 4-41 deleting IP SLA 17-12 Dense Wavelength Division Multiplexing. See DWDM destination, for Cisco PathTracer 12-11 Detailed Audit Events report 11-17 Detailed Provisioning Events report 11-17 Detailed Security Events report 11-18 Detailed Service Events report 11-15 Detailed Syslogs report 11-16 Detailed System Events report 11-18 Detailed Tickets report 11-16 Detailed Traps report 11-16 details pane, Cisco PathTracer 12-25 Details tab events 9-15 tickets 9-19, 10-12 Device Partially Reachable, VNE communication state 2-20 devices aggregations 5-16 CPU usage, checking 5-27 icons 2-7, A-2 in maps 5-16 pinging 5-28 severity indicator 2-17 status indicators 2-16 Telnet to a device 5-28 viewing operating system information 3-31 properties 3-6 Devices with the Most Events report by severity 11-12 by type 11-12 Devices with the Most Syslogs report 11-13 Devices with the Most Traps report 11-13 Device Unreachable, VNE communication state 2-20 device view pane in the Prime Network Vision inventory window 3-13 toolbar 3-14 dhcp service 25-7 diagnose subscriber access points 25-6 diagnose y.1731 probes 17-13 disaggregating aggregations 5-19 Discovering, VNE investigation state 2-21 discovery based on Link OAM 16-21 EFD 13-44 EVC multiplex services 13-103 MPLS-TP tunnels 19-5 VLAN 13-44 distributing images to devices (NEIM) 4-27, 4-35, 4-56, 4-57 document audience xxi conventions xxiv organization xxii related documentation xxv duplication count, definition 10-6 DWDM channel, configure 15-15 commands 15-15 history (commands) 15-15 laser state, setting 15-15 Index IN-7 Cisco Prime Network 3.10 User Guide OL-28065-01 loopback, setting 15-15 roles required for viewing properties 15-1 thresholds, setting 15-15 viewing alert and alarm counters 15-10 G.709 properties 15-5 ODU alarm properties 15-8 ODU alert properties 15-9 OTU alarm properties 15-8 OTU alert properties 15-9 performance monitoring configuration 15-11 properties 15-3 dynamic authorization profile 23-3 dynamic config templates 25-9 ppp template 25-11 dynamic host configuration protocol 25-7 E EFD discovery 13-44 EFP launching a path trace 12-8 overview 13-46 understanding severity and ticket badges 13-37 EFP cross-connects adding 13-75 viewing properties 13-75 working with 13-74 egress adjacents, VRF 19-31 EGTP overview 26-31 element icons, and information displayed 3-3 elements, business deleting 7-7 renaming 7-7 elements, viewing operating system information 3-31 e-mail notification configuration settings 4-6, 4-51 image management settings 4-7 Ethernet flow domains renaming 13-41 viewing 13-41 Ethernet Flow Domains inventory tab 2-4 Ethernet flow point (EFP), viewing properties 13-32 Ethernet LAGs viewing 13-22 viewing properties 13-23 Ethernet links, and configured LSPs 19-11 Ethernet LMI commands 16-20 Device EVC Properties window 16-18 enable 16-20 EVC, configure 16-20 overview 16-16 service instance, configure 16-20 UNI, configure 16-20 viewing properties for device EVCs 16-17 for physical interfaces 16-18 for UNI interfaces 16-19 in logical inventory 16-17 Ethernet Local Management Interface. See Ethernet LMI Ethernet OAM overview 16-2 roles required for viewing properties 16-1 Ethernet Operations, Administration, and Maintenance. See Ethernet OAM Ethernet port, launching a path trace 12-12 Ethernet Service report detailed 11-21 options 11-36 summary 11-21 Ethernet services adding overlays 13-104 adding to maps 13-103 viewing properties 13-106 working with 13-102 EVC (E-LMI), configure 16-20 Index IN-8 Cisco Prime Network 3.10 User Guide OL-28065-01 EVC (L-OAM), configuring 16-25 EVC multiplex services, discovery 13-103 EVCs shared switching entities 13-39 viewing service properties 13-39 event history size, customizing 2-39 Event Reduction Statistics report 11-13 events Advanced tab 9-17 Audit tab 9-17 categories 8-4 definition 1-2 Details tab 9-15 filtering 9-22, 9-23 Provisioning tab 9-17 refreshing list in Prime Network Events 9-21 removing filters 9-24 Security tab 9-17 Trap tab 9-18 viewing in Prime Network Events 9-2 properties 9-14 events reports 11-11 detailed network events, report options 11-28 detailed non-network events, report options 11-31 generating from Prime Network Vision 11-39 Report Manager 11-24 Reports menu 11-38 report options 11-26 Run Report dialog box 11-25 exporting data from Prime Network Events 9-25 exporting files (CM) 4-15, 4-56, 4-57 external application, launching 2-32, 2-37, 5-1 F fabricpath 27-5 Fault Database vs. Event Archive Statistics report 11-13 FEC commands 15-15 filtering events 9-22, 9-23 links by type 5-26, 5-27 during map creation 5-26 in an existing map 5-27 using collection method 6-17 removing for events and tickets 9-24 tickets by criteria 10-8 flickering links 6-3 G G.709 commands 15-15 General tab, in inventory window 3-13 generated ticket 10-7 GGSN overview 26-5 view properties 26-6 global settings 4-47 NEIM 4-53 GPRS/UMTS network 26-4 working technologies 26-5 graphical links, reducing number of in maps 2-11 GTPP additional characteristics 26-26 overview 26-24 view properties 26-25, 26-31 GTPU overview 26-10 view properties 26-10 GUI overview of 4-1 Index IN-9 Cisco Prime Network 3.10 User Guide OL-28065-01 H Hardware Summary By Selected Property 11-19 Hardware Summary Detailed report 11-19 History tab (tickets) 10-13 host server view configuration 27-10 HSRP view properties 13-17 H-VPLS working with 13-77 working with in Prime Network Vision 13-77 I icons See also buttons and badges alarm and ticket A-21 badges A-18 business elements 2-10, A-4 information displayed for elements 3-3 links A-9 logical inventory 3-30, A-6 management states 2-18, A-18 maps 19-20 map view 2-8 network elements 2-7, 2-9, A-2 physical inventory 3-19, A-9 Prime Network Events A-12 Prime Network Vision 2-8, A-1 reconciliation 3-9 reference A-1 REP 13-62 severities A-12 severity, color coding 2-17, 8-4 sizes 2-8, 3-3 tickets 2-22 VLAN domains 13-62 VLAN overlays 13-62 IGMP profile 20-5 image management permissions 4-56, 4-57 IMA group properties 21-13 viewing properties 21-13 impact analysis accumulating affected parties 10-22 affected severities 10-22 automatic mode 10-22 links and 6-12 proactive mode 10-22 importing images into archive (NEIM) 4-24 Initializing management state 2-18 Inter-Chassis Communication Protocol (ICCP), viewing properties 13-28 inventory reports 11-19 generating from Prime Network Vision 11-39 Report Manager 11-32 Reports menu 11-38 report options 11-33 Run Report dialog box 11-33 inventory tabs Ethernet Flow Domains 2-4 in Prime Network Vision 2-4 Network Elements 2-4 types of 2-4 VTP Domains 2-4 inventory window content pane 3-13 device view pane 3-13 device view pane toolbar 3-14 General tab 3-13 logical inventory 3-27 navigation pane 3-12 Network Events tab 3-15 opening 3-9 options Index IN-10 Cisco Prime Network 3.10 User Guide OL-28065-01 Disable Sending Alarms button 3-21, 21-6 Open Port Utilization Graph button 3-21, 21-6 Show Cross-Connect Table button 3-21, 21-6 Show DLCI Table button 3-21, 21-6 Show Encapsulation button 3-21, 21-6 Show VC Table button 3-21, 21-6 overview 3-9, 3-11 physical inventory 3-19, 3-21, 21-6 Ports tab 3-13, 3-23 Provisioning Events tab 3-15 ticket and events pane 3-15 Tickets tab 3-15 IOS-XR Software Package Summary report 11-20 ip and mpls multicast configuration 20-1 IP interface, launching a path trace 12-9 IPoDWDM See also DWDM IPoDWDM commands 15-15 IP pools 24-1 IP SLA 17-12, 17-14 IP SLA, viewing responder service properties 13-109 IP SLA parameters 17-11 ip subscriber template 25-9 IPv6 addresses in logical inventory 18-3 in physical inventory 18-4 in inventory 18-3 in Prime Network 18-2 notes, for viewing IPv6 addresses 18-4 support in Prime Network 18-1 viewing IPv6 information 18-2 IPv6 VPN over MPLS (6VPE) 18-1 IS-IS, viewing properties 13-111 J jobs CM 4-56, 4-57 e-mail notification 4-55 NEIM 4-56, 4-57 jobs scheduler 11-40 L labeling files (CM) 4-12, 4-56, 4-57 labels, MPLS-TP tunnel (commands) 19-56 launching Prime Network Events from Prime Central 8-2 in Find mode 8-3 launching Prime Network Vision as a standalone application 2-2, 8-2 from Prime Central 2-2 Layer 2 Cisco PathTracer (VPN) 12-32 Layer 3 Cisco PathTracer (VPN) 12-32 link aggregation group. See Ethernet LAGs Link Layer Discovery Protocol (LLDP), viewing properties 13-8 Link OAM and topology discovery 16-21 commands 16-25 enabling and disabling 16-25 EVCs, configuring 16-25 overview 16-20 remote loopback, enabling and disabling 16-25 templates, managing 16-25 viewing properties in logical inventory 16-22 physical inventory 16-25 link properties window link list pane 6-11 overview 6-10 properties pane 6-11 ticket and events pane 6-12 links adding 6-15 arrowheads 6-5, A-11 bidirectional vs. unidirectional 6-5, A-11 Index IN-11 Cisco Prime Network 3.10 User Guide OL-28065-01 colors 6-5 dashed line 6-4, A-11 definition 1-3 dynamic 6-3 exceeding number that can be displayed 2-10 filtering A-16 by type 5-26, 5-27 in maps 5-25 using collection method 6-17 flickering 6-3 graphical representation 2-10 icons A-9 impact analysis 6-12 in maps 2-10 links view 6-8 normal vs. wide vs. tunnel 6-5 overview 6-1 properties 6-4 quick view 6-7 reducing number of in maps 2-11 selecting in maps 6-18 significance of arrowheads A-11 characteristics A-11 color A-10 solid vs. dashed lines A-11 width A-11 solid line 6-4, A-11 static 6-3 tooltips 2-11, 6-6 tunnels 6-5 types A-9 use of arrowheads 6-5 user roles required for working with 6-1 viewing between VLAN elements and devices 13-57 in links view 6-8 options 6-17 properties 6-4, 6-10 width 6-5 links, MPLS-TP tunnel (commands) 19-56 links view filtering 2-16, A-16 information displayed 2-15 in Prime Network Vision 2-14 list view in Prime Network Vision 2-11 overview 2-11 right-click options 2-13 toolbar 2-41, A-15 LLDP, viewing properties 13-8 lock badge 3-8, A-20 lock mpls tp tunnels 19-57 logical inventory branches 3-29 content pane 3-30 content pane tabs 3-31 icons 3-30, A-6 navigation pane 3-29 tabs 3-31 viewing in Prime Network Vision 3-27 window 3-28 logical link, definition 1-3 logical routers (Cisco IOS XR) 4-35 loopback, remote (L-OAM), enabling/disabling 16-25 LSEs inventory details 19-41 viewing 19-41 LSP LSP Lockout (commands) 19-56 LSP Lookup (command 19-56 LSP Ping and Trace (commands) 19-56 LSP endpoints 19-13 properties 19-13 LSPs lockout state 19-6 on Ethernet links 19-11 properties 19-13 Index IN-12 Cisco Prime Network 3.10 User Guide OL-28065-01 redundancy service properties 19-13 Working and Protected 19-5 M Maintenance, VNE investigation state 2-21 maintenance domain (CFM), configure 16-10 maintenance domains, in CFM 16-3 managed element, definition 1-3 management states badges A-18 icons A-18 overview 2-18 managing maps, roles required 5-2 managing report folders creating 11-46 deleting 11-48 moving 11-47 renaming 11-47 viewing properties 11-48 managing reports deleting 11-44 moving reports 11-44 renaming 11-42 roles required 11-1 saving 11-41 sharing 11-43 viewing report properties 11-45 reports 11-41 managing tickets 10-19 managing VPNs 19-21 adding to maps 19-22 creating 19-21 moving virtual routers between 19-23 overlays adding 19-24 displaying 19-25 hiding 19-25 removing from maps 19-23 maps adding VLANs 13-49 aggregations 5-16 applying background images 5-12 Cisco PathTracer files 12-26 closing 5-5 creating 5-6 customizing 2-39 filtering links 5-25 in Prime Network Vision 2-7 link icons A-9 network elements in 5-16 opening 2-6, 5-5 overlays callouts 19-25 VPN 19-24 overview 19-18, 19-19 red border and graphical links 2-10 removing VLANs 13-52 VPNs 19-23 roles required 5-2 saving 5-15 selecting views 5-12 using overview windows 5-14 viewing aggregation thumbnails 5-16 thumbnails 5-16 VPNs adding 19-22 overlays 19-24 viewing 19-18 working with 5-1 map view adding VLAN overlays 13-60 in Prime Network Vision 2-7 multi chassis devices 5-19 Mean Time to Repair report 11-14 Index IN-13 Cisco Prime Network 3.10 User Guide OL-28065-01 Media Addresses (SBC), configuring 22-15, 22-37 menus Cisco PathTracer 12-16 Cisco PathTracer details window 12-22 Prime Network Events 8-6 Prime Network Vision 2-24 Report Manager 11-6 MEP (CFM), configure 16-10 MEPs, in CFM 16-3 MIP (CFM), configure 16-10 MIPS, in CFM 16-3 mldp database 19-44 mldp neighbors 19-45 MLPPP viewing link properties 21-30 viewing properties 21-27 Mobile technologies 26-1 ACS 26-52 APN 26-12 commands 26-68 EGTP 26-31 GGSN 26-5 GTPP 26-24 GTPU 26-10 PDN-GW 26-36 SAE-GW 26-34 S-GW 26-38 mobile technologies user roles 26-1 Mobile Transport over Packet. See MToP modifying VNE properties 3-16 Modules Summary By Type 11-20 monitoring Carrier Ethernet services 13-1 Carrier Grade NAT properties 14-1 network clocking service 21-35 PTP service 21-37 Most Common Daily Events report 11-14 Most Common Syslogs report 11-14 moving report folders 11-47 reports between folders 11-44 MP-BGP properties in logical inventory 19-47 MPLS ARP table 19-35 BGPs, viewing 19-47 Cisco PathTracer and 12-29 LSEs, viewing 19-41 monitoring services 19-26 NDP table 19-36 pseudowire end-to-end emulation tunnels, viewing 19-53 rate limit information 19-38 roles required for viewing properties 19-1 routing entities 19-32 TE tunnels, viewing 19-55 MPLS pseudowire over GRE, properties 21-33 MPLS TE tunnel, inventory details 19-55 MPLS-TP BFD commands 19-56 MPLS-TP tunnel label commands 19-56 MPLS-TP tunnel endpoint, launching a path trace 12-13 MPLS-TP tunnels adding to maps 19-5 applying overlays 19-16 BFD sessions, viewing properties 19-52 commands supported 19-56 discovery 19-5 global configuration (commands) Global Configuration Commands (MPLS-TP) 19-56 links, adding and removing 19-56 LSP commands 19-56 LSP lockout state 19-6 LSP Ping and Trace (commands) 19-56 overview 19-4 properties 19-7 Index IN-14 Cisco Prime Network 3.10 User Guide OL-28065-01 Tunnel Ping and Trace (commands) 19-56 working with 19-4 mpls tp tunnels 19-57 MToP channelized lines 21-18 IMA group properties 21-13 monitoring network clocking service 21-35 PTP service 21-37 network clocking service 21-35 PTP service overview 21-37 roles required for working with 21-1 TDM overview 21-17 viewing properties in physical inventory 21-18 viewing ATM cross-connects 21-6 ATM VCI properties 21-10 ATM VPI properties 21-10 CEM groups 21-51, 21-52, 21-53 CEM interfaces 21-51 CEM properties 21-50 CESoPSN pseudowire properties 21-3 encapsulation information 21-11 IMA group properties 21-13 MLPPP link properties 21-30 MLPPP properties 21-27 network clocking service 21-35 pseudowire clock recovery properties 21-42 PTP service properties 21-37 SAToP pseudowire properties 21-2 SONET/SDH channelization properties 21-19 SyncE properties 21-46 T3 DS1 and DS3 channelization properties 21-22 TDM properties 21-18 virtual CEMs, list of 21-51 virtual CEMs properties 21-50 multicast configuration 19-30 overview 20-1 supported network elements 20-1 user roles required 20-2 multicast label distribution protocol 19-44 multicast label switching 19-44, 20-9 multicast profile PIM profile 20-7 multicast protocol IGMP profile 20-5 address family ipv6 20-5 multicast protocols 20-4 address family ipv4 20-4 multicast routing entities 20-10 multi chassis device map view 5-19 Multichassis LACP (mLACP) show commands 13-28 viewing properties 13-28 multiple links badge 3-8, A-20 multiplex services, discovery of 13-103 N navigation pane logical inventory 3-29 physical inventory 3-19 Prime Network Vision 2-6 NDP table 19-36 NEIM Cisco IOS XR devices and 4-35 committing image changes 4-39 deleting images from repository 4-41 distributing images to devices 4-27 global settings 4-53 importing images 4-24 permissions 4-56, 4-57 rolling back images on devices 4-40 setup tasks 4-6 upgrade analysis and 4-27 Index IN-15 Cisco Prime Network 3.10 User Guide OL-28065-01 viewing repository 4-56, 4-57 Network Activation Activation Framework 3-34 network clocking service applying an overlay 21-49 clock service properties 21-36 monitoring 21-35 monitoring PTP service 21-37 overview 21-35 PTP interface properties 21-38 PTP service 21-37 network elements adding to existing aggregations 5-18 aggregating 5-16 aggregations 5-16 CPU usage, checking 5-27 definition 1-4 icons 2-7, 2-9, A-2 information displayed in icons 3-3 in maps 5-16 management state 2-18 pinging 5-28 severity indicators and network elements 2-17 status indicators 2-16 Telnet to 5-28 viewing operating system information 3-31 properties 3-6 Network Elements inventory tab 2-4 Network Events tab inventory window 3-15 link properties window 6-12 network event tabs, in Prime Network Events 9-7 Network Pseudowire report detailed 11-22 options 11-37 summary 11-22 network service reports 11-21 generating from Prime Network Vision 11-39 Report Manager 11-35 Reports menu 11-38 report options 11-36 Run Report dialog box 11-35 Notes tab (tickets) 10-18, 10-19 O OAM See also Link OAM on demand probe configuration 17-7 opening maps 2-6 operating system information, viewing for devices 3-31 Operational, VNE investigation state 2-21 operator policy 26-41 options working with aggregation thumbnails 5-15, 5-18 OSPF supported versions 13-114 viewing properties 13-114 overlays applying to Ethernet services 13-104 maps 5-22 MPLS-TP tunnels 19-16 network clocks 21-49 pseudowire 13-101 VLANs 13-60 VPLS instances 13-79 VPNs 19-24 displaying and hiding for VLANs 13-61 for VPNs 19-25 in maps 5-25 Ethernet service 13-104 pseudowire 13-89, 13-101 removing 13-61 Index IN-16 Cisco Prime Network 3.10 User Guide OL-28065-01 viewing 5-25 pseudowire tunnel links in VPLS 13-81 REP information 13-62 STP information 13-65 VLAN adding 13-60 removing 13-61 viewing STP link information 13-65 working with 13-44 VPLS callouts 13-81 instance 13-79 viewing pseudowire tunnel links 13-81 VPN 19-24 adding 19-24 callouts 19-25 working with 5-21 overview ATM cross-connects 21-6 CFM 16-3 Cisco PathTracer 12-1 EFP cross-connects 13-74 EFPs 13-46 Ethernet LMI 16-16 Ethernet OAM 16-2 Link OAM 16-20 MPLS-TP tunnels 19-4 network clocking service 21-35 Prime Network Events 1-2 Prime Network Vision inventory window 3-9 Prime Network Vision maps 2-5 PTP service 21-37 reports 11-1 SAToP 21-2 SBC 22-1 switching entities 13-45 TDM 21-17 unassociated bridges 13-72 VLANs 13-45 overview window 5-14 P package management, defined 4-35 Partially Discovered, VNE investigation state 2-21 password, changing 2-3 path pane, in Cisco PathTracer 12-18 path trace and blocked ports 12-4 examples 12-7 launching from EFP 12-8 Ethernet port 12-12 IP interface 12-9 MPLS-TP tunnel endpoint 12-13 pseudowire endpoint 12-12 VLAN bridge 12-10 starting 12-5 from inventory 12-7 from map view 12-5 viewing in Cisco PathTracer 12-14 Layer 2 Tunnel Protocol path information 12-28 path trace details 12-20 QinQ path information 12-27 path trace details window 12-20 path trace pane, Cisco PathTracer 12-18, 12-23 PDN-GW overview 26-36 performance management, SBC 22-39 P-GW view properties 26-36 physical inventory branches 3-19 buttons Disable Sending Alarms 3-21, 21-6 Open Port Utilization Graph 3-21, 21-6 Show Encapsulation 3-21, 21-6 Index IN-17 Cisco Prime Network 3.10 User Guide OL-28065-01 content pane 3-20 icons 3-19, A-9 navigation pane 3-19 viewing device properties 3-19 viewing in Prime Network Vision 3-19 window 3-14 physical link, definition 1-4 PIM profile 20-7 pinging devices 5-28 network elements 5-28 pseudowires 13-95 ping pseudowire (command) 13-116 policy container 25-12 polling, initiating 3-18 Poll Now button 3-18 Pool Utilization (CG NAT command) 14-5 ports alarms disabling 3-26 viewing configuration 3-25 status 3-23 with IPv4 and IPv6 addresses 18-5 Ports tab, in inventory window 3-13, 3-23 Port Utilization graph, generating 3-27 ppp template 25-9, 25-11 Prime Central launching Prime Network Events 8-2 launching Prime Network Vision 2-2 Prime Network 3.6.x tabs, in Prime Network Events 9-12 Prime Network Command Builder launching scripts 2-37, 5-1 Prime Network Events All tab 9-3 Audit tab 9-3 buttons Ticket Properties dialog box A-17 toolbar A-16 customizing 8-8 displaying all events 8-4 event categories 8-4 exporting data 9-25 icon severities A-12 launching from Prime Central 8-2 in Find mode 8-3 options 8-2 menus 8-6 network event tabs 9-7 overview 1-2 Prime Network 3.6.x tabs 9-12 Provisioning tab 9-5 right-click options 8-7 roles required 8-1, 9-1 Security tab 9-6 Service tab 9-7 Syslog tab 9-8 system event tabs 9-3 System tab 9-6 Ticket tab 9-8 toolbar 8-5 toolbar buttons A-16 V1 Trap tab 9-10 V2 Trap tab 9-10 V3 Trap tab 9-11 viewing all events 8-4 events and tickets 9-2 window 8-2 working with 9-14 Prime Network Vision buttons A-12 filtering links A-16 table toolbar A-15 toolbar A-13 creating maps 5-6 customizing 2-39 Index IN-18 Cisco Prime Network 3.10 User Guide OL-28065-01 generating reports 11-39 GUI overview 19-18, 19-19 icons 19-20, A-1 links A-9 logical inventory A-6 map A-2, A-4 physical inventory A-9 sizes 2-8 interface components 2-3 inventory tabs 2-4 launching as a standalone application 2-2, 8-2 from Prime Central 2-2 options 2-2 links characteristics A-11 colors A-10 icons A-9 list view toolbar A-15 maps 2-7, 2-39 closing 5-5 creating 5-6 opening 5-5 overview 2-5 saving 5-15 viewing options 5-12 menus 2-24 Activation 2-28 Edit 2-26 File 2-25 Help 2-29 Network Inventory 2-28 Node 2-27 Reports 2-29 right-click 2-29 Tools 2-27 View 2-26 Window 2-29 navigation 2-3 opening the inventory window 3-9 overlays 19-25 port information 3-25 properties window 3-6 right-click menus 2-29 roles required 2-1, 3-1 tables managing 2-40 toolbar buttons A-13 viewing tickets 10-3 VLAN elements and icons 13-45 windows 2-3 working with H-VPLS 13-77 tickets 10-1 VPLS 13-77 Prime Network Vision window content pane 2-7 inventory tabs 2-4 links view 2-14 list view overview 2-11 toolbar 2-41 map view 2-7 icons 2-8 right-click options 2-11 severity indicators 2-11 navigation pane 2-6 right-click menus aggregation 2-34 device 2-31 link 2-35 links view 2-37 list view 2-35 maps 2-30 ticket 2-38 ticket pane 2-16 toolbar 2-22 Index IN-19 Cisco Prime Network 3.10 User Guide OL-28065-01 layout tools 2-24 map options 2-22 map zoom tools 2-24 navigation tools 2-23 overlay tools 2-23 viewing options 2-22 probe endpoint association 17-5 properties 6rd tunnels 19-48 CEM interface 21-52 clock service 21-36 ICCP 13-28 mLACP 13-28 MPLS pseudowire over GRE 21-33 MPLS-TP tunnels 19-7 MToP ATM VCI 21-10 ATM VPI 21-10 pseudowire clock recovery 21-45 PTP interface 21-38 REP 13-14 report folders 11-48 report types 11-50 SBC 22-4 AAA 22-7 DBE 22-5 H.248 22-5, 22-7 media address 22-5 policy 22-8 SBE 22-6 SIP 22-12 virtual connections 21-5 properties window in Prime Network Vision 3-6 provider, definition 1-4 Provider Backbone Bridge (PBB), viewing properties 13-31 Provisioning Events tab, in the inventory window 3-15 Provisioning tab events 9-17 in Prime Network Events 9-5 proxy server importing images from Cisco.com 4-7 pseudowire clock recovery properties 21-45 viewing properties 21-42 pseudowire endpoint, launching a path trace 12-12 pseudowires adding 13-89 applying overlay 13-101 commands 13-116 overlays 13-89 pinging 13-95, 13-116 redundancy service properties 13-99 viewing endpoint properties 13-86 properties 13-92 redundancy service properties 13-99 tunnel links in VPLS overlays 13-81 VCCV and CC information 13-97 working with 13-89 PTP interface properties 21-38 monitoring service 21-37 service overview 21-37 PWE3 inventory details 19-53 viewing 19-53 Q QCI-QoS mapping 26-40 QoS profile 25-15 QoS Profiles (SBC), configuring 22-15, 22-38 quality of service profile 25-15 quick view, for links 6-7 Index IN-20 Cisco Prime Network 3.10 User Guide OL-28065-01 R radius global configuration 23-4 rate limits, for routing entities 19-38 reconciliation badge A-20 aggregations 2-35 business elements 7-7 description 3-9 EFPs 13-49 switching entities 13-49 VPLS forwards 13-77 red border in maps, and graphical links 2-10 reduced polling 3-18 reduction count, definition 10-6 redundancy service 19-13 badge 3-9, A-21 on LSP endpoints 19-13 pseudowires 13-99 related documentation xxv removing tickets 10-20 VLAN overlays 13-61 VLANs from maps 13-52 VPNs 19-23 renaming Ethernet flow domains 13-41 report folders 11-47 reports 11-42 REP icons and badges 13-62 viewing for VLAN service link properties 13-63 in VLAN domain views 13-62 in VLAN overlays 13-62 report categories 11-11 report folders creating 11-46 deleting 11-48 moving 11-47 renaming 11-47 viewing properties 11-48 working with 11-46 Report Manager content pane 11-7 events reports 11-11 generating reports 11-24 inventory reports 11-19 menu options 11-6 navigation tree 11-7 network service reports 11-21 report categories 11-11 right-click options 11-9 roles required 11-1 toolbar buttons 11-6, A-17 using 11-4 report properties, viewing 11-45 reports and database load 11-24 canceled 11-24 creating folders 11-46 defining types 11-46 deleting folders 11-48 reports 11-44 events Daily Average and Peak 11-12 Devices with the Most Events by severity 11-12 Devices with the Most Events by type 11-12 Devices with the Most Syslogs 11-13 Devices with the Most Traps 11-13 Event Reduction Statistics 11-13 Fault Database vs. Event Archive Statistics 11-13 Mean Time to Repair 11-14 Most Common Daily Events 11-14 Most Common Syslogs 11-14 Syslog Count by device 11-14 Syslog Count by type 11-14 Syslog Trend by severity 11-14 Index IN-21 Cisco Prime Network 3.10 User Guide OL-28065-01 fail to generate 11-24 formats 11-41 generating 11-23 events reports 11-24 inventory reports 11-32 network service reports 11-35 generating from Prime Network Vision 11-39 Report Manager 11-24 Reports menu 11-38 inventory Hardware Summary By Selected Property 11-19 Hardware Summary Detailed 11-19 IOS-XR Software Package Summary 11-20 Modules Summary By Type 11-20 Software Version Summary by device 11-20 Software Version Summary by version 11-20 limiting access to 11-44 managing maximum concurrent reports 11-40 options 11-40 maximum number of concurrent reports 11-40 moving folders 11-47 reports between folders 11-44 network events Detailed Event Count (by device) 11-15 Detailed Service Events 11-15 Detailed Syslogs 11-16 Detailed Tickets 11-16 Detailed Traps 11-16 network service Ethernet Service Detailed 11-21 Ethernet Service Summary 11-21 Network Pseudowire Detailed 11-22 Network Pseudowire Summary 11-22 VPLS Detailed 11-23 VPLS Summary 11-23 non-network events Detailed Audit Events 11-17 Detailed Provisioning Events 11-17 Detailed Security Events 11-18 Detailed System Events 11-18 options for detailed network events reports 11-28 detailed non-network events reports 11-31 events reports 11-26 inventory reports 11-33 network service reports 11-36 overview 11-1 queued 11-40 renaming folders 11-47 reports 11-42 Report Properties dialog box 11-45 roles required 11-1 saving 11-41 scheduling 11-39 sharing 11-43 using Report Manager 11-4 viewing 11-41 report folder properties 11-48 report properties 11-45 report type properties 11-50 working with folders 11-46 Reports menu, and generating reports 11-38 report types, viewing properties 11-50 REP primary badge 3-9, A-21 REP primary blocking badge 3-9, A-21 Resilient Ethernet Protocol (REP), viewing properties 13-14 restore mode (CM) 4-6 merge 4-50 overwrite 4-50 restoring files from archive to devices (CM) 4-20, 4-56, 4-57 right-click options aggregations 2-34 Index IN-22 Cisco Prime Network 3.10 User Guide OL-28065-01 Cisco PathTracer 12-4, 12-19 devices 2-31 links 2-35 links view 2-37 list view 2-13, 2-35 maps 2-30 Prime Network Events 8-7 Prime Network Vision 2-11, 2-29 Report Manager 11-9 tickets 2-38 roles managing reports 11-1 viewing Carrier Ethernet properties 13-2 Carrier Grade NAT properties 14-2 DWDM properties 15-1 Ethernet OAM tool properties 16-1 IPv6 information 18-2 SBC properties 22-2 working with business tags 7-1 Cisco PathTracer 12-1 links 6-1 maps 5-2 MPLS networks 19-1 MToP 21-1 Prime Network Events 8-1, 9-1 Prime Network Vision 2-1, 3-1 reports 11-1 tickets 10-1 rolling back images on devices (NEIM) 4-35, 4-40, 4-56, 4-57 routers, logical (Cisco IOS XR) 4-35 routing entities 19-32 ARP table 19-35 NDP table 19-36 rate limit information 19-38 viewing properties 19-32 RTPM commands 15-15 S SAE-GW overview 26-34 SAToP, overview 21-2 saving maps 5-15 reports 11-41 SBC AAA properties 22-7 blacklists, configuring 22-26 CAC policies, configuring 22-28 Call Policies, configuring 22-32 Codec Lists, configuring 22-36 commands 22-14, 22-39 configuration commands 22-15 DBE properties 22-5 H.248 properties 22-5, 22-7 logical inventory properties 22-1 Media Addresses, configuring 22-37 media address properties 22-5 overview 22-1 performance management commands 22-39 policy properties 22-8 properties 22-4, 22-39 QoS Profiles, configuring 22-38 SBE properties 22-6 SIP properties 22-12 SIPs, configuring 22-15, 22-20 user roles required for viewing properties 22-2 viewing in logical inventory 22-3, 22-5 schedule configuration audit 4-44 scheduled jobs monitoring 11-40 scripts launching 2-37 launching for activation and configuration 5-1 Security tab events 9-17 Index IN-23 Cisco Prime Network 3.10 User Guide OL-28065-01 in Prime Network Events 9-6 service policy 25-12 Service tab, in Prime Network Events 9-7 service template 25-9 service view overlays 19-25 removing VLANs 13-52 removing VPNs 19-23 virtual routers 19-23 VPNs 19-21, 19-26 Session Border Controller. See SBC setup tasks Cisco Prime Network 4-3 CM 4-5 global settings 4-47 NEIM 4-6 severity color of device icon 2-18 icons A-12 indicators in Prime Network Vision map view 2-11 overview 2-17 propagation 2-17 S-GW overview 26-38 view properties 26-38 shared switching entities 13-39 sharing reports 11-43 Show Channel (mLACP command) 13-28 Show Group (mLACP command) 13-28 showing IP SLA 17-14 showing SLA operations 17-13 showing SLA profiles 17-13 Show LACP Internal (mLACP command) 13-28 Show MPLS LDP (mLACP command) 13-28 Shutting Down, VNE investigation state 2-21 SIPs (SBC), configuring 22-15, 22-20, 22-24 sites, viewing properties 19-27 SLA operation details 17-13 SLA profiles 17-13 SNMP CFM server traps, enable 16-10 Software Version Summary report by device 11-20 by version 11-20 SONET BER thresholds, setting 21-54 commands 21-54 controller data 21-54 counters 21-54 SONET/SDH, viewing properties 21-19 Spanning Tree Protocol. See STP static link, adding 6-15 status indicators, for network elements 2-16 Stopped, VNE investigation state 2-21 STP viewing link information in VLAN overlay 13-65 properties 13-10 VLAN service link properties 13-66 viewing in VLAN domain views 13-65 VLAN overlays 13-65 STP root badge 3-9, A-21 Structure-Agnostic TDM over Packet. See SAToP subscriber, definition 1-4 subscriber access points 25-5 diagnose 25-6 switching entities containing termination points 13-49 overview 13-45 synchronizing files (CM) 4-16, 4-56, 4-57 Synchronous Ethernet (SyncE), viewing properties 21-46 Syslog Count report by device 11-14 by type 11-14 Syslog tab, in Prime Network Events 9-8 Syslog Trend report by severity 11-14 Index IN-24 Cisco Prime Network 3.10 User Guide OL-28065-01 system event tabs, in Prime Network Events 9-3 System tab, in Prime Network Events 9-6 T T3 DS1 and DS3, viewing properties 21-22 tables managing in Prime Network Vision 2-40 toolbar buttons A-15 tabs in Cisco PathTracer window 12-18 tag manipulations, for associated VLANs 13-54 TDM overview 21-17 viewing properties in physical inventory 21-18 Telnet to devices 5-28 termination points, in switching entities 13-49 TE tunnels and Cisco PathTracer 12-33 thumbnail views, options 5-15, 5-18 ticket and events pane, Prime Network Vision inventory window 3-15 ticket pane information displayed 10-5 Prime Network Vision 2-16 ticket properties, Details tab 9-19 Ticket Properties dialog box Advanced tab 10-18 Affected Parties tab 10-14 Correlation tab 10-17 Details tab 10-12 History tab 10-13 Notes tab 10-18, 10-19 toolbar 10-12 tickets acknowledged 10-7 acknowledging 10-19 and EFP severities 13-37 badges A-21 clearing 10-7, 10-20 clearing and removing 10-21 definition 1-4 filtering by criteria 10-8 finding affected elements using the ticket pane 10-19 generated 10-7 icons 2-22 managing 10-19 propagating new 2-17 properties 10-10 removing 10-20 removing filters 9-24 right-click menu 2-38 roles required 10-1 status 10-6 viewing in Prime Network Events 9-2 in Prime Network Vision 10-3 properties 10-12 working with in Prime Network Vision 10-1 Tickets tab inventory window 3-15 link properties window 6-12 Prime Network Events 9-8 Time Division Multiplexing. See TDM or MToP TDM toolbar buttons Cisco PathTracer single-path window 12-17 for filtering links A-16 for tables A-15 Prime Network Vision list view A-15 Report Manager 11-6, A-17 Ticket Properties window 10-12 toolbars Cisco PathTracer 12-17 Cisco PathTracer details window 12-22 device view pane 3-14 Prime Network Events 8-5 Prime Network Vision 2-22 Index IN-25 Cisco Prime Network 3.10 User Guide OL-28065-01 Prime Network Vision list view 2-41 Report Manager 11-6 Ticket Properties window 10-12 tooltips for links 6-6 Tracking Disabled, VNE communication state 2-20 traps CFM SNMP, enable 16-10 Trap tab (events) 9-18 U unassociated bridges adding 13-72 overview 13-72 understanding EFP severity and ticket badges 13-37 static and dynamic links 6-3 unassociated bridges 13-72 VLAN and EFD discovery 13-44 ungrouping aggregations 5-19 UNI (E-LMI), configure 16-20 unlock mpls tp tunnels 19-58 unmanaged network, definition 1-5 Unsupported, VNE investigation state 2-20 updating affected severity 10-24 VNE information 3-18 upgrade analysis (NEIM) 4-27 Up ticket 10-8 User-defined device groups permissions 4-56, 4-57 user roles mobile technologies 26-1 viewing Carrier Grade NAT properties 14-2 DWDM properties 15-1 Ethernet OAM properties 16-1 MToP properties 21-1 SBC properties 22-2 working with business elements 7-1 business tags 7-1 Carrier Ethernet services 13-2 Cisco PathTracer 12-1 IPv6 and 6VPE 18-2 links 6-1 maps 5-2 MPLS networks 19-1 Prime Network Events 8-1, 9-1 Prime Network Vision 2-1, 3-1 reports 11-1 tickets 10-1 user roles for bng 25-2 V V1 Trap tab, in Prime Network Events 9-10 V2 Trap tab, in Prime Network Events 9-10 V3 Trap tab, in Prime Network Events 9-11 View HSRP properties 13-17 viewing 6rd tunnel properties 19-48 access gateway properties 13-19 additional APN characteristics 26-18 additional GTPP characteristics 26-26 APN properties 26-13 ATM cross-connects 21-6 ATM VCI properties 21-10 ATM VPI properties 21-10 BFD session properties 19-50 Carrier Ethernet properties, roles required 13-2 Carrier Grade NAT properties 14-2, 14-5 CDP properties 13-6 CEM groups 21-51, 21-52, 21-53 CEM interfaces 21-51 CEM properties 21-50 CESoPSN pseudowire properties 21-3 Index IN-26 Cisco Prime Network 3.10 User Guide OL-28065-01 CFM properties 16-3 cross-VRF routing entries 19-52 device operating system information 3-31 device properties 3-6 DWDM properties 15-3 EFP cross-connect properties 13-75 EFP properties 13-32 encapsulation information 21-11 Ethernet flow domains 13-41 Ethernet LAG properties 13-23 Ethernet LAGs 13-22 Ethernet Link Aggregation Groups 13-22 Ethernet services properties 13-106 EVC service properties 13-39 GGSN properties 26-6 GTPP properties 26-25, 26-31 GTPU properties 26-10 ICCP properties 13-28 IMA group properties 21-13 IP SLA responder service properties 13-109 IPv6 information 18-2 IS-IS properties 13-111 Layer 2 Tunnel Protocol path trace 12-28 Link Layer Discovery Protocol (LLDP) properties 13-8 Link Layer Discovery Protocol properties 13-8 Link OAM properties 16-20 link properties 6-10 links between VLAN elements and devices 13-57 LLDP properties 13-8 LSE properties 19-41 LSP endpoint properties 19-13 LSPs on Ethernet links 19-11 mLACP properties 13-28 MLPPP link properties 21-30 MLPPP properties 21-27 MPLS TE tunnel information 19-55 MPLS-TP BFD sessions 19-52 MPLS-TP tunnel properties 19-7 network element properties 3-6 operating system information for devices 3-31 OSPF properties 13-114 path trace details in Cisco PathTracer 12-20 path traces in Cisco PathTracer 12-14 PBB properties 13-31 P-GW properties 26-36 port configuration information 3-25 pseudowire clock recovery properties 21-42 endpoint properties 13-86 properties 13-92 redundancy service properties 13-99 VCCV and CC information 13-97 PWE3 tunnel information 19-53 QinQ path trace 12-27 REP information in VLAN domain views 13-62 VLAN overlays 13-62 report folder properties 11-48 report properties 11-45 reports 11-41 report type properties 11-50 REP properties for VLAN service links 13-63 in logical inventory 13-14 routing entities 19-32 SAToP pseudowire properties 21-2 SBC properties 22-3, 22-5 S-GW properties 26-38 SONET/SDH channelization properties 21-19 STP information in VLAN domain views 13-65 information in VLAN overlays 13-65 properties 13-10 properties for VLAN service links 13-66 SyncE properties 21-46 T3 DS1 and DS3 channelization properties 21-22 TDM properties 21-18 Index IN-27 Cisco Prime Network 3.10 User Guide OL-28065-01 ticket properties 9-18 tickets in Prime Network Vision 10-3 virtual CEMs list of 21-51 properties 21-50 virtual connection properties 21-5 Virtual Switching Instance properties 13-84 VLAN bridge properties 13-69 mapping properties 13-56 mappings 13-52 service link properties 13-62 trunk group properties 13-67 VNE properties 3-16 VPLS access Ethernet EFP properties 13-88 instance properties 13-83 properties 13-82 VPN properties 19-26 site properties 19-27 VRF properties 19-27 VRRP information 19-39 VSI properties 13-84 viewing address family ipv4 profile 20-4 viewing address family ipv6 profile 20-5 viewing IGMP profile 20-5 viewing mldp database details 19-44 viewing mldp neighbor details 19-45 viewing multicast details 20-2 viewing multicast protocols 20-4 viewing the PIM profile 20-7 viewing VRF multicast configuration 19-30 viewing y.1731 probes 17-2 virtual CEMs listing 21-51 viewing properties 21-50 Virtual Circuit Connectivity Verification (VCCV), viewing information for pseudowire endpoint 13-97 virtual cloud, definition 1-5 virtual connections viewing encapsulation information 21-11 viewing properties 21-5 virtual data center view configuration 27-9 virtualization 27-8 virtual machine view configuration 27-13 Virtual Router Redundancy Protocol (VRRP), viewing information 19-39 virtual routers moving 19-23 properties, viewing 19-27 VRF tables 19-31 Virtual Switching Instance. See VSI VLAN bridge, launching a path trace 12-10 VLAN overlays adding to maps 13-60 working with 13-44 VLANs adding associated VLANs 13-54 adding to map view 13-49 associations 13-54 definition 1-5 discovery 13-44 elements EFPs 13-46 icons in Prime Network Vision 13-45 network VLAN 13-45 overview 13-45 switching entities 13-45 overlays STP link information 13-65 viewing REP information 13-62 viewing STP information 13-65 overview 13-45 removing from maps 13-52 Index IN-28 Cisco Prime Network 3.10 User Guide OL-28065-01 overlays 13-61 tag manipulations for associations 13-54 viewing associated VLAN mapping properties 13-56 associated VLAN service links 13-56 bridge properties 13-69 links between elements and devices 13-57 mappings 13-52 REP properties 13-63 service link properties 13-62 STP properties 13-66 working with 13-44 VLAN trunk group, viewing properties 13-67 VNE/Agent Unreachable, VNE communication state 2-20 VNE communication states Agent Not Loaded 2-20 Connecting 2-20 Device Partially Reachable 2-20 Device Unreachable 2-20 Tracking Disabled 2-20 VNE/Agent Unreachable 2-20 VNE investigation states Currently Unsynchronized 2-21 Defined Not Started 2-20 Discovering 2-21 Maintenance 2-21 Operational 2-21 Partially Discovered 2-21 Shutting Down 2-21 Stopped 2-21 Unsupported 2-20 VNEs communication state badges A-18 investigation state badges A-19 management state 2-18 modifying properties 3-16 updating information 3-18 viewing communication status 3-17 viewing properties 3-16 vPC 27-1 commands 27-4, 27-8 fabricpathconfiguration 27-6 view configuration 27-3 VPLS adding instances to maps 13-78 instance overlays 13-79 overlays link callout 13-81 viewing pseudowire tunnel links 13-81 viewing access Ethernet EFP properties 13-88 instance properties 13-83 properties 13-82 pseudowire endpoint properties 13-86 working with 13-77 VPLS report detailed 11-23 options 11-37 summary 11-23 VPNs adding to maps 19-22 and virtual routers 19-23 creating 19-21 definition 1-5 managing 19-21 moving virtual routers between 19-23 overlays 19-24 callouts 19-25 creating 19-24 displaying 19-25 hiding 19-25 properties, viewing 19-26 removing from maps 19-23 sites 19-27 viewing in maps 19-18 virtual routers 19-27 VRF multicast configuration 19-30 VRFs Index IN-29 Cisco Prime Network 3.10 User Guide OL-28065-01 cross-VRF routing entries 19-52 tables egress 19-31 ingress 19-31 viewing properties 19-27 with IPv4 and IPv6 addresses 18-6 VSI, viewing properties 13-84 VTP Domains inventory tab 2-4 W Working and Protected LSPs 19-5 working with associated VLANs 13-54 business elements 7-1 business tags 7-1 EFP cross-connects 13-74 Ethernet services 13-102 H-VPLS 13-77 links, user roles required 6-1 MPLS-TP tunnels 19-4 overlays 5-21 Prime Network Events 9-14 pseudowire overlays 13-89 pseudowires 13-89 tickets in Prime Network Vision 10-1 VLAN overlays 13-44 VLANs 13-44 VPLS 13-77 Y y.1731 performance management mechanisms 17-1 y.1731 probes 17-1, 17-2, 17-4 diagnose commands 17-13 user roles required 17-2 y.1731 technology overview 17-1 Index IN-30 Cisco Prime Network 3.10 User Guide OL-28065-01 Mode de introduction manuel de profil de configuration d'IPSec sur RV160 et RV260 Objectif L'objectif de ce document est de t'afficher comment configurer le profil IPSec pour le mode de introduction manuel sur des Routeurs de gammes RV160 et RV260. Introduction IPsec s'assure que vous avez la communication privée sécurisée au-dessus de l'Internet. Il donne deux ou plus héberge l'intimité, l'intégrité, et l'authenticité pour les informations confidentielles de transmission au-dessus de l'Internet. IPsec est utilisé généralement dans un réseau privé virtuel (VPN), mis en application à la couche IP, et peut aider beaucoup d'applications qui manquent de la Sécurité. Un VPN est utilisé pour fournir un mécanisme de communication protégée pour les données sensibles et les informations IP qui sont transmises par un réseau unsecure tel que l'Internet. Il fournit une solution flexible pour que des utilisateurs distants et l'organisation protège n'importe quelles informations confidentielles contre d'autres interlocuteurs sur le même réseau. Le mode de introduction manuel réduit la flexibilité et les options d'IPsec. Il exige de l'utilisateur de fournir le matériel de base et les informations nécessaires d'association de sécurité à chaque périphérique qui est configuré. L'introduction de manuel ne mesure pas bien car il est habituellement meilleur utilisé dans un petit environnement. Il est seulement recommandé d'utiliser cette méthode si l'implémentation de l'échange de clés Internet (IKE) (IKE)v1 ou IKEv2 sur ce routeur n'est pas identique que votre routeur distant ou si un des Routeurs ne prend en charge pas l'IKE. Dans des ces cas, vous pourriez manuellement entrer les clés. Il est recommandé pour configurer le mode de introduction automatique pour le profil IPSec au lieu du mode de introduction manuel si votre routeur prend en charge IKEv1 ou IKEv2 et suit les mêmes normes. En utilisant le manuel introduisant le mode, assurez-vous que votre clé dedans sur votre routeur local est la clé sur le routeur distant et la clé dedans sur votre routeur distant est la clé sur votre routeur local. Un exemple de la configuration pour les deux Routeurs serait : Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) Première publication: 1 Janvier 02012 Dernière modification: 18 Juin 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 LES SPÉCIFICATIONS ET INFORMATIONS RELATIVES AUX PRODUITS PRÉSENTÉS DANS CE MANUEL SONT SUSCEPTIBLES DE MODIFICATIONS SANS PRÉAVIS. TOUTES LES DÉCLARATIONS, INFORMATIONS ET RECOMMANDATIONS FOURNIES DANS CE MANUEL SONT EXACTES À NOTRE CONNAISSANCE, MAIS SONT PRÉSENTÉES SANS GARANTIE D'AUCUNE SORTE, EXPRESSE OU IMPLICITE. LES UTILISATEURS ASSUMENT L'ENTIÈRE RESPONSABILITÉ DE L'APPLICATION DE TOUT PRODUIT. LA LICENCE DE LOGICIEL ET LA GARANTIE LIMITÉE DU PRODUIT CI-JOINT SONT DÉFINIES DANS LES INFORMATIONS FOURNIES AVEC LE PRODUIT ET SONT INTÉGRÉES AUX PRÉSENTES SOUS CETTE RÉFÉRENCE. SI VOUS NE TROUVEZ PAS LA LICENCE DE LOGICIEL OU LA GARANTIE LIMITÉE, CONTACTEZ VOTRE REPRÉSENTANT CISCO POUR EN OBTENIR UNE COPIE. Les informations ci-dessous concernent la conformité FCC des dispositifs de classe A : Cet équipement a été testé et respecte les limites relatives aux dispositifs numériques de classe A conformément au chapitre 15 des règles FCC. Ces limites sont destinées à fournir une protection raisonnable contre les interférences nuisibles causées lorsque l'équipement est utilisé dans un environnement commercial. Cet équipement génère, utilise et peut émettre des fréquences radio et, s'il n'est pas installé et utilisé conformément au manuel de l'utilisateur, peut causer des interférences susceptibles de perturber les communications radio. L'utilisation de cet équipement dans un environnement résidentiel est susceptible de causer des interférences nuisibles, auquel cas les utilisateurs sont priés de corriger ces interférences à leurs frais. Les informations ci-dessous concernent la conformité FCC des dispositifs de classe B : Cet équipement a été testé et respecte les limites relatives aux dispositifs numériques de classe B conformément au chapitre 15 des règles FCC. Ces limites sont destinées à fournir une protection raisonnable contre les interférences nuisibles causées lorsque l'équipement est utilisé dans un environnement résidentiel. Cet équipement génère, utilise et peut émettre desfréquencesradio et,s'il n'est pasinstallé et utilisé conformément aux instructions, peut causer desinterférences susceptibles de perturber les communicationsradio. Nous ne pouvonstoutefois pas vous garantir qu'aucune installation ne causera desinterférences. Si l'équipement provoque desinterférences au niveau de la réception de la radio ou de la télévision, ce qui peut être constaté en l'allumant et en l'éteignant, l'utilisateur est invité à essayer de remédier à ces interférences en appliquant une ou plusieurs des mesures ci-dessous : • Réorientez ou déplacez l'antenne de réception. • Augmentez la distance entre l'équipement et le récepteur. • Connectez l'équipement à une prise sur un autre circuit que celui sur lequel le récepteur est connecté. • Rapprochez-vous d'un revendeur ou d'un technicien radio/TV expérimenté pour obtenir de l'aide. Toute modification apportée à ce produit sans l'autorisation de Cisco peut invalider l'approbation FCC ainsi que votre droit à utiliser le produit. L'implémentation par Cisco de la compression d'en-tête TCP est une adaptation d'un programme développé par l'Université de Californie, Berkeley (UCB) dans le cadre de la version du domaine public de l'UCB du système d'exploitation UNIX. Tous droits réservés. Copyright © 1981, Regents of the University of California. PAR DÉROGATION À TOUTE AUTRE GARANTIE DÉFINIE ICI, TOUS LES FICHIERS DE DOCUMENTATION ET LOGICIELS DE CES FOURNISSEURS SONT FOURNIS "EN L'ÉTAT" AVEC TOUS LEURS DÉFAUTS. CISCO ET LES FOURNISSEURS SUSMENTIONNÉS DÉCLINENT TOUTE GARANTIE EXPLICITE OU IMPLICITE, NOTAMMENT CELLES DE QUALITÉ MARCHANDE, D'APTITUDE À UN BUT PARTICULIER ET DE NON-CONTREFAÇON, AINSI QUE TOUTE GARANTIE EXPLICITE OU IMPLICITE LIÉE A DES NÉGOCIATIONS, À UN USAGE OU À UNE PRATIQUE marques Cisco. EN AUCUN CAS CISCO OU SES FOURNISSEURS NE SAURAIENT ÊTRE TENUS POUR RESPONSABLES DE DOMMAGES INDIRECTS, SPÉCIAUX, CONSÉQUENTS OU ACCIDENTELS, Y COMPRIS ET SANS LIMITATION, LA PERTE DE PROFITS OU LA PERTE OU LES DOMMAGES DE DONNÉES CONSÉCUTIVES À L'UTILISATION OU À L'IMPOSSIBILITÉ D'UTILISER CE MANUEL, MÊME SI CISCO OU SES FOURNISSEURS ONT ÉTÉ AVERTIS DE LA POSSIBILITÉ DE TELS DOMMAGES. Cisco et le logo Cisco sont des marques ou des marques déposées de Cisco et/ou de ses filiales aux États-Unis et dans d'autres pays. Pour afficher la liste des marques Cisco, rendez-vous à l'adresse :http://www.cisco.com/go/trademarkshttp://www.cisco.com/go/trademarks. Les autres marques mentionnées sont la propriété de leurs détenteurs respectifs. L'utilisation du mot "partenaire" n'implique aucune relation de partenariat entre Cisco et toute autre entreprise. (1110R) Les adresses IP (Internet Protocol) utilisées dans ce document sont fictives. Tous les exemples, sorties d'affichage de commandes et chiffres présents dans ce document ne sont donnés qu'à titre indicatif. Toute utilisation d'une adresse IP réelle dans un contenu illustratif serait involontaire et pure coïncidence. © 2012 Cisco Systems, Inc. All rights reserved. TABLE DES MATIÈRES Préface xi Introduction xi Informations complémentaires xii Didacticiels d'apprentissage électronique du téléphone IP Cisco Unified 7900 Series xii Consignes de sécurité et informations relatives aux performances xiii Coupure de courant xiii Périphériques externes xiii Sécurité des produits Cisco xiv Fonctions d'accessibilité xiv Fonctions de votre téléphone IP Cisco Unified 1 Boutons et matériel 1 Définitions de ligne et d'appel 5 Icônes de ligne et d'appel 6 Fonctions de l'écran du téléphone 7 Navigation dans le menu d'application 8 Système d'aide du téléphone 9 Disponibilité des fonctions 9 Protocoles de signalisation SIP et SCCP 10 Économies d'énergie 11 Installation du téléphone 13 Connexions du téléphone IP Cisco Unified 7931G 13 Verrouillage de câble du téléphone 14 Réglage du support du combiné 15 Enregistrement TAPS 15 Prise en charge de casques 16 Qualité audio 16 Informations sur le casque sans fil 16 Fonctions d'appel 17 Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) iii Options d'appels de base 17 Passage d'un appel 18 Passage d'un appel à l'aide du haut-parleur 18 Passage d'un appel à l'aide du casque 19 Rappel d'un numéro 19 Composition d'un numéro à partir d'un journal des appels 19 Options des appels supplémentaires 19 Passage d'un appel lorsqu'un autre est actif (sur une ligne différente) 20 Passage d'un appel à l'aide de la numérotation simplifiée 20 Composition d'un numéro depuis le répertoire d'entreprise sur le téléphone 20 Avertissement lorsque le poste occupé ou qui sonne est disponible (rappel) 21 Passage d'un appel prioritaire (qui a la préséance) 21 Composition d'un numéro à partir d'une entrée du carnet d'adresses personnel 21 Passage d'un appel à l'aide d'un code de facturation ou de suivi 22 Utiliser la fonction d'accès vocal mobile pour passer un appel depuis un téléphone portable 22 Passage d'un appel à l'aide de la numérotation simplifiée 22 Passage d'un appel à l'aide du carnet d'adresses personnel 22 Réponse à un appel 23 Déconnexion de l'appel 24 Mise en attente et reprise des appels 25 Mettre un appel en attente 26 Reprendre un appel mis en attente sur la ligne active 26 Plusieurs appels 26 Mouvement des appels en cours 26 Transférer un appel en cours d'un téléphone portable vers un téléphone de bureau qui partage la même ligne (transfert de session) 27 Transférer un appel en cours d'un téléphone portable vers un téléphone de bureau 27 Transférer un appel en cours d'un téléphone portable vers des périphériques Cisco Unified qui partagent la même ligne (transfert de session) 27 Coupure micro 28 Désactiver ou rétablir le son de l'appel 28 Transfert des appels 28 Transfert d'un appel sans parler au destinataire du transfert 29 Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) iv Table des matières Comment informer le destinataire du transfert avant de lui transférer un appel (transfert par consultation) 29 Transfert de l'appel vers le système de messagerie vocale 29 Transférer un appel actif, qui sonne ou en attente vers un système de messagerie vocale 30 Renvoi d'appels 30 Configurer et annuler le renvoi de tous les appels à partir du téléphone 31 Configuration ou annulation du renvoi d'appels 32 Ne pas déranger 32 Activation et désactivation de la fonction NPD 32 Configuration des paramètres NPD 33 Conférences 33 Conférence ad hoc 33 Création d'une conférence en appelant chacun des participants 34 Ajout de participants à la conférence 34 Comment se joindre à la conférence 35 Joindre des appels existants sur une même ligne téléphonique 35 Comment joindre des appels existants sur plusieurs lignes téléphoniques 35 Conférence Meet-Me 36 Démarrage d'une conférence Meet-Me 36 Comment se joindre à une conférence Meet-Me 36 Liste des participants à la conférence 37 Contrôle de la conférence à l'aide de la liste des participants 37 Vérification de la sécurité de la conférence 38 Appels intercom 38 Passage d'un appel intercom vers le numéro intercom préconfiguré 39 Passage d'un appel intercom vers un numéro intercom 39 Réception d'un appel intercom 39 Gestion avancée des appels 39 Numérotation simplifiée 40 Passage d'un appel à l'aide des boutons de numérotation simplifiée 40 Passage d'un appel à l'aide de la numérotation simplifiée avec le combiné raccroché 40 Passage d'un appel avec la numérotation simplifiée avec le combiné décroché 41 Établir une conférence avec la numérotation simplifiée avec le combiné décroché 41 Transférer un appel avec la numérotation simplifiée avec le combiné décroché 41 Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) v Table des matières Passage d'un appel avec la numérotation simplifiée avec le combiné décroché dans un appel en attente 42 Passage d'un appel à l'aide de la numérotation simplifiée 42 Interception d'appels 42 Réponse à un appel entrant qui sonne sur un autre poste de votre groupe d'interception d'appels 43 Réponse à un appel qui sonne sur un autre poste en dehors de votre groupe de prise d'appel 43 Réponse à un appel qui sonne sur un autre poste dans le groupe ou dans le groupe associé 43 Réponse à un appel qui sonne sur un poste donné (numéro de ligne) 44 Parcage d'appels 44 Stocker et récupérer l'appel actif à l'aide du Parcage d'appels 45 Diriger et stocker un appel actif vers un numéro de parcage d'appels dirigé 45 Récupérer un appel parqué depuis un numéro de parcage d'appels dirigé 45 Envoi, stockage et récupération un appel actif vers un numéro de parcage d'appels dirigé 46 Groupes de recherche 46 Connexion et déconnexion des groupes de recherche 46 Lignes partagées 46 Icône Utilisé à distance 47 Informations sur les appels et l'insertion 47 Confidentialité 47 Informations ligne partagée 47 Empêcher ou autoriser les autres personnes à afficher ou vos appels sur une ligne partagée ou à s'y insérer 48 Fonctions de supervision de ligne occupée 48 Utiliser l'interception d'appels FLO pour répondre à un appel qui sonne 49 Appels sécurisés 49 Suivi des appels douteux 51 Informer l'administrateur système d'un appel douteux ou malveillant 51 Appels prioritaires 51 Cisco Extension Mobility 52 Connexion au service EM 53 Déconnexion du service EM 53 Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) vi Table des matières Modifier PIN à l'aide du service Modifier les informations d'identification 53 Modifier le PIN à l'aide de la touche Modifier le PIN 54 Appels professionnels à l'aide d'un seul numéro de téléphone 54 Mobile Connect et Accès vocal mobile 54 Mettre en attente l'appel intercepté sur un téléphone portable 55 Vous connecter à la fonction d'accès vocal mobile 56 Activation de Mobile Connect depuis un téléphone portable 56 Désactiver Mobile Connect depuis un téléphone portable 56 Activer ou désactiver l'accès de connexion mobile à toutesles destinations distantes à partir de votre téléphone de bureau 57 Combiné, casque et haut-parleur 59 Combiné 59 Casque 60 Casque large bande 60 Haut-parleur 60 Réponse automatique avec casque ou haut-parleur 61 Personnalisation du téléphone 63 Personnalisation des sonneries et de l'indicateur de messages 63 Modifier la sonnerie 63 Régler le niveau de la sonnerie du téléphone 64 Modifier le mode de fonctionnement du témoin de message vocal sur le combiné 64 Modification de l'indicateur sonore du message vocal 64 Personnalisation de l'écran du téléphone 64 Modifier la luminosité de l'écran du téléphone 65 Modifier la langue de l'écran du téléphone 65 Changer le libellé de ligne 65 Régler le contraste 66 Paramètre du rétroéclairage 66 Journaux des appels et répertoires 67 Journaux des appels 67 Affichage des journaux d'appels 68 Affichage des détails d'un enregistrement d'appel donné 68 Effacer l'ensemble des enregistrements des appels de tous les journaux des appels 68 Effacer tous les enregistrements des appels d'un journal spécifique 68 Effacer un seul enregistrement d'appel 69 Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) vii Table des matières Composition d'un numéro à partir d'un journal des appels lorsqu'aucun autre appel n'est en cours 69 Composition d'un numéro à partir d'un journal des appels avec un autre appel en cours 69 Recomposer un numéro international à partir des journaux des appels reçus et en absence. 70 Fonctions du répertoire 70 Répertoire d'entreprise 71 Composition d'un numéro à partir d'un répertoire d'entreprise lorsqu'aucun autre appel n'est en cours 71 Composition un numéro à partir d'un répertoire d'entreprise avec un appel en cours 71 Répertoire personnel 72 Accéder au répertoire personnel pour le carnet d'adresses personnel et les codes de numérotation rapide 72 Recherche d'une entrée du carnet d'adresses personnel 72 Composition d'un numéro à partir d'une entrée du carnet d'adresses personnel 73 Supprimer une entrée du carnet d'adresses personnel 73 Modifier une entrée du carnet d'adresses personnel 73 Ajout d'une entrée au carnet d'adresses personnel 74 Ajouter un nouveau code de numérotation simplifiée sans utiliser d'entrée du carnet d'adresses personnel 74 Rechercher des codes de numérotation simplifiée 74 Passage d'un appel à l'aide de la numérotation rapide 75 Supprimer un code de numérotation rapide 75 Se déconnecter du répertoire personnel 75 Messages vocaux 77 Identification du message vocal 77 Configurer le service de messagerie vocale 78 Écouter des messages vocaux ou accéder au système de messagerie vocale 78 Pages Web Options utilisateur 79 Connexion et déconnexion des pages Web Options utilisateur 79 Sélection d'un périphérique depuis la page Web Options utilisateur 80 Opérations de la page Web Options utilisateur 80 Sélectionner une option de configuration 80 Configuration des fonctions et des systèmes sur le Web 80 Répertoire personnel sur le Web 81 Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) viii Table des matières Ajout d'une nouvelle entrée au carnet d'adresses personnel 81 Recherche d'une entrée du carnet d'adresses personnel 81 Modification d'une entrée du carnet d'adresses personnel 81 Suppression d'une entrée du carnet d'adresses personnel 82 Affecter un bouton de ligne à votre carnet d'adresses personnel 82 Outil de synchronisation du carnet d'adresses 82 Paramétrage de la numérotation rapide 83 Affectation d'un code de numérotation rapide à une entrée du carnet d'adresses personnel 83 Affectation d'un code de numérotation rapide au numéro de téléphone sans entrée du carnet d'adresses personnel 83 Recherche d'une entrée de numérotation rapide 84 Modifier un numéro de téléphone correspondant à un numéro rapide 84 Supprimer un numéro rapide du carnet d'adresses personnel 84 Affectation d'une touche de fonction pour la numérotation rapide 85 Configuration de la numérotation simplifiée sur le Web 85 Configuration des boutons de numérotation simplifiée 85 Configurer des codes de numérotation abrégée 86 Configuration du service téléphonique sur le Web 86 S'abonner à un service 87 Recherche de services 87 Modification ou résiliation de services 87 Modification du nom de service 88 Ajout de service au bouton de fonction programmable 88 Paramètres des utilisateurs 88 Modification du mot de passe du navigateur 89 Changer le PIN 89 Modification de la langue des options utilisateur 89 Modification de la langue de l'écran du téléphone 89 Paramètres de ligne sur le Web 90 Configurer le renvoi d'appels par ligne 90 Modification du paramètre d'indicateur de message vocal par ligne 90 Modification du paramètre d'indicateur de message vocal audible par ligne 91 Modification du libellé de ligne pour l'écran du téléphone 91 Téléphone et liste d'accès pour Mobile Connect 91 Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) ix Table des matières Création d'une liste d'accès 92 Ajout d'une nouvelle destination distante 92 Cisco WebDialer 93 Utiliser WebDialer avec le répertoire Options utilisateur 94 Utiliser WebDialer avec un autre répertoire d'entreprise en ligne (au lieu du répertoire Options utilisateur) 94 Vous déconnecter de WebDialer 94 Configuration, affichage ou modification des préférences de WebDialer 95 Options supplémentaires 97 Dépannage 99 Problèmes 99 Pas de tonalité ou impossible de passer un appel 99 Touche manquante 100 Impossible d'utiliser la fonction Rappel 100 Message d'erreur de renvoi de tous les appels 100 Le téléphone ne répond pas 101 Message d'erreur de sécurité 101 Impossible d'accéder au menu Paramètres 101 Données de dépannage du téléphone 102 Outil de génération de rapports qualité 102 Garantie 103 Conditions générales de la garantie matérielle limitée à un an de Cisco 103 Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) x Table des matières Préface Le Guide de l'utilisateur du téléphone IP Cisco Unified 7931 pour Cisco Unified Communications Manager explique comment installer et utiliser le téléphone IP Cisco Unified 7931. Ce chapitre contient les sections ci-dessous : • Introduction, page xi • Informations complémentaires, page xii • Didacticiels d'apprentissage électronique du téléphone IP Cisco Unified 7900 Series, page xii • Consignes de sécurité et informations relatives aux performances, page xiii • Sécurité des produits Cisco, page xiv • Fonctions d'accessibilité, page xiv Introduction Ce guide propose une présentation générale des fonctions disponibles sur votre téléphone. Parcourez-le dans son intégralité pour prendre connaissance de toutesles possibilités de votre téléphone. Vous pouvez également consulter le tableau ci-après, qui permet d'accéder d'un seul clic aux sections les plus utilisées. Pour... Procédez comme suit Lorsque vous avez besoin d'aide, appuyez sur la touche ( ) > du téléphone. Apprendre à utiliser le téléphone par vous-même Reportez-vous à Consignes de sécurité et informations relatives aux performances, à la page xiii. Prendre connaissance des consignes de sécurité importantes Raccorder le téléphone Reportez-vous à Installation du téléphone, à la page 13. Reportez-vous à Fonctions de votre téléphone IP Cisco Unified, à la page 1. Utiliser le téléphone une fois qu'il est installé En savoir plussur les Boutons et touches Reportez-vous à Boutons et matériel, à la page 1. de fonctions Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) xi Pour... Procédez comme suit Passer des appels Reportez-vous à Options d'appels de base, à la page 17. Reportez-vous à Mise en attente et reprise des appels, à la page 25. Mettre des appels en attente Désactiver le micro durant les appels Reportez-vous à Coupure micro, à la page 28. Transférer les appels Reportez-vous à Transfert des appels, à la page 28. Établir des conférences Reportez-vous à Conférences, à la page 33. Configurer la numérotation simplifiée Reportez-vous à Numérotation simplifiée, à la page 40. Partager un numéro de téléphone Reportez-vous à Interception d'appels, à la page 42. Utiliser le mode haut-parleur du Reportez-vous à Combiné, casque et haut-parleur, à la page 59. téléphone Reportez-vous à Personnalisation des sonneries et de l'indicateur de messages, à la page 63. Modifier le volume de la sonnerie ou de l'appel Consulter les appels en absence Reportez-vous à Journaux des appels, à la page 67. Écouter vos messages vocaux Reportez-vous à Messages vocaux, à la page 77. Informations complémentaires Vous pouvez accéder à la documentation Cisco la plus récente à l'adresse : http://www.cisco.com/en/US/products/hw/phones/ps379/tsd_products_support_series_home.html Vous pouvez accéder au site Web de Cisco à l'adresse : http://www.cisco.com/ Les informations les plus récentes sur les licences sont disponibles à l'adresse : http://www.cisco.com/en/US/docs/voice_ip_comm/cuipph/all_models/openssl_license/7900_ssllic.html Didacticiels d'apprentissage électronique du téléphone IP Cisco Unified 7900 Series (Uniquement sur les téléphones SCCP) Les didacticiels d'apprentissage électronique du téléphone IP Cisco Unified 7900 utilisent le son et l'animation pour présenter lesfonctions d'appel de base. Depuis un ordinateur, vous pouvez accéder en ligne aux didacticiels Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) xii Préface Informations complémentaires d'apprentissage électronique de plusieurs modèles de téléphones. Pour rechercher le didacticiel (en anglais uniquement) correspondant à votre modèle de téléphone, reportez-vous à la liste des documentations à l'adresse : http://www.cisco.com/en/US/products/hw/phones/ps379/products_user_guide_list.html Même s'il n'existe pas de didacticiel d'apprentissage électronique pour votre modèle de téléphone, reportez-vous aux didacticiels du téléphone IP Cisco Unified 7900 pour découvrir les caractéristiques et fonctions communes aux téléphones IP Cisco Unified. Remarque Consignes de sécurité et informations relatives aux performances Les sections ci-dessous contiennent des informations sur l'impact des coupures de courant et des périphériques externes sur votre téléphone IP Cisco Unified. Coupure de courant Pour accéder au service d'urgence, votre téléphone doit être sous tension. En cas de coupure de courant, le service d'appel d'urgence et de réparation ne fonctionnera pastant que le courant n'est pasrétabli. Il est possible que vous deviez alorsréinitialiser ou reconfigurer l'équipement pour pouvoir utiliser le service d'appel d'urgence et de réparation. Périphériques externes Cisco recommande d'utiliser des périphériques externes (par exemple, des casques), des câbles et des connecteurs de bonne qualité, blindés contre les interférences produites par les signaux de fréquences radio et audio. En fonction de la qualité de ces périphériques et de leur proximité par rapport à d'autres appareils, comme des téléphones portables ou des radios bidirectionnelles, des parasites sonores sont toujours susceptibles de se produire. Dans ce cas, Cisco vous recommande d'appliquer une ou plusieurs des mesures ci-dessous : • Éloignez le périphérique externe de la source émettrice des signaux de fréquences radio ou audio. • Maintenez les câbles du périphérique externe éloignés de la source émettrice des signaux de fréquences radio ou audio. • Utilisez des câbles blindés pour le périphérique externe ou des câbles dotés d'un blindage supérieur et d'un meilleur connecteur. • Raccourcissez le câble du périphérique externe. • Utilisez des structures en ferrite ou d'autres dispositifs de ce type pour les câbles du périphérique externe. Cisco ne peut pas garantir les performances des périphériques, des câbles et des connecteurs externes. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) xiii Préface Consignes de sécurité et informations relatives aux performances Dans les pays de l'Union européenne, n'utilisez que des haut-parleurs, des microphones et des casques externes conformes à la Directive 89/336/CE sur la compatibilité électromagnétique (CEM). Précaution Sécurité des produits Cisco Ce produit, qui intègre des fonctions cryptographiques, est soumis aux lois des États-Unis et des autres pays qui en régissent l'importation, l'exportation, le transfert et l'utilisation. La fourniture de produits cryptographiques Cisco n'autorise pas un tiers importer, à exporter, à distribuer ou à utiliser le chiffrement. Les importateurs, exportateurs, distributeurs et utilisateurs sont responsables du respect des lois des États-Unis et des autres pays. Lorsque vous utilisez ce produit, vous acceptez de respecter les lois et les réglementations applicables. Si vous n'êtes pas en mesure de respecter les lois des États-Unis et celles des autres pays, renvoyez-nous ce produit immédiatement. Pour plus d'informations sur les réglementations américaines concernant les exportations, reportez-vous à l'adresse suivante : http://www.access.gpo.gov/bis/ear/ear_data.html. Fonctions d'accessibilité Les téléphones IP Cisco Unified de la série 7900 offrent des fonctions d'accessibilité pour les malvoyants, les malentendants et les personnes à mobilité réduite. Pour plus d'informations sur les fonctions de ces téléphones, reportez-vous à Fonctions d'accessibilité du téléphone IP Cisco Unified 7900. Pour plus d'informations sur l'accessibilité, vous pouvez également vous reporter au site Web Cisco : http://www.cisco.com/web/about/responsibility/accessibility/index.html Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) xiv Préface Sécurité des produits Cisco CHAPITRE 1 Fonctions de votre téléphone IP Cisco Unified Le téléphone IP Cisco Unified 7931G est un téléphone haut de gamme qui permet une communication vocale via le réseau de données utilisé par votre ordinateur. Ainsi, vous pouvez émettre et recevoir des appels, en mettre en attente, en transférer, établir des conférences, etc. Il est conçu pour répondre aux besoins de communication dans un environnement de trafic téléphonique modéré et d'exigences d'appelspécifiques. Doté de touches dédiées de mise en attente, de rappel et de transfert facilitant la gestion des appels, il intègre également des fonctions d'amélioration de la productivité qui permettent d'accroître vos capacités d'administration : • L'accès aux données du réseau, aux applications XML et aux services Web. • La personnalisation en ligne des fonctions et des services du téléphone à partir de vos pages Web Options utilisateur Cisco Unified CM. • Un système d'aide en ligne complet qui affiche des informations sur l'écran du téléphone. Ce chapitre contient les sections ci-dessous : • Boutons et matériel, page 1 • Définitions de ligne et d'appel, page 5 • Fonctions de l'écran du téléphone, page 7 • Navigation dans le menu d'application, page 8 • Système d'aide du téléphone, page 9 • Disponibilité des fonctions, page 9 • Protocoles de signalisation SIP et SCCP, page 10 • Économies d'énergie, page 11 Boutons et matériel Utilisez l'illustration ci-dessous pour identifier les boutons et les composants matériels du téléphone. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 1 Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 2 Fonctions de votre téléphone IP Cisco Unified Boutons et matériel Élément Description En fonction de la configuration du téléphone, les boutons programmables (ou touches de ligne) permettent d'accéder aux éléments ci-dessous : • Lignes téléphoniques et lignes intercom (boutons de ligne) • Numérossimplifiés(boutons de numérotation simplifiée, y compris avec la fonction FLO) • Services Web (par exemple, bouton du carnet d'adresses personnel) • Fonctions d'appel (par exemple, Confidentialité et Conférence) • Fonctions locales (par exemple, menu d'application, Casque et Paramètres) Les boutons s'allument pour indiquer les états : Vert, fixe : appel actif ou appel intercom bidirectionnel Vert, clignotant : appel en attente Orange fixe : fonction de confidentialité en cours d'utilisation, appel intercom unidirectionnel, NPD, connexion établie à un groupe de recherche ou activation d'une fonction locale, notamment d'un casque Orange clignotant : appel entrant ou renvoyé Rouge fixe : ligne distante en cours d'utilisation (ligne partagée, état FLO ou appel mobile en cours) Rouge clignotant : appel distant en attente Les touches de ligne sont numérotées de 24 à 1, dans l'ordre décroissant et de la gauche et vers la droite alternativement. 1 Boutons programmables 2 Étiquette papier Identifie chaque bouton par des informations sur la ligne ou la fonction. 3 Touches Chacune de ces touches active une option (affichée sur l'écran du téléphone). Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 3 Fonctions de votre téléphone IP Cisco Unified Boutons et matériel Élément Description 4 Bouton Attente Met les appels en attente. 5 Bouton Transfert Transfère un appel vers un autre numéro. 6 Bouton Bis Appelle le dernier numéro composé. Permet de composer des numéros de téléphone, de saisir des lettres et de sélectionner des options de menu. 7 Clavier Active ou désactive le microphone. Lorsque le microphone est coupé, le bouton est allumé. 8 Bouton Coupure du micro Contrôle le volume du combiné, du casque et du haut-parleur (en mode décroché), ainsi que le volume de la sonnerie (en mode raccroché). 9 Bouton Volume Active ou désactive le mode haut-parleur. Lorsque le mode haut-parleur est activé, le bouton est allumé. 10 Bouton haut-parleur 11 Combiné Fonctions identiques à celles d'un combiné traditionnel. Signale un appel entrant ou un nouveau message vocal. Clignote pour indiquer un appel entrant et reste allumé lorsqu'un message est en attente. 12 Témoin lumineux du combiné Affiche des informations telles que l'état de la ligne et des appels, les numéros de téléphone et la touche. 13 Écran du téléphone Modèle de téléphone IP Cisco Indique le numéro du modèle de votre téléphone IP Cisco Unified. Unified 14 Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 4 Fonctions de votre téléphone IP Cisco Unified Boutons et matériel Élément Description Bouton de navigation • Permet de faire défiler vers le haut ou vers le bas de façon à afficher les menus et à sélectionner leurs options • Permet de faire défiler vers la gauche pour ouvrir l'écran Détails et afficher les numéros d'annuaire, ainsi que lesfonctions affectées à chaque bouton de ligne (dans l'écran d'appel) • Permet de faire défiler vers la droite pour fermer l'écran Détails Pavé de navigation à 4 directions et bouton Sélectionner (au centre) 15 Bouton Sélectionner : sélectionnez une ligne à l'aide du bouton de navigation, puis procédez comme suit : • Si le bouton est mis en correspondance avec un numéro d'annuaire et : ◦ Si la ligne est inactive, appuyez sur pour passer un appel. ◦ Si un appel en attente est sur la ligne, appuyez sur le bouton pour reprendre l'appel. ◦ Si un appel est actif sur la ligne, le bouton Sélectionner est sans effet. • Si le bouton est mis en correspondance avec une fonction, appuyez sur pour accéder à celle-ci. Définitions de ligne et d'appel Il est facile de faire l'amalgame entre les termes lignes et appels. • Lignes : Le téléphone compte 24 boutons programmables (reportez-vous à Boutons et matériel, à la page 1). En général, l'administrateur système affecte un certain nombre de ces lignes (jusqu'à 24) à l'établissement et à la réception des appels. Chacune est associée à un numéro d'annuaire ou à un numéro intercom que vos contacts peuvent utiliser pour vous appeler. Certaines lignes peuvent partager le même numéro d'annuaire, tandis que d'autres peuvent avoir un numéro spécifique.Pour afficher voslignestéléphoniques, utilisez le bouton de navigation pour parcourir la liste d'affichage des boutons programmables (reportez-vous à Fonctions de l'écran du téléphone, à la page 7). Les boutons configurés comme deslignes affichent le numéro d'annuaire et le numéro de bouton associés. Par exemple, si le numéro d'annuaire “3105” est affecté au bouton 1, la ligne s'affiche sous la forme de "3105:01" sur l'écran du téléphone. Chaque ligne est également associée à une icône afin que vous puissiez identifier la fonction (reportez-vous à Icônes de ligne et d'appel, à la page 6). • Appels : chaque ligne peut prendre en charge un seul appel. Même si plusieurs lignes partagent un numéro d'annuaire, chacune peut prendre en charge un appel. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 5 Fonctions de votre téléphone IP Cisco Unified Définitions de ligne et d'appel Icônes de ligne et d'appel Votre téléphone affiche des icônes destinées à déterminer l'état de la ligne et celui de l'appel, ainsi que l'accessibilité des fonctions sur chaque ligne. État de la ligne ou de Description l'appel Icône État de l'appel Combiné raccroché Aucune activité d'appel sur cette ligne. Combiné décroché Vous êtes en train de composer un numéro ou un appel sortant sonne. Appel connecté Vous êtes connecté avec votre interlocuteur. Transfert des appels Le renvoi d'appel est activé sur cette ligne. activé Un appel sonne sur l'une de vos lignes ou une ligne surveillée par FLO sonne ( Interception d'appels FLO). Reportez-vous à Fonctions de supervision de ligne occupée, à la page 48. Appel qui sonne Vous avez mis un appel en attente. Reportez-vous à Mise en attente et reprise des appels, à la page 25. Appel en attente Un autre téléphone qui partage votre ligne a mis un appel en attente. Reportez-vous à Mise en attente et reprise des appels, à la page 25. Appel distant en attente Un autre téléphone qui partage votre ligne a un appel connecté. Reportez-vous à Lignes partagées, à la page 46. Utilisé à distance Appel authentifié Reportez-vous à Appels sécurisés, à la page 49. Appel chiffré Reportez-vous à Appels sécurisés, à la page 49. La ligne intercom n'est pas utilisée. Reportez-vous à Appels intercom, à la page 38. Ligne intercom inactive La ligne intercom envoie ou reçoit des données audio unidirectionnelles. Reportez-vous à Appels intercom, à la page 38. Intercom unidirectionnel Appuyez sur le bouton de la ligne intercom pour activer le son bidirectionnel avec l'appelant intercom. Reportez-vous à Appels intercom, à la page 38. Intercom bidirectionnel Accès aux fonctions Le menu d'application est affecté à cette touche de ligne. Reportez-vous à Navigation dans le menu d'application, à la page 8. Menu d'application Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 6 Fonctions de votre téléphone IP Cisco Unified Icônes de ligne et d'appel État de la ligne ou de Description l'appel Icône Le menu Paramètres est affecté à cette touche de ligne. Reportez-vous à Personnalisation du téléphone, à la page 63. Menu Paramètres Le menu Répertoires est affecté à cette touche de ligne. Reportez-vous à Journaux des appels et répertoires, à la page 67. Menu Répertoires Le menu Messages est affecté à cette touche de ligne. Reportez-vous à Messages vocaux, à la page 77. Menu Messages Le menu Services est affecté à cette touche de ligne. Reportez-vous à Configuration du service téléphonique sur le Web, à la page 86. Menu Services Cette option permet d'utiliser un casque avec votre téléphone. Reportez-vous à Combiné, casque et haut-parleur, à la page 59. Bouton Casque La fonction Conférence est affectée à cette touche de ligne. Reportez-vous à Conférences, à la page 33. Bouton Conférence Une fonction d'appel est affectée à cette touche de ligne. Reportez-vous au texte de description en regard de l'icône pour vérifier la fonction. Autre fonction d'appel La fonction d'accès mobile est affectée à cette touche de ligne. Reportez-vous à Appels professionnels à l'aide d'un seul numéro de téléphone, à la page 54. Mobilité Une fonction d'appel affectée à cette touche de ligne est activée. Reportez-vous au texte de description en regard de l'icône pour vérifier la fonction. Fonction activée Un bouton de numérotation simplifiée est affecté à cette touche de ligne. Reportez-vous à Interception d'appels, à la page 42, à Configuration du service téléphonique sur le Web, à la page 86 et à Fonctions de supervision de ligne occupée, à la page 48. Numérotation simplifiée ou fonction FLO associée Astuce L'administrateursystème peut vousremettre une étiquette papier préimprimée destinée à rappeler l'affectation des touches de ligne. Si ce n'est pas le cas, enlevez l'étiquette vierge et apposez-y vos propres libellés. Fonctions de l'écran du téléphone La figure ci-dessous représente l'écran de votre téléphone lorsqu'il est inactif. Il s'agit de l'écran “Aperçu.” Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 7 Fonctions de votre téléphone IP Cisco Unified Fonctions de l'écran du téléphone 1 Date et heure Affiche la date et l'heure actuelles. Affiche le numéro de téléphone (numéro d'annuaire) de votre ligne téléphonique principale. 2 Ligne téléphonique principale Les boutons programmables peuvent servir pour les lignes téléphoniques, les lignes intercom, la numérotation simplifiée, les services téléphoniques, ainsi que les fonctions d'appel ou locales. Indicateurs des boutons programmables 3 Les icônes et les descriptions précisent la configuration de ces boutons. Pour connaître la signification des icônes, reportez-vous à Icônes de ligne et d'appel, à la page 6. 4 Étiquettes de touche Chacune décrit la fonction d'une touche. Affiche les icônes du mode audio, les informations d'état et les invites. 5 Ligne d'état La figure ci-dessousreprésente l'écran de votre téléphone principal en cours d'appel. Ils'agit de l'écran “Détails.” 1 Aperçu Affiche le numéro et l'icône d'état de chaque ligne. Affiche les détails concernant les fonctions locales et d'appel affectées à la touche de ligne sélectionnée. Dans l'exemple ci-dessus, l'écran affiche des informations 2 Écran Détails sur l'appel connecté, comme le numéro d'annuaire, la durée de connexion et l'état de l'appel. Utilisez le bouton de navigation pour faire défiler les détails et consulter ceux relatifs à d'autres lignes. Les fonctions locales et d'appel affichent les noms d'étiquette et les icônes dans l'écran Détails. Reportez-vous à Icônes de ligne et d'appel, à la page 6. Navigation dans le menu d'application Le menu d'application permet d'accéder aux fonctions locales du téléphone. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 8 Fonctions de votre téléphone IP Cisco Unified Navigation dans le menu d'application Pour... Procédez comme suit... Appuyez sur > pour afficher la liste des applications: Messages, Répertoire, Paramètres, Services et Aide. (En général, le menu d'application est affecté au bouton 24 , en haut de la colonne de gauche.) Accéder au menu d'application Faire défiler une liste ou Utilisez le bouton de navigation. un menu Utilisez le bouton de navigation pour mettre en surbrillance l'option de menu souhaitée, puis appuyez sur ou Sélect. Vous pouvez également composer sur le clavier le numéro de l'option de menu. Sélectionner une option de menu Appuyez sur Quitter. (Si vous appuyez sur Quitter alors que vous êtes dans le niveau supérieur d'un menu, ce dernier se ferme.) Remonter d'un niveau dans un menu Fermer un menu (et Appuyez une ou plusieurs fois sur Quitter jusqu'à ce que le menu se ferme. revenir au menu d'application) Quitter Appuyez sur ou sur Quitter. le menu d'application Astuce Vous pouvez également affecter des boutons à certaines options du menu d'application (Paramètres, Répertoires, Services, Messages). Utilisez le bouton de navigation pour parcourir l'aperçu et reportez-vous à Icônes de ligne et d'appel, à la page 6 pour identifier ces lignes. Système d'aide du téléphone Votre téléphone comprend un système complet d'aide en ligne. Pour afficher l'aide du téléphone, appuyez sur, puis sélectionnez > > Aide. En général, le menu d'application est affecté au bouton 24, situé en haut de la colonne de gauche. Disponibilité des fonctions En fonction de la configuration de votre système téléphonique, certaines fonctions décrites dans ce guide sont susceptibles de ne pas être disponibles dans votre cas ou de fonctionner différemment.Pour plus d'informations sur le fonctionnement ou sur la disponibilité des fonctions, contactez un membre de l'équipe d'assistance ou votre administrateur système. Vous pouvez accéder aux fonctions en utilisant les touches ou en appuyant sur une touche de ligne. Vous pouvez configurer certaines de ces fonctions, mais votre administrateur contrôle la plupart d'entre elles. Voici quelques informations concernant l'accès aux fonctions au moyen des touches et des boutons de ligne. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 9 Fonctions de votre téléphone IP Cisco Unified Système d'aide du téléphone Fonction Touche Étiquette et icône du bouton de ligne Rappel Rappel Rappel Renvoi d'appels RenvTt Renvoi de tous les appels Parcage d'appels Parquer Parquer Interception d'appels Intrcpt Intrcpt Conférence Conf. Conférence Liste de conférence ListConf Liste de conférence Ne pas déranger NPD Ne pas déranger Comment mettre fin à un appel FinApp Comment mettre fin à un appel Interception d'appels de groupe GrpIntr Interception d'appels de groupe Attente Attente bouton Groupe de recherche Groupmt Groupe de recherche Identification d'un appel malveillant IDAM ID des appels malveillants Conférences Meet-Me Meet-Me Meet-Me Mobilité Mobilité Mobilité NvAppel NvAppel NvAppel Autre interception AGrpIntr Autre interception bouton Bis Bis Supprimer le dernier participant à une conférence SupDerA Supprimer dernier participant bouton Transfert Transfert Prise en charge vidéo ModeVid. Vidéo Protocoles de signalisation SIP et SCCP Votre administrateur système configure votre téléphone avec un des deux protocoles de signalisation : SIP (Session Initiation Protocol) ou SCCP (Skinny Call Control Protocol). Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 10 Fonctions de votre téléphone IP Cisco Unified Protocoles de signalisation SIP et SCCP Les fonctions disponibles sur le téléphone dépendent du protocole choisi. Le présent manuel définit les fonctions spécifiques à chaque protocole. Pour savoir quel protocole est utilisé par votre téléphone, contactez votre administrateur système. Économies d'énergie Votre téléphone prend en charge le programme EnergyWise de Cisco. Afin d'économiser de l'énergie, votre administrateursystème a défini des périodes de veille (arrêt) et de réveil (mise en marche)sur votre téléphone. Si votre administrateur système a activé l'alerte sonore, une sonnerie retentit dix minutes avant l'heure prévue de mise en veille. Cette alerte respecte le calendrier suivant : • 10 minutes avant l'arrêt, l'alerte retentit quatre fois • 7 minutes avant l'arrêt, l'alerte retentit quatre fois • 4 minutes avant l'arrêt, l'alerte retentit quatre fois • 30 secondes avant l'arrêt, l'alerte retentit 15 fois ou sonne jusqu'à ce que le téléphone s'arrête Si votre téléphone est inactif au moment de l'arrêt, un message vous rappelle qu'il est sur le point de s'arrêter. Pour qu'il reste allumé, appuyez sur n'importe quelle touche de votre téléphone. Si vous n'appuyez sur aucune touche, votre téléphone s'arrête. Si votre téléphone est actif (un appel est en cours, par exemple), votre téléphone attend d'être inactif pendant un certain temps avant de vous informer qu'il est sur le point de s'arrêter. Avant l'arrêt, un message vous rappelle que le téléphone est sur le point de s'arrêter. Votre téléphone se met en marche à l'heure définie. Pour réveiller le téléphone avant l'heure prévue, contactez votre administrateur. Les périodes de veille et de réveil ont également été définies en fonction de vos jours de travail habituels. Si ces conditions évoluent (par exemple,si vos horaires ou vosjours de travail ne sont plusles mêmes), demandez à votre administrateur système de reconfigurer votre téléphone. Pour plus d'informations sur le programme EnergyWise et votre téléphone, contactez votre administrateur système. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 11 Fonctions de votre téléphone IP Cisco Unified Économies d'énergie Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 12 Fonctions de votre téléphone IP Cisco Unified Économies d'énergie CHAPITRE 2 Installation du téléphone Ce chapitre présente les sections ci-dessous sur la façon d'installer manuellement votre téléphone. • Connexions du téléphone IP Cisco Unified 7931G, page 13 • Réglage du support du combiné, page 15 • Enregistrement TAPS, page 15 • Prise en charge de casques, page 16 Connexions du téléphone IP Cisco Unified 7931G La figure et le tableau ci-dessous indiquent comment connecter votre téléphone. 1 Port de l'adaptateur CC (CC48V) Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 13 2 Port réseau (10/100 SW) 3 Port d'accès (10/100 PC) 4 Port casque 5 Port du combiné Verrouillage de câble du téléphone Vous pouvez sécuriser le téléphone IP Cisco Unified sur un bureau à l'aide d'un système de verrouillage de câble d'ordinateur portable. Le verrou se connecte à la fente de sécurité à l'arrière du téléphone et le câble peut être attaché au bureau de manière sécurisée. La fente de sécurité est adaptée à un verrou de 20 mm. Les câbles de verrouillage d'ordinateurs portables compatibles comprennent le verrouillage de câble d'ordinateur portable Kensington et les câbles de verrouillage d'ordinateur portable d'autres fabricants qui peuvent s'adapter dans la fente de sécurité à l'arrière du téléphone. Reportez-vous à la figure ci-dessous. Figure 1: Connecter un système de verrouillage de câble au téléphone IP Cisco Unified Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 14 Installation du téléphone Verrouillage de câble du téléphone Réglage du support du combiné Si votre téléphone est fixé au mur, vous devrez peut-être régler le support pour éviter que le combiné ne s'en détache. Procédure Étape 1 Décrochez le combiné et retirez la plaquette en plastique du support du combiné. Étape 2 Faites pivoter la plaquette de 180 degrés. Étape 3 Tenez la plaquette entre deux doigts, les encoches tournées dans votre direction. Étape 4 Alignez la plaquette avec l'emplacement dans le support, puis appuyez dessus de façon égale pour l'y insérer. Une extension ressort en haut de la plaquette qui a pivoté. Étape 5 Replacez le combiné sur son support. Enregistrement TAPS TAPS peut être utilisé pour un nouveau téléphone ou pour en remplacer un existant. Pour enregistrer un téléphone à l'aide de l'outil TAPS, décrochez le combiné, saisissez le numéro de poste TAPS fourni par votre administrateur système, puis suivez les instructions vocales. Il est possible que vous deviez saisir la totalité de votre numéro de poste, y compris l'indicatif régional. Lorsque votre téléphone affiche un message de confirmation, raccrochez. Le téléphone redémarre. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 15 Installation du téléphone Réglage du support du combiné Prise en charge de casques Bien que CiscoSystemsréalise certains essaisinternessur des casques de fournisseurstierssusceptibles d'être utilisés avec les téléphones IP Cisco Unified, Cisco ne certifie ni ne promeut de produits de fournisseurs de casques ou de combinés. Cisco recommande d'utiliser des casques de bonne qualité, blindés contre les interférences produites par les signaux de fréquences radio (RF) ou audio (AF). En fonction de la qualité des casques et de leur proximité par rapport à d'autres périphériques tels que des téléphones portables et des radios bidirectionnelles, des parasites sonores ou des échos sont toujours susceptibles de se produire. Un ronflement ou un bourdonnement peut être entendu soit par l'interlocuteur uniquement, soit par l'interlocuteur et par l'utilisateur du téléphone IP Cisco Unified. Lesronflements et les bourdonnements peuvent être provoqués par diversessources extérieures: lampes électriques, moteurs électriques ou grands écrans d'ordinateur, par exemple. Dans certains cas, il est possible de réduire ou d'éliminer le ronflement à l'aide d'un groupe amplificateur de, puissance local ou d'un injecteur de, puissance. Remarque En raison de ces contraintes environnementales et matérielles liées aux différents sites de déploiement des téléphonesIP Cisco Unified, il n'existe pas de solution de casque unique optimale pour tousles environnements. Cisco recommande aux clients de tester les casques dans l'environnement prévu afin de déterminer leurs performances avant de prendre une décision d'achat et de les déployer à grande échelle. Rubriques connexes Périphériques externes, à la page xiii Qualité audio Au delà des performances physiques, mécaniques et techniques, la qualité du son d'un casque doit sembler bonne pour l'utilisateur comme pourson interlocuteur. La qualité sonore estsubjective et Cisco ne peut garantir les performances d'aucun casque. Un certain nombre de casques de grandsfabricants ont toutefois été signalés comme fonctionnant bien avec les téléphones IP Cisco Unified. Pour plus d'informations, reportez-vous à la documentation du casque. Informations sur le casque sans fil Vousrechercherez plus d'informationssur les casquessansfil fonctionnant avec la commande de commutation à distance pour casque sans fil à l'adresse suivante (en anglais) : http://www.cisco.com/pcgi-bin/ctdp/Search.pl 1 Dans la zone de liste Enter Solution, choisissez IP Communications. La zone de liste Select a Solution Category s'affiche. 2 Choisissez l'option IP Phone Headsets pour afficher une liste des partenaires du programme de développement technologique. Si vous voulez rechercher un partenaire du Programme de développement de technologies en particulier, saisissez le nom de ce partenaire dans le champ Saisir le nom d'une société. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 16 Installation du téléphone Prise en charge de casques CHAPITRE 3 Fonctions d'appel Lestâches de gestion de base des appelss'appuientsur un ensemble de fonctions et de services. La disponibilité des fonctions peut varier. Pour plus d'informations, contactez votre administrateur système. Ce chapitre contient les sections ci-dessous : • Options d'appels de base, page 17 • Options des appels supplémentaires, page 19 • Réponse à un appel, page 23 • Déconnexion de l'appel, page 24 • Mise en attente et reprise des appels, page 25 • Plusieurs appels, page 26 • Mouvement des appels en cours, page 26 • Coupure micro, page 28 • Transfert des appels, page 28 • Transfert de l'appel vers le système de messagerie vocale, page 29 • Renvoi d'appels, page 30 • Ne pas déranger, page 32 • Conférences, page 33 • Appels intercom, page 38 • Gestion avancée des appels, page 39 Options d'appels de base Les procédures ci-dessous décrivent des méthodes simples pour passer un appel depuis votre téléphone IP Cisco Unified. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 17 Astuces • Vous pouvez composer un numéro avec le combiné raccroché et sans tonalité (prénumérotation). Pour utiliser la prénumérotation, saisissez un numéro, soulevez le combiner pour décroche, puis appuyez sur Composer, sur ( ) ou sur . • Lors de la prénumérotation, le téléphone tente d'anticiper le numéro que vous êtes en train de composer. Pour ce faire, il utilise le journal des appels composés afin d'afficher les numéros correspondants (le cas échéant). Cette opération s'appelle la numérotation automatique. Pour appeler un numéro affiché par le biais de cette fonction, accédez à celui-ci, puis décrochez le combiné ou appuyez sur le bouton Sélect. • Si vous faites une erreur lorsque vous composez le numéro, appuyez sur << pour effacer les chiffres. • Si les interlocuteurs d'un appel entendent un bip, l'appel est peut-être surveillé ou enregistré. Pour plus d'informations, contactez votre administrateur système. • Pour démarrer ou pour arrêter un enregistrement, appuyez sur Enregistrer sur votre téléphone. • Votre téléphone peut être configuré pour la consignation des appels internationaux, qui est indiquée par un symbole “+” sur les journaux des appels, le rappel ou les entrées du répertoire des appels. Pour plus d'informations, contactez votre administrateur système. Rubriques connexes Combiné, casque et haut-parleur, à la page 59 Journaux des appels, à la page 67 Passage d'un appel Procédure Décrochez le combiné, puis composez le numéro. Passage d'un appel à l'aide du haut-parleur Procédure Étape 1 Appuyez sur Étape 2 Saisissez un numéro. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 18 Fonctions d'appel Passage d'un appel Passage d'un appel à l'aide du casque Procédure Appuyez sur ( ), puis saisissez un numéro. (La touche 23 est généralement affectée au casque.) Rappel d'un numéro Procédure Appuyez sur pour composer le numéro. Composition d'un numéro à partir d'un journal des appels Procédure Étape 1 Appuyez sur , puis sélectionnez Répertoires. Étape 2 Sélectionnez l'une des options ci-dessous : • Appels en absence • Appels reçus • Appels composés Étape 3 Faites défiler jusqu'au numéro souhaité, puis appuyez sur Composer. Options des appels supplémentaires Vous pouvez passer des appels à l'aide des fonctions et services spéciaux éventuellement disponibles sur votre téléphone. Pour plus d'informations sur ces options supplémentaires, contactez votre administrateur système. Astuces • Pour passer un appel à l'aide de votre profil Extension Mobility, connectez-vous au service Extension Mobility sur un téléphone. • Pour vérifier si une ligne associée à un numéro simplifié est occupée avant de l'appeler, recherchez les indicateurs de fonction de ligne occupée. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 19 Fonctions d'appel Passage d'un appel à l'aide du casque Rubriques connexes Cisco Extension Mobility, à la page 52 Fonctions de supervision de ligne occupée, à la page 48 Mise en attente et reprise des appels, à la page 25 Numérotation simplifiée, à la page 40 Journaux des appels, à la page 67 Appels prioritaires, à la page 51 Répertoire personnel, à la page 72 Appels professionnels à l'aide d'un seul numéro de téléphone, à la page 54 Répertoire personnel sur le Web, à la page 81 Paramétrage de la numérotation rapide, à la page 83 Passage d'un appel lorsqu'un autre est actif (sur une ligne différente) Procédure Étape 1 Appuyez sur pour ouvrir une nouvelle ligne. Le premier appel est automatiquement mis en attente. Étape 2 Saisissez un numéro. Passage d'un appel à l'aide de la numérotation simplifiée Procédure Effectuez l'une des opérations ci-dessous : a) Appuyez sur ( ). b) Utilisez la fonction de numérotation abrégée. c) Utilisez la fonction de numérotation rapide. Composition d'un numéro depuis le répertoire d'entreprise sur le téléphone Procédure Étape 1 Appuyez sur ( ) > Répertoires > Répertoire d'entreprise Étape 2 (le nom peut varier). Étape 3 Saisissez un nom, puis appuyez sur Recher. Étape 4 Mettez une entrée de la liste en surbrillance et décrochez. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 20 Fonctions d'appel Passage d'un appel lorsqu'un autre est actif (sur une ligne différente) Avertissement lorsque le poste occupé ou qui sonne est disponible (rappel) Remarque La fonction Rappel n'est pas disponible lorsqu'un appel est chaperonné. Procédure Étape 1 Appuyez sur Rappel lorsque vous entendez la tonalité d'occupation ou la sonnerie. Étape 2 Raccrochez. Le téléphone vous avertit lorsque la ligne se libère. Étape 3 Passez de nouveau l'appel. Passage d'un appel prioritaire (qui a la préséance) Procédure Étape 1 Saisissez le numéro d'accès MLPP. Étape 2 Saisissez un numéro de téléphone. Composition d'un numéro à partir d'une entrée du carnet d'adresses personnel Procédure Étape 1 Appuyez sur ( ) > Répertoires > Répertoire personnel pour vous connecter. Étape 2 Sélectionnez Carnet d'adresses personnel, puis recherchez une liste. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 21 Fonctions d'appel Avertissement lorsque le poste occupé ou qui sonne est disponible (rappel) Passage d'un appel à l'aide d'un code de facturation ou de suivi Procédure Étape 1 Composez un numéro. Étape 2 Lorsque vous entendez la tonalité, saisissez un code d'affaire client (CMC) ou un code d'autorisation forcée (FAC). Utiliser la fonction d'accès vocal mobile pour passer un appel depuis un téléphone portable Procédure Étape 1 Pour connaître votre numéro d'accès vocal mobile et votre PIN, contactez votre administrateur système. Étape 2 Composez le numéro d'accès vocal mobile qui vous a été attribué. Étape 3 Saisissez le numéro de votre téléphone portable, si vous y êtes invité, ainsi que votre PIN. Étape 4 Appuyez sur 1 pour passer un appel vers un téléphone IP d'entreprise. Étape 5 Composez le numéro d'un téléphone de bureau autre que le vôtre. Passage d'un appel à l'aide de la numérotation simplifiée Pour que vous puissiez utiliser cette option, votre administrateur système doit la configurer et affecter une URL de service au bouton de ligne. Pour plus d'informations, contactez votre administrateur système. Procédure Étape 1 Appuyez sur le bouton de ligne Numérotation simplifiée. Étape 2 Faites défiler la liste ou saisissez le code de numérotation simplifiée pour rechercher et sélectionner une entrée. Le système compose le numéro spécifié. Passage d'un appel à l'aide du carnet d'adresses personnel Pour que vous puissiez utiliser cette option, votre administrateur système doit la configurer et affecter une URL de service au bouton de ligne. Pour plus d'informations, contactez votre administrateur système. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 22 Fonctions d'appel Passage d'un appel à l'aide d'un code de facturation ou de suivi Procédure Étape 1 Appuyez sur le bouton de ligne de votre carnet d'adresses personnel. Étape 2 Accédez au contact, puis sélectionnez le numéro. Le système compose le numéro spécifié. Réponse à un appel Pour répondre à un appel, décrochez le combiné ou utilisez les autres options éventuellement disponibles sur le téléphone. Pour plus d'informations, reportez-vous à... Pour... Procédez comme suit... Combiné, casque et haut-parleur, à la page 59 Appuyez sur la touche ( ) si elle éteinte. Ou,si la touche ( ) est allumée, appuyez sur Répondre ou sur la touche (clignotante). La ligne qui sonne est automatiquementsélectionnée. Contactez votre administrateur système concernant les options permettant de toujours sélectionner la ligne principale. Remarque Si vous utilisez un casque sans fil, reportez-vous à la documentation qui l'accompagne. Répondre avec un casque Combiné, casque et haut-parleur, à la page 59 Appuyez sur , sur Répondre ou sur le bouton (clignotant). La ligne qui sonne est automatiquementsélectionnée. Contactez votre administrateur système concernant les options permettant de toujours sélectionner la ligne principale. Remarque Répondre avec le haut-parleur Mise en attente et reprise des appels, à la page 25 Appuyez sur Répondre ou, si l'appel sonne sur une autre ligne, sur (clignotant). Répondre à un nouvel appel à partir d'un appel déjà connecté Mise en attente et reprise des appels, à la page 25 Répondre à l'aide de la Appuyez sur Répondre. fonction d'appel en attente Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 23 Fonctions d'appel Réponse à un appel Pour plus d'informations, reportez-vous à... Pour... Procédez comme suit... Transfert de l'appel vers le système de messagerie vocale, à la page 29 Transférer un appel vers un Appuyez sur Rvoi Im. système de messagerie vocale Réponse automatique avec casque ou haut-parleur, à la page 61 Se connecter Utilisez la fonction de réponse automatique. automatiquement à des appels Utilisez le Parcage d'appels, le Parcage Parcage d'appels, à la page 44 d'appels dirigé ou le Parcage d'appels dirigé assisté. Récupérer un appel parqué sur un autre téléphone Interception d'appels, à la page 42 Utiliser votre téléphone pour Utilisez la fonction d'interception d'appels. répondre à un appel qui sonne sur un autre téléphone Appels prioritaires, à la page 51 Raccrochez pour mettre fin à l'appel en cours, puis appuyez sur Répondre. Réponse à un appel prioritaire Appels professionnels à l'aide d'un seul numéro de téléphone, à la page 54 Activez Mobile Connect et répondez sur votre téléphone. Si vous avez configuré jusqu'à quatre téléphones IP ou un softphone en tant que lignes partagées, les téléphones supplémentaires s'arrêtent de clignoter lorsque vous activez Mobile Connect et prenez l'appel sur votre téléphone portable. Réponse à un appel depuis votre téléphone portable ou depuis une autre destination distante Astuces • Si les interlocuteurs d'un appel entendent un bip, l'appel est peut-être surveillé ou enregistré. Pour plus d'informations, contactez votre administrateur système. • Si voustravaillez dans un centre d'appel ou dans un environnement de ce type, vous pouvez créer, mettre à jour et supprimer votre propre message d'accueil pré-enregistré qui se lance automatiquement lorsqu'Agent Greeting est configuré sur votre téléphone. Pour plus d'informations, contactez votre administrateur système. • Un utilisateur Chaperon des appels ne peut pas répondre à un appel entrant lorsque les appels sont chaperonnés. Déconnexion de l'appel Pour mettre fin à un appel, raccrochez. Le tableau ci-dessous vous fournit de plus amples informations. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 24 Fonctions d'appel Déconnexion de l'appel Pour... Procédez comme suit... Raccrochez le combiné. Vous pouvez également appuyer sur FinApp. Raccrocher lorsque vous utilisez le combiné Appuyez sur ( ). Pour maintenir le mode casque actif, vous pouvez également appuyer sur FinApp. Raccrocher lorsque vous utilisez un casque Raccrocher Appuyez sur ou sur FinApp. lorsque vous utilisez le haut-parleur Mise en attente et reprise des appels Vous pouvez mettre des appels en attente et les reprendre. Lorsque vous mettez un appel en attente, l'icône d'attente apparaît à droite dansla zone desinformations d'appel et le bouton de ligne correspondant clignote en vert . Dans le cas d'une ligne partagée, le bouton de ligne clignote en vert et le téléphone affiche l'icône de mise en attente locale lorsque vous mettez un appel en attente. Lorsqu'un autre téléphone met un appel en attente, le bouton de ligne clignote en rouge et le téléphone affiche l'icône de mise en attente à distance . Si un autre utilisateur met en attente une ligne partagée, le bouton associé à celle-ci affiche (clignotant). Vous (et toute personne de cette ligne partagée) pouvez reprendre l'appel. Si la fonction Récupérer l'appel en attente est activée sur votre téléphone, un appel que vous avez mis en attente sonne à nouveau au bout d'un certain temps. L'appel “à reprendre” reste en attente jusqu'à ce que vous le repreniez ou que cette fonction expire. Votre téléphone peut vous indiquer la présence d'un appel à reprendre de diverses manières : • En vous avertissant à intervallesréguliers par une sonnerie (ou par un clignotement ou un bip, en fonction de la configuration de votre ligne téléphonique). • En affichant brièvement le message Récupérer l'appel en attente dans la barre d'état, en bas de l'écran du téléphone. • En affichant l'icône animée de récupération d'appel en attente en regard de l'ID de l'appelant mis en attente. • En affichant un bouton de ligne (voyant clignotant, en fonction de l'état de la ligne). Astuces • En règle générale, de la musique est diffusée (lorsque Musique d'attente est configurée) ou un bip retentit au démarrage de la fonction d'attente. • Si vous êtes informé au même moment de l'arrivée d'un appel entrant et d'un appel à reprendre, l'écran de votre téléphone affiche en priorité l'appel entrant (par défaut). Votre administrateur système peut modifier ce paramètre de priorité. • Si vous utilisez une ligne partagée, la fonction Récupérer l'appel en attente permet d'appliquer la sonnerie uniquement au téléphone qui a mis l'appel en attente et non aux autres téléphones qui partagent la ligne. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 25 Fonctions d'appel Mise en attente et reprise des appels • Votre administrateur système détermine le délai entre les alertes de la fonction Récupérer l'appel en attente. • La fonction Attente n'est pas disponible lorsque les appels sont chaperonnés. Mettre un appel en attente Procédure Étape 1 Vérifiez que l'appel concerné est en surbrillance. Étape 2 Appuyez sur . Reprendre un appel mis en attente sur la ligne active Procédure Étape 1 Pour l'appel en attente clignotant, appuyez sur l'un des boutons ci-dessous : , , ou . Étape 2 Si plusieurs appelssont en attente, mettez l'appelsouhaité en surbrillance, puis appuyez Reprendre ou appuyez sur . Plusieurs appels Vous pouvez passer d'un appel à l'autre sur des lignes différentes. Pour... Procédez comme suit... Appuyez sur le bouton (clignotant) de la ligne sur laquelle vous basculez. Passer à un appel en attente sur une autre ligne Appuyez sur (clignote). Les appels en cours sont mis en attente et l'appel sélectionné est repris. Passer d'un appel connecté à un appel qui sonne Mouvement des appels en cours Les procédures ci-dessous donnent des détailssur le transfert d'un appel en cours de votre téléphone de bureau vers votre portable ou vers une autre destination distante. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 26 Fonctions d'appel Mettre un appel en attente Transférer un appel en cours d'un téléphone portable vers un téléphone de bureau qui partage la même ligne (transfert de session) Procédure Étape 1 Sur votre téléphone portable, saisissez le code d'accès de la fonction de transfert de session (par exemple, *74). Contactez votre administrateur système pour obtenir la liste des codes d'accès. Étape 2 Raccrochez le téléphone portable pour le déconnecter sans interrompre l'appel. Étape 3 Appuyez sur la touche Réponse à un appel de votre téléphone de bureau dans un délai de 10 secondes et commencez à parler sur ce téléphone. Votre administrateur système détermine le délai maximum en secondes dont vous disposez pour prendre l'appel sur votre téléphone de bureau. Les autres périphériques Cisco Unified qui partagent la même ligne affichent le message Utilisé à distance. Transférer un appel en cours d'un téléphone portable vers un téléphone de bureau Procédure Étape 1 Raccrochez le téléphone portable pour le déconnecter sans interrompre l'appel. Étape 2 Appuyez sur la touche Réponse à un appel de votre téléphone de bureau dans un délai de 4 secondes et commencez à parler sur ce téléphone. Transférer un appel en cours d'un téléphone portable vers des périphériques Cisco Unified qui partagent la même ligne (transfert de session) Procédure Étape 1 Raccrochez le téléphone portable pour le déconnecter sans interrompre l'appel. Étape 2 Appuyez sur Répondre sur l'un de vos périphériques Cisco Unified dans un délai de 10 secondes et commencez à parler au téléphone. Les autres périphériques Cisco Unified qui partagent la même ligne affichent le message Utilisé à distance. Le délai (en secondes) pour reprendre l'appel dépend de la configuration définie par votre administrateur système. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 27 Fonctions d'appel Transférer un appel en cours d'un téléphone portable vers un téléphone de bureau qui partage la même ligne (transfert de session) Coupure micro Lorsque la coupure micro est activée, vous pouvez entendre vos interlocuteurs, mais ces derniers ne peuvent pas vous entendre. Vous pouvez utiliser cette fonction avec le combiné, le haut-parleur ou le casque. Désactiver ou rétablir le son de l'appel Procédure Étape 1 Pour désactiver le son d'un appel, appuyez sur . Étape 2 Pour rétablir le son d'un appel, appuyez sur . Transfert des appels Le transfert permet de renvoyer un appel connecté. La cible est le numéro vers lequel vous voulez transférer l'appel. Lorsque vous transférez un appel, votre téléphone utilise une nouvelle ligne pour initier le transfert. Astuces • Si le transfert en mode combiné raccroché est activé sur votre téléphone, raccrochez pour mettre fin à l'appel ou appuyez sur , puis raccrocher. • Si le transfert en mode combiné raccroché n'est pas activé sur votre téléphone et si vous raccrochez sans appuyer une nouvelle fois sur , l'appel est mis en attente. • Vous ne pouvez pas utiliser pour renvoyer un appel en attente. Appuyez sur Reprendre pour reprendre l'appel avant de le transférer. • La fonction Transfert n'est pas disponible lorsque les appels sont chaperonnés. • Pour renvoyer un appel sur un système de messagerie vocale, appuyez sur Rvoi Im. Pour plus d'informations, reportez-vous à Transfert de l'appel vers le système de messagerie vocale, à la page 29. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 28 Fonctions d'appel Coupure micro Transfert d'un appel sans parler au destinataire du transfert Procédure Étape 1 À partir d'un appel actif, appuyez sur . Étape 2 Saisissez le numéro cible. Étape 3 Appuyez de nouveau sur le bouton pour terminer l'opération ou sur FinApp pour l'annuler. Étape 4 Si la fonction de transfert en mode combiné raccroché est activée sur votre téléphone, raccrochez pour terminer le transfert. Comment informer le destinataire du transfert avant de lui transférer un appel (transfert par consultation) Procédure Étape 1 À partir d'un appel actif, appuyez sur . Étape 2 Saisissez le numéro cible. Étape 3 Patientez quelques instants pour laisser le temps au destinataire du transfert de répondre. Étape 4 Appuyez de nouveau sur le bouton pour terminer l'opération ou sur FinApp pour l'annuler. Étape 5 Si la fonction de transfert en mode combiné raccroché est activée sur votre téléphone, raccrochez pour terminer le transfert. Transfert de l'appel vers le système de messagerie vocale Vous pouvez utiliser Rvoi Im pour renvoyer un appel en cours, qui sonne ou en attente vers votre système de messagerie vocale. En fonction de la nature de l'appel et de la configuration du téléphone, vous pouvez également utiliser Rvoi Im pour faire basculer l'appel sur la messagerie vocale d'une tierce personne. • Si, initialement, l'appel a été transféré sur un autre téléphone, Rvoi Im permet de renvoyer l'appel vers votre propre système de messagerie vocale ou vers celui de la personne initialement appelée. Votre administrateur système doit au préalable avoir activé cette option pour vous. • Si l'appel vous était directement destiné (sans avoir été transféré ou redirigé vers votre poste) ou si votre téléphone ne prend pas en charge l'option décrite ci-dessus, l'utilisation de Rvoi Im redirige l'appel vers votre système de messagerie vocale. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 29 Fonctions d'appel Transfert d'un appel sans parler au destinataire du transfert Astuces • Si votre téléphone affiche un menu qui disparaît avant que vous n'ayez pu faire votre choix, vous pouvez appuyer à nouveau sur Rvoi Im afin que le menu s'affiche à nouveau. Vous pouvez également contacter votre administrateur système pour définir une valeur de temporisation plus longue. • Lorsque vous transférez un appel en cours de votre téléphone portable vers des périphériques Cisco Unified qui partagent la même ligne (transfert de session), la fonction Rvoi Im est désactivée sur ces derniers. Rvoi Im redevient disponible lorsque l'appel est terminé. • Si l'appel vous était directement destiné (sans avoir été transféré ou redirigé vers votre poste) ou si votre téléphone ne prend pas en charge l'option décrite ci-dessus, l'utilisation de Rvoi Im redirige l'appel vers votre système de messagerie vocale. • Lorsque vous transférez un appel en cours de votre téléphone portable vers des périphériques Cisco Unified qui partagent la même ligne (transfert de session), la fonction Rvoi Im est désactivée sur ces derniers. Rvoi Im redevient disponible lorsque l'appel est terminé. Transférer un appel actif, qui sonne ou en attente vers un système de messagerie vocale Procédure Étape 1 Appuyez sur Rvoi Im. Si aucune option de redirection n'est disponible, l'appel est transféré vers votre système de messagerie vocale. Étape 2 Si des options de redirection sont disponibles, votre téléphone affiche un nouveau menu. Sélectionnez une option pour renvoyer l'appel. Renvoi d'appels Les fonctions de renvoi d'appels permettent de renvoyer tous les appels entrants de votre téléphone vers un autre numéro. Votre administrateur système peut vous autoriser à choisir entre deux types de fonctions de renvoi d'appels : • Transfert des appels sans condition (Renvoi de tous les appels) : s'applique à tous les appels que vous recevez. • Transfert des appels conditionnel (Renvoisisansréponse, Renvoisi occupé, Renvoisi pas de couverture) : s'applique à certains appels que vous recevez, sous certaines conditions. Vous pouvez accéder à la fonction de renvoi de tous les appels sur votre téléphone ou à partir des pages Web Options utilisateur Cisco Unified Communications Manager. Les fonctions de renvoi d'appels conditionnel sont accessibles uniquement à partir des pages Web Options utilisateur. Votre administrateursystème détermine les fonctions de renvoi d'appels auxquelles vous avez accès. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 30 Fonctions d'appel Transférer un appel actif, qui sonne ou en attente vers un système de messagerie vocale Astuces • Saisissez le numéro cible du renvoi d'appels exactement comme si vous le composiez depuis votre téléphone. Par exemple, saisissez un code d'accès ou l'indicatif régional, si nécessaire. • Vous pouvez renvoyer vos appels vers un téléphone analogique traditionnel ou vers un autre téléphone IP, même si votre administrateur système peut limiter la fonction de renvoi d'appels aux numéros utilisés au sein de votre société. • Le renvoi d'appels dépend de la ligne téléphonique. Ainsi, si un appel arrive sur une ligne où la fonction de renvoi d'appels n'est pas activée, le téléphone sonne comme d'habitude et l'appel n'est pas renvoyé. • Votre administrateur système active une fonction d'annulation de renvoi permettant à la personne qui reçoit vos appels transférés de vous joindre. Lorsque l'annulation est activée, les appels passés à partir du téléphone cible vers votre téléphone ne sont pas transférés, mais ils déclenchent une sonnerie sur votre poste. • Il est possible que votre tentative de configuration du renvoi de tousles appels directementsur le téléphone soit refusée si le numéro cible saisi risque de créer une boucle de renvoi d'appel ou de dépasser le nombre maximum de liens autorisés dans une chaîne de renvoi d'appel. • Lorsque vous transférez un appel en cours de votre téléphone portable vers des périphériques Cisco Unified qui partagent la même ligne (transfert de session), la fonction de renvoi d'appels est désactivée sur ces derniers. Cette fonction redevient disponible lorsque l'appel est terminé. • Lorsque le renvoi d'appels est activé, observez : ◦ L'icône de renvoi d'appel en regard du numéro de téléphone principal : , qui se trouve toujours sur la touche de ligne 1. ◦ Le numéro cible du renvoi d'appels dans la ligne d'état. Rubriques connexes Opérations de la page Web Options utilisateur, à la page 80 Paramètres de ligne sur le Web, à la page 90 Configurer et annuler le renvoi de tous les appels à partir du téléphone Procédure Étape 1 Pour configurer le renvoi de tousles appels, appuyez sur RenvTt, puissaisissez un numéro de téléphone cible. Le téléphone affiche des informations visuelles pour indiquer qu'il renvoie tous les appels. Étape 2 Pour annuler le renvoi de tous les appels, appuyez sur RenvTt. L'écran du téléphone supprime les indications visuelles qui indiquent que le numéro de téléphone est renvoyé. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 31 Fonctions d'appel Configurer et annuler le renvoi de tous les appels à partir du téléphone Configuration ou annulation du renvoi d'appels Lorsque la fonction de renvoi d'appels est activée pour une autre ligne que la ligne principale, aucun signal sur le téléphone ne confirme que les appelssont renvoyés. Au lieu de cela, vous devez confirmer vos paramètres dans les pages Web Options utilisateur. Procédure Étape 1 Connectez-vous à vos pages Web Options utilisateur. Étape 2 Accédez à vos paramètres de renvoi d'appels. Ne pas déranger La fonction NPD (Ne pas déranger) désactive toutes les notifications sonores et visuelles des appels entrants. L'activation de cette fonction sur votre téléphone requiert l'intervention de votre administrateur système. Lorsque les fonctions NPD et Transfert des appels sont activées sur votre téléphone, les appels sont renvoyés immédiatement et l'appelant n'entend pas de tonalité d'occupation. Les interactions de la fonction NPD avec d'autres types des appels sont : • NPD n'affecte pas les appels intercom ni les appels prioritaires non-intercom. • Si les fonctions NPD et Réponse automatique sont activées, seuls les appels intercom font l'objet d'une réponse automatique. • Lorsque voustransférez un appel en cours de votre téléphone portable vers destéléphones Cisco Unified qui partagent la même ligne (transfert de session), le téléphone désactive la fonction NPD. Cette fonction redevient disponible lorsque l'appel est terminé. Activation et désactivation de la fonction NPD Procédure Étape 1 Pour activer la fonction NPD, appuyez sur NPD. “Ne pas déranger” s'affiche sur le téléphone, le témoin NPD s'éclaire (fixe) et la sonnerie est désactivée. Étape 2 Pour désactiver de nouveau la fonction NPD, appuyez sur NPD. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 32 Fonctions d'appel Configuration ou annulation du renvoi d'appels Configuration des paramètres NPD Si votre administrateur système a configuré les paramètres NPD de manière à ce qu'ils s'affichent dans la page Options utilisateur, procédez comme suit : Procédure Étape 1 Connectez-vous à vos pages Web Options utilisateur. Étape 2 Dans le menu déroulant, choisissez Options utilisateur > Périphérique. Étape 3 Vous pouvez définir les options ci-dessous : • Ne pas déranger : active ou désactive la fonction NPD. • Option NPD : choisissez Refus d'appel (pour désactiver toutes les notifications sonores et visuelles) ou Sonnerie désactivée (pour désactiver uniquement la sonnerie). • Alerte d'appel entrant avec la fonction NPD (s'applique aux deux configurations de l'option NPD) : configurez l'alerte sur Bip seulement ou sur Clignotement seulement, désactivez l'alerte ou choisissez “Aucun” (pour utiliser le mode “Alerte” configuré par votre administrateur système). Conférences Votre téléphone IP Cisco Unified permet de réunir trois personnes ou plus dans une même conversation téléphonique en établissant une conférence. Vous pouvez créer une conférence de différentes manières, en fonction de vos besoins et des fonctions disponibles sur votre téléphone. • Conférence : permet de créer une conférence standard (ad hoc) en appelant chaque participant. Utilisez la touche Conférence ou le bouton Conférence. La fonction Conférence est disponible sur la plupart des téléphones. • Joindre : permet de créer une conférence standard (ad hoc) en combinant des appels existants. Utilisez la touche Joindre. • Meet-Me : permet de créer ou de joindre une conférence en appelant un numéro de conférence. Utilisez la touche ou le bouton Meet-Me. Conférence ad hoc La fonction Conférence permet d'appeler chaque participant. La fonction Conférence est disponible sur la plupart des téléphones. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 33 Fonctions d'appel Configuration des paramètres NPD Astuces • S'il vous arrive souvent de joindre plus de deux interlocuteurs dans une seule conférence, vous rechercherez peut-être pratique de sélectionner tout d'abord les appels à joindre, puis d'appuyer sur Joindre pour terminer l'opération. • Une fois l'opération Joindre terminée, l'ID de l'appelant devient “Conférence.” • Un utilisateur Chaperon des appels peut mettre en conférence uniquement le premier appelant. Les autres appelants peuvent être ajoutés à la conférence par les autres participants. • Pour obtenir la liste des participants à la conférence, reportez-vous à Liste des participants à la conférence, à la page 37. Création d'une conférence en appelant chacun des participants Procédure Étape 1 À partir d'un appel connecté, appuyez sur Conf. ou sur Conférence. Il est possible que vous deviez au préalable appuyer sur la touche Autres pour afficher l'option Conf. Étape 2 Saisissez le numéro de téléphone du participant. Étape 3 Attendez que l'appel soit établi. Étape 4 Appuyez de nouveau sur Conf. ou sur Conférence pour ajouter le participant à votre conversation. Étape 5 Répétez cette procédure pour ajouter d'autres participants. Ajout de participants à la conférence Votre administrateur système détermine si vous pouvez ajouter ou supprimer des participants si vous n'êtes pas l'organisateur de la conférence. Procédure Étape 1 À partir d'un appel connecté, appuyez sur Conf. ou sur Conférence. Il est possible que vous deviez au préalable appuyer sur la touche Autres pour afficher l'option Conf. Étape 2 Saisissez le numéro de téléphone du participant. Étape 3 Attendez que l'appel soit établi. Étape 4 Appuyez de nouveau sur Conf. ou sur Conférence pour ajouter le participant à votre conversation. Étape 5 Répétez cette procédure pour ajouter d'autres participants. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 34 Fonctions d'appel Ajout de participants à la conférence Comment se joindre à la conférence La fonction Joindre permet de combiner plusieurs appels existants afin de créer une conférence à laquelle vous participez. Astuces • S'il vous arrive souvent de joindre plus de deux interlocuteurs dans une seule conférence, vous rechercherez peut-être pratique de sélectionner tout d'abord les appels à joindre, puis d'appuyer sur Joindre pour terminer l'opération. • Une fois l'opération Joindre terminée, l'ID de l'appelant devient Conférence. • Pour obtenir la liste des participants à la conférence, reportez-vous à Liste des participants à la conférence, à la page 37. Joindre des appels existants sur une même ligne téléphonique Procédure Étape 1 À partir d'un appel en cours, appuyez sur Joindre. Il est possible que vous deviez au préalable appuyer sur la touche Autres pour afficher l'option Joindre. Étape 2 Appuyez sur le bouton de ligne clignotant vert des appels que vous voulez ajouter à la conférence. L'un des événements ci-dessous se produit : a) Les appels sont joints. b) Une fenêtre s'ouvre sur l'écran du téléphone ; celle-ci permet de sélectionner les appels à joindre. Mettez les appels en surbrillance, puis appuyez sur Sélect., puis sur Joindre pour terminer l'opération. Comment joindre des appels existants sur plusieurs lignes téléphoniques Procédure Étape 1 À partir d'un appel en cours, appuyez sur Joindre. Il est possible que vous deviez au préalable appuyer sur la touche Autres pour afficher l'option Joindre. Étape 2 Appuyez sur le bouton de ligne clignotant vert des appels que vous voulez ajouter à la conférence. Si votre téléphone ne prend pas en charge la fonction Joindre dansle cas des appelssur plusieurs lignes, transférez les appels vers une ligne unique. Vous pourrez alors utiliser la fonction Joindre. Remarque Étape 3 Si une fenêtre s'ouvre sur l'écran de votre téléphone et vous invite à sélectionner les appels à joindre, mettez les appels en surbrillance, appuyez sur Sélectionner, puis appuyez sur Joindre pour terminer l'opération. Les appels sont joints. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 35 Fonctions d'appel Comment se joindre à la conférence Conférence Meet-Me La conférence Meet-Me permet de démarrer une conférence ou de s'y connecter en composant son numéro. Astuce • Si vous composez le numéro d'une conférence Meet-Me depuis un téléphone non sécurisé, celui-ci affiche Périphérique non autorisé.Pour plus d'informations, reportez-vous à Appelssécurisés, à la page 49. • Une conférence Meet-Me se termine une fois que tous les participants ont raccroché. • Si l'organisateur de la conférence se déconnecte, la conférence continue jusqu'à ce que tousles participants aient raccroché. Démarrage d'une conférence Meet-Me Les participants ne peuvent pas joindre la conférence tant que l'initiateur n'a pas démarré la conférence. Procédure Étape 1 Demandez un numéro de téléphone Meet-Me à votre administrateur système. Étape 2 Communiquez ce numéro à tous les participants. Étape 3 Lorsque vous êtes prêt à démarrer la réunion, décrochez le combiné pour obtenir une tonalité, puis appuyez sur Meet-Me. Étape 4 Composez le numéro de la conférence Meet-Me. Pour joindre la conférence, les utilisateurs peuvent maintenant composer le numéro Meet-Me. Comment se joindre à une conférence Meet-Me Procédure Étape 1 Composez le numéro de la conférence Meet-Me que vous a communiqué l'initiateur de la conférence. Étape 2 Si vous entendez une tonalité d'occupation, l'initiateur de la conférence n'a pas encore rejoint la conférence. Attendez une minute, puis essayez de rappeler. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 36 Fonctions d'appel Conférence Meet-Me Liste des participants à la conférence Lors d'une conférence standard (ad hoc), vous pouvez afficher la liste des participants et supprimer des participants. Les participants sont affichés dans l'ordre dans lequel ils rejoignent la conférence ; les derniers à la joindre apparaissent en tête de liste. La liste des participants à la conférence (ListConf), peut afficher jusqu'à 16 personnes. Bien qu'il soit possible d'ajouter autant de participants qu'un pont de conférence, puisse en prendre en charge, ListConf n'affichera jamais plus de 16 participants. Au fur et à mesure que les participants rejoignent la conférence, ListConf affiche le nom des 16 dernières personnes arrivées. Remarque Pour ajouter plus de participants, reportez-vous à Ajout de participants à la conférence, à la page 34 Contrôle de la conférence à l'aide de la liste des participants La liste des participants à la conférence ListConf peut afficher jusqu'à 16 personnes. Bien qu'il soit possible d'ajouter autant de participants qu'un pont de conférence peut en prendre en charge, ListConf n'affichera jamais plus de 16 participants. Au fur et à mesure que les participants rejoignent la conférence, ListConf affiche le nom des 16 dernières personnes arrivées. Procédure Étape 1 Appuyez sur ListConf ou sur Liste de conférence. Les participants sont affichés dans l'ordre dans lequel ils rejoignent la conférence ; les derniers à la joindre apparaissent en tête de liste. Étape 2 Pour obtenir une liste à jour des participants à la conférence, appuyez sur MàJ. Étape 3 Poursavoir qui a initié la conférence, recherchez le participant qui apparaît au bas de la liste, avec un astérisque (*) en regard de son nom. Étape 4 Pour supprimer un participant de la conférence, mettez le nom du participant en surbrillance, puis appuyez sur Supprimer. Étape 5 Pour déconnecter le dernier participant ajouté à la conférence, appuyez sur SupDerA. Vous ne pouvez exclure des participants que si vous êtes l'initiateur de la conférence. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 37 Fonctions d'appel Liste des participants à la conférence Vérification de la sécurité de la conférence Procédure Étape 1 Pour vérifier la sécurité de la conférence, appuyez sur ListCfn ou sur Liste de conférence Étape 2 Pour vérifier si une conférence est sécurisée, recherchez l'icône ou après “Conférence” sur l'écran du téléphone. Étape 3 Pour vérifier qu'un participant appelle depuis un téléphone sécurisé, recherchez l'icône ou en regard du nom du participant sur l'écran du téléphone. Appels intercom Vous pouvez passer un appel intercom à destination d'un téléphone qui répond automatiquement à l'appel en mode haut-parleur et coupe le micro. L'appel intercom unidirectionnel permet d'envoyer un message court au destinataire. Le son est lu dans le combiné ou dans le casque, si l'un d'entre eux est en cours d'utilisation. Si le destinataire a déjà un appel en cours, celui-ci continue simultanément. Lorsque vous entendez une tonalité d'alerte intercom, vous pouvez choisir une des options ci-dessous : • Écouter l'appelant, son microphone étant coupé (il peut écouter l'appelant, mais celui-ci ne peut pas l'entendre). • Comment mettre fin à l'appel intercom en appuyant sur la touche FinApp. Cette option permet de ne pas écouter le message. • Parler à l'appelant à l'aide du bouton intercom actif en mode combiné, casque ou haut-parleur. L'appel intercom devient une connexion bidirectionnelle permettant de communiquer avec l'appelant. Lorsque vous utilisez la fonction intercom, n'oubliez pas les points ci-dessous : • Depuis une ligne intercom, vous ne pouvez appeler qu'une autre ligne intercom. • Vous ne pouvez utiliser qu'une seule ligne intercom à la fois. • Vous pouvez recevoir et émettre des appels intercom lorsque votre appel actif est surveillé ou enregistré. • Vous ne pouvez pas mettre un appel intercom en attente. Si vous vous connectez quotidiennement au même téléphone à l'aide de votre profil Cisco Extension Mobility, assurez-vous que votre administrateur système affecte la grille des boutons du téléphone à ce profil et qu'il définisse le téléphone comme périphérique intercom par défaut pour la ligne intercom. Remarque Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 38 Fonctions d'appel Appels intercom Passage d'un appel intercom vers le numéro intercom préconfiguré Procédure Étape 1 Appuyez sur (ligne intercom cible). Étape 2 Lorsque vous entendez la tonalité d'alerte intercom, commencez à parler. Passage d'un appel intercom vers un numéro intercom Procédure Étape 1 Appuyez sur ( ). Étape 2 Saisissez le numéro intercom cible ou appuyez sur le numéro simplifié cible. Étape 3 Lorsque vous entendez la tonalité d'alerte intercom, commencez à parler. Réception d'un appel intercom Procédure Lorsque vous entendez la tonalité d'alerte intercom, vous pouvez traiter l'appel de l'une des manières ci-dessous: • Écouter le message par voie audio unidirectionnelle. • Parler à l'appelant en appuyant sur le bouton (ligne intercom active). • Mettre la ligne intercom en surbrillance et appuyer sur FinApp. Gestion avancée des appels Lestâches de gestion avancée des appels comprennent desfonctionsspéciales que votre administrateursystème peut configurer sur votre téléphone, en fonction de vos besoins en la matière et de votre environnement de travail. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 39 Fonctions d'appel Passage d'un appel intercom vers le numéro intercom préconfiguré Numérotation simplifiée La numérotation simplifiée permet de saisir un code, d'appuyer sur un bouton ou de sélectionner un élément de l'écran du téléphone pour passer un appel. En fonction de sa configuration, votre téléphone peut prendre en charge plusieurs fonctions de numérotation simplifiée : • Boutons de numérotation simplifiée • Numérotation abrégée • Numéros rapides Pour configurer des boutons de numérotation rapide et de numérotation rapide, vous devez accéder aux pages Web Options utilisateur. Pour configurer des numéros rapides, vous devez accéder à la fonction de répertoire personnel. Votre administrateur système peut également configurer des fonctions de numérotation simplifiée à votre attention. Rubriques connexes Opérations de la page Web Options utilisateur, à la page 80 Répertoire personnel, à la page 72 Fonctions de supervision de ligne occupée, à la page 48 Passage d'un appel à l'aide des boutons de numérotation simplifiée Si votre téléphone prend en charge la fonction de numérotation simplifiée d'affichage de ligne occupée (FLO), vous pouvez savoir si le numéro simplifié est occupé avant de le composer. Procédure Étape 1 Configurez les boutons de numérotation simplifiée. Étape 2 Pour passer un appel, appuyez sur ( ). Passage d'un appel à l'aide de la numérotation simplifiée avec le combiné raccroché Procédure Étape 1 Configurez des codes de numérotation simplifiée. Étape 2 Pour passer un appel, saisissez le code de numérotation simplifiée, puis appuyez sur NumAbr. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 40 Fonctions d'appel Numérotation simplifiée Passage d'un appel avec la numérotation simplifiée avec le combiné décroché Procédure Étape 1 Décrochez le combiné. Étape 2 Appuyez sur la touche NumAbr, puis saisissez le code de numérotation simplifiée à l'aide du clavier. Étape 3 Appuyez de nouveau sur la touche NumAbr. Établir une conférence avec la numérotation simplifiée avec le combiné décroché Procédure Étape 1 Appuyez sur la touche Conf. L'utilisateur entend une tonalité. Étape 2 Appuyez sur la touche NumAbr, puis saisissez le code de numérotation simplifiée à l'aide du clavier. Étape 3 Appuyez de nouveau sur la touche NumAbr. Étape 4 Appuyez de nouveau sur la touche Conf. Transférer un appel avec la numérotation simplifiée avec le combiné décroché Procédure Étape 1 Appuyez sur la touche Transfert. L'utilisateur entend une tonalité. Étape 2 Appuyez sur la touche NumAbr, puis saisissez le code de numérotation simplifiée à l'aide du clavier. Étape 3 Appuyez de nouveau sur la touche NumAbr. Étape 4 Appuyez de nouveau sur la touche Transfert. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 41 Fonctions d'appel Numérotation simplifiée Passage d'un appel avec la numérotation simplifiée avec le combiné décroché dans un appel en attente Procédure Étape 1 Appuyez sur la touche NvAppel. Étape 2 Appuyez sur la touche NumAbr, puis saisissez le code de numérotation simplifiée à l'aide du clavier. Étape 3 Appuyez de nouveau sur la touche NumAbr. Passage d'un appel à l'aide de la numérotation simplifiée Procédure Étape 1 Créez une entrée du carnet d'adresses personnel et affectez-lui un code de numérotation simplifiée. Étape 2 Pour passer un appel, accédez au service de numérotation simplifiée de votre téléphone. Interception d'appels Grâce à cette fonction, vous pouvez renvoyer un appel qui sonne sur le téléphone d'un collègue vers votre appareil pour y répondre. Vous pouvez utiliser la fonction Interception d'appels si vous êtes plusieurs à gérer les appels. Astuces • Si plusieurs appels peuvent être interceptés, votre téléphone intercepte d'abord l'appel le plus ancien (l'appel qui sonne depuis le plus longtemps). • Si vous appuyez sur GrpIntr ou Interception d'appels de groupe, puis saisissez un numéro de ligne, votre téléphone intercepte l'appel qui sonne sur cette ligne (le cas échéant). • Si vous avez plusieurs lignes et voulez prendre l'appel sur une ligne secondaire, appuyez sur le bouton de la ligne souhaitée, puis sur une touche ou un bouton d'interception d'appel. • En fonction de la configuration du téléphone, vous pouvez recevoir un signal sonore ou visuel à propos d'un appel vers votre groupe de prise d'appel. • Si vous utilisez la fonction d'interception d'appels FLO sur votre téléphone, reportez-vous à Fonctions de supervision de ligne occupée, à la page 48. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 42 Fonctions d'appel Interception d'appels Réponse à un appel entrant qui sonne sur un autre poste de votre groupe d'interception d'appels Procédure Étape 1 Appuyez sur la touche Intrcpt. Vous devrez peut-être décrocher pour afficher la touche. Si votre téléphone prend en charge l'interception automatique des appels, vous êtes maintenant connecté à l'appel. Étape 2 Si l'appel sonne, appuyez sur Répondre pour vous y connecter. Réponse à un appel qui sonne sur un autre poste en dehors de votre groupe de prise d'appel Procédure Étape 1 Appuyez sur la touche GrpIntr. Vous devrez peut-être décrocher pour afficher la touche. Étape 2 Saisissez le numéro d'interception d'appels de groupe. Si votre téléphone prend en charge l'interception automatique des appels, vous êtes maintenant connecté à l'appel. Étape 3 Si l'appel sonne, appuyez sur Répondre pour vous y connecter. Réponse à un appel qui sonne sur un autre poste dans le groupe ou dans le groupe associé Procédure Étape 1 Appuyez sur la touche AGrpIntr. Vous devrez peut-être décrocher pour afficher la touche. Si votre téléphone prend en charge l'interception automatique des appels, vous êtes maintenant connecté à l'appel. Étape 2 Si l'appel sonne, appuyez sur Répondre pour vous y connecter. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 43 Fonctions d'appel Interception d'appels Réponse à un appel qui sonne sur un poste donné (numéro de ligne) Procédure Étape 1 Appuyez sur la touche GrpIntr. Vous devrez peut-être décrocher pour afficher la touche. Étape 2 Saisissez le numéro de ligne qui correspond à l'appel que vous voulez intercepter. Par exemple, si l'appel à intercepter sonne sur la ligne 12345, saisissez 12345. Si votre téléphone prend en charge l'interception automatique des appels, vous êtes maintenant connecté à l'appel. Étape 3 Si l'appel sonne, appuyez sur Répondre pour vous y connecter. Parcage d'appels Si vous voulez stocker un appel, vous pouvez le parquer afin que les utilisateurs puissent le récupérer sur un autre poste de téléconférence du système Cisco Unified Communications Manager (par exemple, le poste de téléconférence d'un collègue ou celui d'une salle de conférence). Vous pouvez parquer un appel à l'aide des méthodes ci-dessous. • Parcage d'appels : utilisez la touche Parquer pour stocker l'appel. Le téléphone affiche le numéro de parcage où le système a stocké l'appel. Vous devez enregistrer ce numéro et l'utiliser pour récupérer l'appel. • Parcage d'appels dirigé : Appuyez sur la touche Transfert pendant un appel. Pour stocker un appel, composez le numéro de parcage d'appels dirigé, puis appuyez de nouveau sur Transfert. • Parcage d'appels dirigé assisté : Utilisez le bouton Parcaged'appelsdirigé assisté affichant un indicateur d'état de ligne inactif. Pour récupérer un appel à partir de l'un des téléphones IP Cisco Unified de votre réseau, appuyez sur le bouton Parcage d'appels dirigé assisté clignotant. Astuces • Vous disposez d'un délai limité pour récupérer l'appel parqué avant qu'il ne recommence à sonner sur le poste auquel il était destiné à l'origine. Pour plus d'informations, contactez votre administrateur système. • Votre administrateur système peut affecter des boutons de parcage d'appel dirigé à des boutons de ligne disponibles sur le téléphone. • Vous pouvez composer des numéros de parcage d'appels dirigé si vous n'avez pas de boutons de parcage d'appels dirigé sur le téléphone. Vous ne pourrez toutefois pas voir l'état du numéro de parcage d'appels dirigé. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 44 Fonctions d'appel Parcage d'appels Stocker et récupérer l'appel actif à l'aide du Parcage d'appels Procédure Étape 1 Au cours d'un appel, appuyez sur Parquer. Il est possible que vous deviez au préalable appuyer sur la touche Autres pour afficher l'option Parquer. Étape 2 Notez le numéro de parcage affiché sur l'écran du téléphone. Étape 3 Raccrochez. Étape 4 Pour intercepter l'appel parqué, saisissez le numéro de parcage d'appels à partir de n'importe quel téléphone IP Cisco Unified de votre réseau. Diriger et stocker un appel actif vers un numéro de parcage d'appels dirigé Procédure Étape 1 Au cours d'un appel, appuyez sur . Étape 2 Composez le numéro de parcage d'appels dirigé. Étape 3 Appuyez de nouveau sur Transfert pour mettre fin au stockage de l'appel. Récupérer un appel parqué depuis un numéro de parcage d'appels dirigé Procédure Étape 1 Depuis un téléphone IP Cisco Unified de votre réseau, saisissez le préfixe de récupération de parcage, puis Étape 2 Effectuez l'une des opérations ci-dessous : • Composez le numéro de parcage d'appels dirigé. • Appuyez sur le bouton (clignotant) ( ) pour vous connecter à l'appel. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 45 Fonctions d'appel Parcage d'appels Envoi, stockage et récupération un appel actif vers un numéro de parcage d'appels dirigé Procédure Étape 1 Lors d'un appel, appuyez sur le bouton Parcage d'appels dirigé assisté affichant un indicateur d'état de ligne inactif . Étape 2 Pour récupérer l'appel, appuyez sur le bouton Parcage d'appels dirigé assisté qui clignote. Si votre administrateur n'a pas configuré de numéro de répertoire de récupération, l'appel parqué est récupéré sur le téléphone de parcage de l'appel. Groupes de recherche Si votre organisation reçoit de nombreux appels entrants, il est possible que vous fassiez partie d'un groupe de recherche, lequel inclut une série de numéros d'annuaire qui se partagent la charge des appels entrants. Lorsque le premier numéro d'annuaire du groupe de recherche est occupé, le système recherche le prochain numéro d'annuaire disponible dans le groupe et dirige les appels vers ce téléphone. Lorsque vous êtes loin de votre téléphone, vous pouvez vous déconnecter des groupes de recherche afin que le téléphone ne sonne pas. Astuce • Vous déconnecter des groupes de recherche n'empêche pas les appels autres que ceux des groupes de recherche de sonner sur votre téléphone. • Une fois connecté, le bouton Groupe de recherche est allumé. Connexion et déconnexion des groupes de recherche Procédure Étape 1 Appuyez sur Groupmt. Vous êtes maintenant connecté au groupe de recherche. Étape 2 Appuyez sur Groupmt. L'écran du téléphone affiche Déconnecté du groupement. Lignes partagées Votre administrateur système peut vous demander d'utiliser une ligne partagée si : • Vous disposez de plusieurs téléphones et vous voulez avoir un seul numéro • Vous partagez des tâches de gestion des appels avec des collègues Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 46 Fonctions d'appel Groupes de recherche • Vous gérez des appels pour le compte d'un manager Icône Utilisé à distance L'icône Utilisé à distance s'affiche lorsqu'un appel est en cours sur un téléphone qui partage votre ligne. Vous pouvez émettre et recevoir des appels normalement sur la ligne partagée, même si l'icône Utilisé à distance s'affiche. Informations sur les appels et l'insertion Les téléphones qui partagent une ligne affichent des informations sur les appels émis et reçus sur la ligne partagée. Ces informations incluent notamment l'ID de l'appelant et la durée d'appel (pour les exceptions, reportez-vous à Confidentialité, à la page 47). Sur une ligne partagée, les utilisateurs d'autres modèles de téléphones IP Cisco Unified sont susceptibles de se joindre à votre appel actif. Par défaut, votre téléphone ne prend pas en charge cette fonction d'insertion. Si vous voulez l'utiliser, contactez votre administrateur système. Dans le cas contraire, vous pouvez activer la fonction de confidentialité pour empêcher vos collègues de se joindre à vos appels. Confidentialité Si vous ne voulez pas que les collègues qui partagent votre ligne puissent afficher les informations sur vos appels, activez la fonction de confidentialité. Vos collègues ne peuvent alors pas savoir qui vous appelez, ni se joindre à vos appels. Informations ligne partagée Sur une ligne partagée, vous pouvez afficher des informations sur les appels qui y ont lieu, récupérer un appel mis en attente par l'un de vos collègues et empêcher l'insertion. Pour... Procédez comme suit... Recherchez l'icône Utilisé à distance en regard d'un bouton de ligne rouge (fixe). Savoirsi la ligne partagée est en cours d'utilisation Appuyez sur le bouton de ligne rouge (fixe) correspondant à la ligne utilisée à distance. Tout appel non confidentiel est affiché dans la zone d'activité des appels de l'écran du téléphone. Afficher les détails concernant les appels en cours sur la ligne partagée Appuyez sur le bouton de ligne rouge (clignotant) correspondant à la ligne utilisée à distance. Récupérer un appel en attente sur une ligne partagée Astuces • Si vous partagez la ligne avec un téléphone dont la confidentialité est activée, vous pouvez passer et recevoir des appels normalement sur cette ligne. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 47 Fonctions d'appel Lignes partagées • La fonction de confidentialité s'applique à toutes les lignes partagées de votre téléphone. Si vous avez plusieurs lignes partagées et si la fonction de confidentialité est activée, vos collègues ne peuvent donc afficher les appels sur aucune de ces lignes et ne peuvent pas non plus s'y connecter. Empêcher ou autoriser les autres personnes à afficher ou vos appels sur une ligne partagée ou à s'y insérer Procédure Étape 1 Pour empêcher d'autres personnes d'afficher vos appels sur une ligne partagée ou de s'y insérer. a) Appuyez sur Confidentiel ( ). b) Pour vérifier que la confidentialité est activée, recherchez l'icône de fonction activée en regard d'un bouton de ligne orange . Étape 2 Pour autoriser les autres personnes à afficher vos appels sur une ligne partagée ou à s'y insérer. a) Appuyez sur Confidentiel ( ). b) Pour vérifier que la confidentialité est désactivée, recherchez l'icône de fonction désactivée en regard d'un bouton de ligne éteint . Fonctions de supervision de ligne occupée La Fonction de ligne occupée (FLO) permet d'afficher l'état d'une ligne téléphonique associée à un bouton de numérotation simplifiée, un journal des appels ou une entrée de répertoire sur votre téléphone.Si vous utilisez la fonction d'interception d'appels FLO, vous pouvez répondre à un appel qui sonne sur la ligne que vous surveillez. Votre administrateur système détermine les fonctions FLO configurées sur votre téléphone. Pour... Procédez comme suit... Recherchez les indicateurs FLO en regard du numéro de la ligne : • La ligne est en cours d'utilisation. • La ligne est inactive. Consulter l'état d'une ligne figurant dans un journal des appels ou un répertoire Recherchez les indicateurs FLO en regard du numéro de la ligne : • La ligne est en cours d'utilisation. • La ligne est inactive. • Une ligne surveillée par FLO sonne ( Interception d'appels FLO) Afficher l'état d'une ligne de numérotation simplifiée Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 48 Fonctions d'appel Lignes partagées Astuces • Il est possible qu'un indicateur sonore retentisse sur votre téléphone lorsqu'un appel sonne sur la ligne surveillée (Interception d'appels FLO uniquement). • La fonction d'interception d'appels FLO répond d'abord à l'appel le plus ancien (si plusieurs appels sonnent sur la ligne surveillée). • Si vous appuyez sur le bouton d'interception d'appels FLO alors que la ligne surveillée ne sonne pas, votre téléphone compose le numéro simplifié de la ligne. Utiliser l'interception d'appels FLO pour répondre à un appel qui sonne Procédure Étape 1 Si la ligne actuelle sonne, appuyez sur le bouton Interception d'appels FLO. . L'appel est redirigé vers la ligne suivante disponible sur votre téléphone. Étape 2 Pour indiquer une ligne particulière, appuyez d'abord sur un bouton de ligne, puis sur le bouton FLO. Si votre téléphone prend en charge l'interception automatique des appels, l'appel est connecté automatiquement. Étape 3 Si l'appel sonne sur votre téléphone, répondez-y. Appels sécurisés En fonction de la façon dont l'administrateur a configuré votre système téléphonique, votre téléphone peut prendre en charge l'émission et la réception des appels sécurisés. Pour déterminer si vous pouvez passer des appels sécurisés, contactez votre administrateur. Votre téléphone peut prendre en charge les types d'appels ci-dessous. • Appel authentifié : les identités des téléphones qui participent à l'appel ont été vérifiées. • Appel chiffré : le téléphone reçoit et transmet des signaux audio chiffrés (votre conversation) sur le réseau Cisco Unified Communications Manager. Les appels chiffrés sont authentifiés. • Appel protégé : le téléphone est un appareil sécurisé (chiffré et approuvé) sur le serveur Cisco Unified Communications Manager ; il est configuré comme “Périphérique protégé” dans Cisco Unified Communications Manager Administration. Lorsque la fonction “Jouer tonalité de sécurisation” est activée (vraie) dans Cisco Unified Communications Manager Administration, le téléphone protégé émet une tonalité de sécurisation ou non-sécurisation au début de l'appel : ◦ Lorsque lessupportssécurisés de bout en boutsont établis via le protocoleSRTP(Secure Real-Time TransferProtocol) et que l'état de l'appel est sécurisé, le téléphone émet une tonalité de sécurisation (trois longs bips entrecoupés de courtes pauses). ◦ Lorsque les supports non sécurisés de bout en bout sont établis via le protocole RTP (Real-Time Protocol) et que l'état de l'appel est non sécurisé, le téléphone émet une tonalité de non-sécurisation (six bips courts entrecoupés de courtes pauses). Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 49 Fonctions d'appel Appels sécurisés Lorsque la fonction Jouer tonalité de sécurisation est désactivée (fausse), vous n'entendez aucune tonalité. • Appel non protégé : le téléphone n'est pas configuré comme “Périphérique protégé” dans Cisco Unified Communications Manager. Le téléphone émet une tonalité de non-sécurisation. • Appel non sécurisé : le téléphone n'est pas protégé sur le serveur Cisco Unified Communications Manager et l'état de l'appel n'est pas sécurisé. Pour plus d'informations, contactez votre administrateur système. Le tableau ci-dessous décrit les moyens de vérifier les informations d'appel. Pour... Procédez comme suit... Regardez si l'une des icônes de sécurité ci-dessous apparaît en haut à droite de la zone d'activité des appels, en regard de l'indicateur de durée d'appel : Conférence ou appel authentifié Conférence ou appel chiffré Conférence ou appel non sécurisé Contrôler le niveau d'un appel ou d'une conférence Vérifiez que vous entendez bien la tonalité de sécurisation au début de l'appel. • État de l'appel sécurisé : lorsque le téléphone est protégé, que la fonction “Jouer tonalité de sécurisation” est activée et que l'état de l'appel est sécurisé, le téléphone protégé joue une tonalité de sécurisation en début d'appel (trois bips longs entrecoupés de pauses). L'icône en forme de verrou indique également que l'appel est sécurisé. • État de l'appel non sécurisé : lorsque le téléphone est protégé, que la fonction “Jouer tonalité de sécurisation” est activée et que l'état de l'appel est non sécurisé, le téléphone protégé joue une tonalité de non-sécurisation en début d'appel (six bips courts entrecoupés de courtes pauses). L'icône de lecture en forme de flèche indique également que l'appel n'est pas sécurisé. Pour plus d'informations, contactez votre administrateur système. Vérifier que la connexion du téléphone (état de l'appel) est sécurisée Des interactions, des restrictions et des limites peuvent affecter l'exécution des fonctions de sécurité de votre téléphone. Pour plus d'informations, contactez votre administrateur système. Remarque Un périphérique en cours d'appel est sécurisé ou n'est pas sécurisé. Les icônes en forme de bouclier ou de verrou ne s'affichent pas sur l'écran des téléphones IP Cisco Unified lorsqu'un appel est passé vers ou depuis un périphérique non approuvé, même si l'appel est sans danger. Remarque Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 50 Fonctions d'appel Appels sécurisés Suivi des appels douteux Si vous faites l'objet d'appels douteux ou malveillants, votre administrateur système peut ajouter la fonction d'identification des appels malveillants (IDAM) à votre téléphone. Cette fonction permet d'identifier un appel actif douteux, ce qui lance une série de messages automatisés de suivi et de notification. Informer l'administrateur système d'un appel douteux ou malveillant Procédure Appuyez sur IDAM. Vous entendez une tonalité et le message IDAM réussi s'affiche sur votre téléphone. Votre administrateur reçoit la notification sur l'appel avec desinformations complémentaires pour prendre les mesures appropriées. Appels prioritaires Dans certains environnements spécialisés, tels que les bureaux de l'Armée ou de l'État, il est possible que vous ayez besoin de passer et de recevoir des appels urgents ou critiques. Si vous avez besoin de ce traitement spécialisé des appels, votre administrateur système peut ajouter une fonction de préséance et de préemption à plusieurs niveaux (Multilevel Precedence and Preemption, MLPP) sur votre téléphone. Gardez ces définitions à l'esprit : • La préséance indique la priorité associée à un appel. • La préemption est le processus qui permet de mettre fin à un appel existant dont la priorité est inférieure, tout en acceptant un appel de priorité supérieure envoyé vers votre téléphone. Si vous... Procédez comme suit... Contactez votre administrateur système pour obtenir la liste des numéros de préséance correspondant aux appels. Voulez pouvoir choisir le niveau de priorité (préséance) d'un appel sortant Saisissez le numéro d'accès MLPP (fourni par votre administrateur système), puis le numéro de téléphone. Voulez passer un appel prioritaire (qui a la préséance) Vous recevez un appel prioritaire (qui a la préséance). Une icône MLPPs'affiche sur l'écran de votre téléphone pour indiquer le niveau de priorité de l'appel. Entendez une sonnerie différente (plus simplifié que d'habitude) ou une tonalité d'attente spéciale Voulez afficher le niveau de priorité Recherchez l'icône MLPP sur l'écran de votre téléphone : d'un appel Appel prioritaire Appel d'importance moyenne (immédiat) Appel très important (simplifié) Appel de la plus haute importance (suppression simplifiée) ou appel prioritaire Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 51 Fonctions d'appel Suivi des appels douteux Les appels les plus importants s'affichent en haut de la liste des appels.Si aucune icône MLPPn'apparaît, il s'agit d'un appel normal (routine). Cela signifie que vous ou votre interlocuteur recevez un appel qui est prioritaire sur l'appel en cours. Raccrochez immédiatement pour permettre à l'appel plus important de sonner sur votre téléphone. Entendez une tonalité continue qui interrompt votre appel Astuces • Lorsque vous passez ou que vous recevez un appel compatible MLPP, vous entendez une sonnerie et une tonalité d'attente spéciales, différentes des sonnerie et tonalité standard. • La fonction MLPP est prioritaire sur le mode NPD (Ne pas déranger). • Si vous saisissez un numéro d'accès MLPP incorrect, un message vocal vous en avertit. • Un appel MLPP reste prioritaire lorsque vous : ◦ Mettez l'appel en attente ◦ Transférez l'appel ◦ Ajoutez l'appel à une conférence à trois ◦ Répondez à l'appel par interception Cisco Extension Mobility Cisco Extension Mobility (EM) permet de configurer temporairement un téléphone IP Cisco Unified comme étant le vôtre. Lorsque vous vous connectez à EM, le téléphone adopte votre profil utilisateur, y compris vos lignes téléphoniques, fonctions, services établis et paramètres Web. Seul l'administrateur système peut configurer Extension Mobility. La fonction de modification du PIN de Cisco Extension Mobility permet de modifier votre PIN depuis votre téléphone IP Cisco Unified. Astuces • Vous êtes automatiquement déconnecté du service EM au bout d'un certain temps. Ce délai est déterminé par l'administrateur système. • Les modifications que vous apportez à votre profil EM dans les pages Web Options utilisateur Cisco Unified Communications Manager sont prises en compte immédiatement si vous êtes connecté à la fonction Extension Mobility sur votre téléphone. Sinon, elles ne seront prises en compte qu'à votre prochaine connexion. • Les modifications que vous apportez à votre téléphone dans les pages Web Options utilisateur sont prises en compte immédiatement si vous vous êtes déconnecté du service EM. Sinon, elles ne seront prises en compte qu'à votre prochaine déconnexion. • Les paramètres locaux réglables sur le téléphone ne sont pas enregistrés dans votre profil EM. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 52 Fonctions d'appel Cisco Extension Mobility Connexion au service EM Procédure Étape 1 Sélectionnez ( ) > Services > Service EM (le nom de cette fonction peut varier). Étape 2 Saisissez votre ID utilisateur et votre PIN (fournis par votre administrateur système). Étape 3 Si vous y êtes invité, sélectionnez un profil de périphérique. Déconnexion du service EM Procédure Étape 1 Sélectionnez ( ) > Services > Service EM (le nom de cette fonction peut varier). Étape 2 Lorsque vous êtes invité à vous déconnecter, appuyez sur Oui. Modifier PIN à l'aide du service Modifier les informations d'identification Procédure Étape 1 Sélectionnez ( ) > Services > Modifier les informations d'identification. Étape 2 Saisissez votre ID utilisateur dans le champ ID utilisateur. Étape 3 Saisissez votre PIN dans le champ PIN actuel. Étape 4 Dans le champ Nouveau PIN, spécifiez votre nouveau PIN. Étape 5 Dans le champ Confirmer le PIN, spécifiez à nouveau votre nouveau PIN. Étape 6 Appuyez sur Modifier. Un message indique que le PIN a été modifié. Étape 7 Appuyez sur Quitter. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 53 Fonctions d'appel Cisco Extension Mobility Modifier le PIN à l'aide de la touche Modifier le PIN Procédure Étape 1 Sélectionnez ( ) > Services > Service EM (le nom de cette fonction peut varier). Étape 2 Appuyez sur Modifier le PIN. Étape 3 Saisissez votre PIN dans le champ PIN actuel. Étape 4 Dans le champ Nouveau PIN, spécifiez votre nouveau PIN. Étape 5 Dans le champ Confirmer le PIN, spécifiez à nouveau votre nouveau PIN. Étape 6 Appuyez sur Modifier. Un message indique que le PIN a bien été modifié. Étape 7 Appuyez sur Quitter. Appels professionnels à l'aide d'un seul numéro de téléphone Intelligent Session Control associe le numéro de votre téléphone portable à celui de votre téléphone IP professionnel. Lorsque vousrecevez un appelsur votre destination distante (téléphone portable), votre téléphone de bureau ne sonne pas et seule votre destination distante sonne. Lorsque vous répondez à un appel entrant sur votre téléphone portable, votre téléphone de bureau affiche le message Utilisé à distance. Au cours d'un appel, vous pouvez également utiliser lesfonctions de votre téléphone portable.Si, par exemple, vous recevez un appel sur votre numéro mobile, vous pouvez le prendre depuis votre téléphone de bureau ou le transférer sur ce dernier depuis votre téléphone portable. Le tableau qui suit décrit le mode de transfert des appels. Pour... Procédez comme suit... Utilisez les différentes fonctions de votre téléphone portable (par exemple, *74). Contactez votre administrateur système pour obtenir la liste des codes d'accès. Transférer un appel entrant en cours sur votre téléphone portable vers un téléphone de bureau Mobile Connect et Accès vocal mobile Lorsque lesfonctions de connexion et d'accès vocal mobilessont installées, vous pouvez utiliser votre téléphone portable pour gérer les appels associés au numéro de votre téléphone de bureau. • Votre bureau et vos destinations distantes reçoivent les appels simultanément. • Lorsque vous prenez l'appel sur votre téléphone de bureau, les destinations distantes cessent de sonner, sont déconnectées et affichent un message d'appel en absence. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 54 Fonctions d'appel Appels professionnels à l'aide d'un seul numéro de téléphone • Lorsque vous prenez l'appel sur une destination distante, les autres destinations distantes cessent de sonner, sont déconnectées et affichent un message d'appel en absence. Pour... Procédez comme suit... Les pages Web Options utilisateur permettent de configurer des destinations distantes et de créer des listes d'accès destinées à autoriser ou à bloquer les appels passés vers ces destinations depuis des numéros spécifiques. Reportez-vous à Téléphone et liste d'accès pour Mobile Connect, à la page 91. Configurer Mobile Connect Réponse à un appel sur votre Reportez-vous à Réponse à un appel, à la page 23. téléphone portable Faire basculer un appel en Reportez-vous à Mouvement des appels en cours, à la page 26. cours entre votre téléphone de bureau et un téléphone portable Passage d'un appel depuis Reportez-vous à Options des appels supplémentaires, à la page 19. votre téléphone portable Astuces • En cas d'utilisation de l'accès vocal mobile, vous devez saisir le numéro depuis lequel vous appelez et votre PIN si l'une des conditions ci-dessous s'applique : ◦ Le numéro depuis lequel vous appelez n'est pas l'une de vos destinations distantes. ◦ Le numéro est bloqué par votre opérateur ou vous-même (affiché comme “Numéro inconnu”). ◦ Le numéro ne se présente pas exactement de la même manière dans la base de données Cisco Unified Communications Manager. Par exemple, votre numéro est le 510-666-9999 (ou le 408-999-6666) maisil estspécifié dansla base de données comme 666-9999 (ou 1-408-999-6666). • Si vous vous trompez trois fois de suite dans la saisie des informations demandées telles que le numéro de téléphone portable ou le PIN, vous ne disposez plus de la fonction d'accès vocal mobile et l'accès vous est refusé pendant une certaine durée.Pour obtenir de l'aide, contactez votre administrateursystème. Rubriques connexes Mouvement des appels en cours, à la page 26 Mettre en attente l'appel intercepté sur un téléphone portable Procédure Étape 1 Appuyez sur Attente d'entreprise (ce nom peut varier). Votre interlocuteur est mis en attente. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 55 Fonctions d'appel Appels professionnels à l'aide d'un seul numéro de téléphone Étape 2 Sur votre téléphone portable, appuyez sur Reprendre (ce nom peut varier). Vous connecter à la fonction d'accès vocal mobile Procédure Étape 1 Composez le numéro d'accès vocal mobile qui vous a été attribué depuis n'importe quel téléphone. Étape 2 Saisissez le numéro depuis lequel vous appelez, si vous y êtes invité, ainsi que votre PIN. Activation de Mobile Connect depuis un téléphone portable Procédure Étape 1 Composez le numéro d'accès vocal mobile qui vous a été attribué. Étape 2 Saisissez le numéro de votre téléphone portable, si vous y êtes invité, ainsi que votre PIN. Étape 3 Appuyez sur 2 pour activer Mobile Connect. Étape 4 Vous pouvez activer Mobile Connect pour tous les téléphones configurés ou pour un seul : • Tous les téléphones : saisissez 2. • Un téléphone : saisissez 1, puis le numéro à ajouter comme destination distante, suivi de dièse (#). Désactiver Mobile Connect depuis un téléphone portable Procédure Étape 1 Composez le numéro d'accès vocal mobile qui vous a été attribué. Étape 2 Saisissez le numéro de votre téléphone portable, si vous y êtes invité, ainsi que votre PIN. Étape 3 Appuyez sur 3 pour désactiver Mobile Connect. Étape 4 Vous pouvez désactiver Mobile Connect pour tous les téléphones configurés ou pour un seul : • Tous les téléphones : saisissez 2. • Un téléphone : saisissez 1, puis saisissez le numéro que vous voulez supprimer comme destination distante, suivi de dièse (#). Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 56 Fonctions d'appel Appels professionnels à l'aide d'un seul numéro de téléphone Activer ou désactiver l'accès de connexion mobile à toutes les destinations distantes à partir de votre téléphone de bureau Procédure Étape 1 Appuyez sur le bouton Mobilité pour afficher l'état actuel de la destination distante (activée ou désactivée). Étape 2 Appuyez sur Sélect pour modifier l'état. Étape 3 Appuyez sur Quitter. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 57 Fonctions d'appel Appels professionnels à l'aide d'un seul numéro de téléphone Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 58 Fonctions d'appel Appels professionnels à l'aide d'un seul numéro de téléphone CHAPITRE 4 Combiné, casque et haut-parleur Vous pouvez utiliser votre téléphone avec ces périphériques audio : un combiné, un casque ou un haut-parleur. Le téléphone est décroché lorsque le combiné est soulevé ou lorsqu'un autre périphérique audio est en cours d'utilisation. Le téléphone est raccroché lorsque le combiné est sur son support et qu'aucun autre périphérique audio n'est utilisé. Ce chapitre contient les sections ci-dessous : • Combiné, page 59 • Casque, page 60 • Haut-parleur, page 60 • Réponse automatique avec casque ou haut-parleur, page 61 Combiné Le tableau qui suit décrit l'utilisation du combiné. Pour... Procédez comme suit... Levez-le pour décrocher ; remettez-le en place pour raccrocher. La ligne qui sonne est automatiquement sélectionnée. Contactez votre administrateur système concernant les options permettant de toujours sélectionner la ligne principale. Utiliser le combiné Appuyez sur ou ( ), puis raccrochez le combiné. Passer en mode haut-parleur ou casque en cours d'appel Appuyez sur le bouton Volume pendant l'appel ou après obtention de la tonalité. Appuyez sur Enregistrer pour conserver le niveau de volume pour les appels ultérieurs. Régler le volume d'un appel Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 59 Casque Pour les casques à fil, votre téléphone prend en charge les prises casque à quatre ou six fils. Pour plus d'informations sur l'achat de casques, reportez-vous à Prise en charge de casques, à la page 16. Vous pouvez utiliser un casque avec toutes les commandes de votre téléphone, notamment le bouton Volume et . Pour... Procédez comme suit... Appuyez sur ( ) pour activer/désactiver le mode casque. (En général, le bouton 23 est affecté au casque.) Activer ou désactiver le mode casque Passer en mode combiné Décrochez le combiné (n'appuyez sur aucun bouton). Appuyez sur le bouton Volume pendant l'appel ou après obtention de la tonalité. Appuyez sur Enregistrer pour conserver le niveau de volume pour les appels ultérieurs. Régler le volume d'un appel Si vous utilisez la fonction de réponse automatique, reportez-vous à Réponse automatique avec casque ou haut-parleur, à la page 61. Casque large bande Si vous utilisez un casque large bande, vous devriez bénéficier d'une meilleure sensibilité audio en activant le paramètre large bande de votre téléphone (ce paramètre est désactivé par défaut).Pour accéder au paramètre, sélectionnez ( ) > Paramètres > Préférences utilisateur > Préférences audio > Casque large bande. Si le paramètre Casque large bande apparaît en grisé, vous ne pouvez pas le modifier. Assurez-vous auprès de l'administrateur que votre système téléphonique est bien configuré pour le mode large bande. Si ce n'est pas le cas, vous risquez de ne pas pouvoir détecter de sensibilité audio supplémentaire, même en utilisant un casque large bande. Pour connaître les caractéristiques de votre casque, reportez-vous à la documentation qui l'accompagne ou contactez votre administrateur système. Haut-parleur La plupart des opérations que vous pouvez effectuer pour composer un numéro ou répondre à un appel déclenche automatiquement le mode haut-parleur, à condition que le combiné soit raccroché et que le témoin (casque) ne soit pas allumé. Pour... Procédez comme suit... Activer Appuyez sur . ou désactiver le mode haut-parleur Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 60 Combiné, casque et haut-parleur Casque Pour... Procédez comme suit... Passer en mode combiné Décrochez le combiné (n'appuyez sur aucun bouton). Appuyez sur le bouton Volume pendant l'appel ou après obtention de la tonalité. Appuyez sur Enregistrer pour conserver le niveau de volume pour les appels ultérieurs. Régler le volume d'un appel Réponse automatique avec casque ou haut-parleur Lorsque la fonction de réponse automatique est activée, votre téléphone répond automatiquement aux appels entrants après quelques sonneries. Votre administrateur système doit configurer la fonction de réponse automatique pour qu'elle fonctionne soit avec votre haut-parleursoit avec votre casque. La fonction de réponse automatique est particulièrement utile si vous recevez un grand nombre des appels entrants. Si vous... Procédez comme suit... Restez en mode casque (le témoin ( ) doit rester allumé) même lorsque vous n'êtes pas en ligne. Pour que le mode casque reste activé, procédez comme suit : • Appuyez sur FinApp pour raccrocher. • Appuyez sur NvAppel ou Composer pour effectuer de nouveaux appels. Si votre téléphone est configuré pour utiliser la fonction de réponse automatique en mode casque, il ne prend les appels automatiquement que si le témoin ( ) est allumé. Dans le cas contraire, les appels sonnent normalement et vous devez y répondre manuellement. Utilisez la fonction de réponse automatique avec un casque Laissez le combiné raccroché et gardez le mode casque inactif ( ( ) éteint). Dansle cas contraire, les appelssonnent normalement et vous devez y répondre manuellement. Utilisez la fonction de réponse automatique avec le haut-parleur Astuce En mode Ne pas déranger, la fonction Réponse automatique est désactivée. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 61 Combiné, casque et haut-parleur Réponse automatique avec casque ou haut-parleur Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 62 Combiné, casque et haut-parleur Réponse automatique avec casque ou haut-parleur CHAPITRE 5 Personnalisation du téléphone Pour personnaliser votre téléphone IP Cisco Unified, définissez la sonnerie, le volume et d'autres paramètres. Ce chapitre contient les sections ci-dessous : • Personnalisation des sonneries et de l'indicateur de messages, page 63 • Personnalisation de l'écran du téléphone, page 64 Personnalisation des sonneries et de l'indicateur de messages Vous pouvez personnaliser la manière dont votre téléphone signale les appels entrants et les nouveaux messages vocaux. Vous pouvez également régler le volume de la sonnerie de votre téléphone Rubriques connexes Opérations de la page Web Options utilisateur, à la page 80 Paramètres de ligne sur le Web, à la page 90 Modifier la sonnerie Procédure Étape 1 Sélectionnez ( ) > Répertoires > Préférences utilisateur > Sonneries. Étape 2 Choisissez une ligne téléphonique ou la sonnerie par défaut. Étape 3 Sélectionnez une sonnerie pour en entendre un extrait. Étape 4 Pour définir la sonnerie, appuyez sur Sélectionner et sur Enregistrer. Sinon, appuyez sur Annuler. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 63 Régler le niveau de la sonnerie du téléphone Contactez votre administrateur système à propos des paramètres du volume minimum de sonnerie. Procédure Appuyez sur Volume lorsque le combiné est raccroché. Le nouveau volume de la sonnerie est enregistré automatiquement. Modifier le mode de fonctionnement du témoin de message vocal sur le combiné Procédure Étape 1 Connectez-vous à vos pages Web Options utilisateur. Étape 2 Choisissez Modifier la politique d'indicateur de messages en attente. Étape 3 Accédez à vos paramètres d'indicateur de message. La politique par défaut du système consiste généralement à indiquer les nouveaux messages vocaux via un témoin fixe sur la bande lumineuse du combiné. Modification de l'indicateur sonore du message vocal Procédure Étape 1 Connectez-vous à vos pages Web Options utilisateur. Étape 2 Accédez à vos paramètres d'indicateur de message. Personnalisation de l'écran du téléphone Vous pouvez modifier les paramètres de l'écran du téléphone. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 64 Personnalisation du téléphone Régler le niveau de la sonnerie du téléphone Modifier la luminosité de l'écran du téléphone Procédure Étape 1 Sélectionnez ( ) > Paramètres > Préférences utilisateur > Luminosité. Étape 2 Pour modifier les réglages, appuyez sur Volume. Étape 3 Appuyez sur Enregistrer ou sur Annuler. Si vous modifiez le réglage de luminosité de votre téléphone, ne débranchez pas le téléphone de l'alimentation électrique pendant au moins une minute, faute de quoi le nouveau réglage ne sera pas enregistré. Remarque Modifier la langue de l'écran du téléphone Procédure Étape 1 Connectez-vous à vos pages Web Options utilisateur. Étape 2 Accédez à vos paramètres des utilisateurs. Étape 3 Sélectionnez une langue. Changer le libellé de ligne Procédure Étape 1 Connectez-vous à vos pages Web Options utilisateur. Étape 2 Accédez à vos paramètres de libellé de ligne. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 65 Personnalisation du téléphone Modifier la luminosité de l'écran du téléphone Régler le contraste Procédure Étape 1 Sélectionnez ( ) > Paramètres > Préférences utilisateur > Contraste. Étape 2 Pour modifier les réglages, appuyez sur le bouton Volume. Étape 3 Appuyez sur Enregistrer ou sur Annuler. Paramètre du rétroéclairage Contactez votre administrateursystème pour la disponibilité de cette option. Cette fonction permet de désactiver le rétroéclairage pendant une durée prédéterminée (par votre administrateur système). Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 66 Personnalisation du téléphone Régler le contraste CHAPITRE 6 Journaux des appels et répertoires Cette section explique comment utiliser les journaux des appels et les répertoires. Pour accéder aux deux fonctions, utilisez le bouton Répertoires ( )Répertoires. • Journaux des appels, page 67 • Fonctions du répertoire, page 70 Journaux des appels Votre téléphone tient à jour des journaux des appels. Les journaux des appels contiennent des enregistrements des appels émis, reçus et en absence. L'administrateur de votre téléphone détermine si les appels en absence sont consignés dans votre répertoire Appels en absence pour une apparence de ligne donnée sur votre téléphone. Astuces • (Téléphones SCCP et SIP) Votre téléphone peut être configuré pour la consignation des appels internationaux, qui est indiquée par un symbole “+” danslesjournaux des appels, le rappel ou les entrées du répertoire des appels. Pour plus d'informations, contactez votre administrateur système. • (Téléphones SCCP uniquement) Pour afficher l'enregistrement d'appel complet d'un appel à plusieurs interlocuteurs (par exemple, d'un appel qui a été redirigé ou transféré sur votre poste), mettez en surbrillance l'enregistrement d'appel, puis appuyez sur Détails. L'enregistrement Détails affiche deux entrées pour chaque appel avec plusieurs interlocuteurs en absence ou reçu. Les entrées apparaissent dans l'ordre chronologique inverse : ◦ La première entrée enregistrée contient le nom ou le numéro du dernier appel avec plusieurs interlocuteurs terminé, reçu sur votre téléphone. ◦ La deuxième entrée enregistrée contient le nom ou le numéro du premier appel avec plusieurs interlocuteurs terminé, reçu sur votre téléphone. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 67 Affichage des journaux d'appels Procédure Sélectionnez ( ) > Répertoires > Appels en absence, Appels composés, ou Appels reçus. Chacun peut contenir jusqu'à 100 enregistrements. Affichage des détails d'un enregistrement d'appel donné Procédure Étape 1 Sélectionnez ( ) > Répertoires > Appels en absence, Appels composés ou Appels reçus. Étape 2 Mettez en surbrillance un enregistrement d'appel. Étape 3 Appuyez sur Détails. Les informations, telles que le numéro appelé, celui de l'appelant, l'heure de l'appel et sa durée (uniquement pour les appels émis et reçus) s'affichent. Effacer l'ensemble des enregistrements des appels de tous les journaux des appels Procédure Étape 1 Sélectionnez ( ) > Répertoires. Étape 2 Appuyez sur Effacer. Effacer tous les enregistrements des appels d'un journal spécifique Procédure Étape 1 Sélectionnez ( ) > Répertoires > Appels en absence, Appels composés, ou Appels reçus. Étape 2 Mettez en surbrillance un enregistrement d'appel. Étape 3 Appuyez sur Effacer. Il est possible que vous deviez au préalable appuyer sur la touche Autres pour afficher l'option Effacer. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 68 Journaux des appels et répertoires Affichage des journaux d'appels Effacer un seul enregistrement d'appel Procédure Étape 1 Sélectionnez ( ) > Répertoires > Appels en absence, Appels composés, ou Appels reçus. Étape 2 Mettez en surbrillance un enregistrement d'appel. Étape 3 Appuyez sur Supprimer. Composition d'un numéro à partir d'un journal des appels lorsqu'aucun autre appel n'est en cours Procédure Étape 1 Sélectionnez ( ) > Répertoires > Appels en absence, Appels composés ou Appels reçus. Étape 2 Mettez en surbrillance un enregistrement d'appel. Si la touche Détails s'affiche, l'appel représente l'entrée principale d'un appel à plusieurs interlocuteurs. Étape 3 Si vous devez modifier le numéro affiché, appuyez sur ModNum,, puis sur << ou sur >>. Étape 4 Pour supprimer le numéro, appuyez sur ModNum, puis sur Supprimer. Il est possible que vous deviez au préalable appuyer sur la touche Autres pour afficher l'option Supprimer. Étape 5 Pour passer l'appel, décrochez le combiné. Composition d'un numéro à partir d'un journal des appels avec un autre appel en cours Procédure Étape 1 Sélectionnez ( ) > Répertoires > Appels en absence, Appels composés ou Appels reçus. Étape 2 Mettez en surbrillance un enregistrement d'appel. Si la touche Détails s'affiche, l'appel représente l'entrée principale d'un appel à plusieurs interlocuteurs. Remarque Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 69 Journaux des appels et répertoires Effacer un seul enregistrement d'appel Étape 3 Si vous devez modifier le numéro affiché, appuyez sur ModNum,, puis sur << ou sur >>. Étape 4 Pour supprimer le numéro, appuyez sur ModNum, puis sur Supprimer. Il est possible que vous deviez au préalable appuyer sur la touche Autres pour afficher l'option Supprimer. Étape 5 Appuyez sur Composer. Étape 6 Choisissez une option de menu pour traiter l'appel initial. a) Attente : met le premier appel en attente et compose le second. b) Transfert : transfère le premier interlocuteur vers le second et vous déconnecte de l'appel. Appuyez de nouveau sur après avoir composé le numéro pour terminer l'opération. c) Conférence : établit une conférence entre tous les interlocuteurs, vous compris. Appuyez de nouveau sur ( ) après avoir composé le numéro pour terminer l'opération. d) FinApp : déconnecte le premier appel et compose le second. Recomposer un numéro international à partir des journaux des appels reçus et en absence. Procédure Étape 1 Sélectionnez ( ) > Répertoires > Appels en absence ou Appels reçus. Étape 2 Mettez en surbrillance l'enregistrement de l'appel que vous voulez recomposer. Si la touche Détails s'affiche, l'appel représente l'entrée principale d'un appel à plusieurs interlocuteurs. Étape 3 Appuyez sur ModNum. Étape 4 Maintenez la touche “*” enfoncée pendant au moins 1 seconde pour ajouter le signe “+” devant un numéro de téléphone. Le signe + ne peut être placé qu'au début du numéro. Étape 5 Appuyez sur Composer. Fonctions du répertoire En fonction de la configuration de votre téléphone, celui-ci dispose peut-être de fonctions de répertoire d'entreprise et personnel. • Répertoire d'entreprise : contacts d'entreprise auxquels vous pouvez accéder depuis votre téléphone. Il est configuré et géré par votre administrateur système. • Répertoire personnel : il s'agit, le cas échéant, de contacts personnels et de codes de numérotation simplifiée associés que vous pouvez configurer et auxquels vous pouvez accéder à partir de votre téléphone et de vos pages Web Options utilisateur Cisco Unified Communications Manager. Le répertoire personnel comprend le carnet d'adresses personnel et les numéros simplifiés : Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 70 Journaux des appels et répertoires Recomposer un numéro international à partir des journaux des appels reçus et en absence. ◦ Le carnet d'adresses personnel est un répertoire qui contient vos contacts personnels. ◦ Les numéros simplifiés sont des codes affectés aux entrées du carnet d'adresses personnel et permettent de composer les numéros rapidement. Répertoire d'entreprise Le répertoire d'entreprise permet d'émettre des appels à destination de vos collègues. Astuce Utilisez le clavier pour saisir des caractères sur l'écran du téléphone. Utilisez le bouton denavigationde votre téléphone pour passer d'un champ de saisie à un autre. Composition d'un numéro à partir d'un répertoire d'entreprise lorsqu'aucun autre appel n'est en cours Procédure Étape 1 Sélectionnez ( ) > Répertoires > Répertoire d'entreprise (le nom exact de ce service peut varier). Étape 2 Utilisez votre clavier pour saisir un nom entier ou partiel, puis appuyez sur Rechercher. Étape 3 Pour composer un numéro, sélectionnez ou recherchez une entrée dans la liste, puis décrochez le téléphone. Composition un numéro à partir d'un répertoire d'entreprise avec un appel en cours Procédure Étape 1 Sélectionnez ( ) > Répertoires > Répertoire d'entreprise (le nom exact de ce service peut varier). Étape 2 Utilisez votre clavier pour saisir un nom entier ou partiel, puis appuyez sur Rechercher. Étape 3 Accédez à une entrée, puis appuyez sur Composer. Étape 4 Choisissez une option de menu pour traiter l'appel initial. a) Attente : met le premier appel en attente et compose le second. b) Transfert : transfère le premier interlocuteur vers le second et vous déconnecte de l'appel. Appuyez de nouveau sur après avoir composé le numéro pour terminer l'opération. c) Conférence : établit une conférence entre tous les interlocuteurs, vous compris. Appuyez de nouveau sur ( ) après avoir composé le numéro pour terminer l'opération. d) FinApp : déconnecte le premier appel et compose le second. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 71 Journaux des appels et répertoires Répertoire d'entreprise Répertoire personnel Le répertoire personnel comprend le carnet d'adresses personnel et les numéros rapides. Cette section explique comment configurer et utiliser le répertoire personnel sur votre téléphone. Vous pouvez également vous reporter à la section Répertoire personnel sur le Web, à la page 81. Astuces • L'administrateur système peut vous fournir l'ID utilisateur et le PIN nécessaires pour vous connecter au répertoire personnel. • Le répertoire personnel vous déconnecte automatiquement au bout d'un certain temps. Ce délai est variable. Pour plus d'informations, contactez votre administrateur système. • Utilisez le pavé numérique pour saisir des caractères sur l'écran du téléphone. Utilisez le bouton de navigation de votre téléphone pour passer d'un champ de saisie à un autre. • Votre téléphone peut être configuré pour la journalisation des appels internationaux, ce qui est indiqué par un symbole “+” dans les journaux des appels, les rappels ou les entrées du répertoire des appels. Pour plus d'informations, contactez votre administrateur système. Accéder au répertoire personnel pour le carnet d'adresses personnel et les codes de numérotation rapide Procédure Étape 1 Sélectionnez ( ) > Répertoires > Pépertoire personnel (le nom exact de ce service peut varier). Étape 2 Saisissez votre ID utilisateur Cisco Unified Communications Manager et votre PIN, puis appuyez sur Soum. Recherche d'une entrée du carnet d'adresses personnel Procédure Étape 1 Accédez à Répertoire personnel. Étape 2 sélectionnez carnet d'adresses personnel. Étape 3 Saisissez les critères de recherche, puis appuyez sur Soumettre. Étape 4 Parcourez les entrées à l'aide de Précédent et de Suivant. Étape 5 Mettez en surbrillance l'entrée du carnet d'adresses personnel souhaitée, puis appuyez sur Sélectionner. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 72 Journaux des appels et répertoires Répertoire personnel Composition d'un numéro à partir d'une entrée du carnet d'adresses personnel Procédure Étape 1 Recherchez une entrée. Étape 2 Mettez l'entrée en surbrillance, puis appuyez sur Sélectionner. Étape 3 Appuyez sur Composer. Il est possible que vous deviez au préalable appuyer sur la touche Autres pour afficher l'option Composer. Supprimer une entrée du carnet d'adresses personnel Procédure Étape 1 Recherchez une entrée. Étape 2 Mettez l'entrée en surbrillance, puis appuyez sur Supprimer. Étape 3 Appuyez sur Modifier. Étape 4 Appuyez sur Supprimer. Étape 5 Choisissez OK pour confirmer la suppression. Modifier une entrée du carnet d'adresses personnel Procédure Étape 1 Recherchez une entrée. Étape 2 Mettez l'entrée en surbrillance, puis appuyez sur Sélectionner. Étape 3 Pour modifier un nom ou une adresse e-mail, appuyez sur Modifier. Étape 4 Le cas échéant, sélectionnez Téléphone pour modifier un numéro de téléphone. Étape 5 Appuyez sur MàJ. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 73 Journaux des appels et répertoires Répertoire personnel Ajout d'une entrée au carnet d'adresses personnel Procédure Étape 1 Accédez à Répertoire personnel. Étape 2 Sélectionnez Carnet d'adresses personnel. Étape 3 Appuyez sur Soumettre pour accéder à la page Rechercher. Il n'est pas nécessaire de commencer par saisir les informations de recherche. Étape 4 Appuyez sur Nouveau. Étape 5 Utilisez le clavier de votre téléphone pour saisir un nom et un e-mail. Étape 6 Sélectionnez Téléphones et utilisez le clavier pour saisir des numéros de téléphone. N'oubliez pas d'inclure les codes d'accès nécessaires, tels que 9 ou 1. Étape 7 Sélectionnez Soumettre pour ajouter l'entrée à la base de données. Ajouter un nouveau code de numérotation simplifiée sans utiliser d'entrée du carnet d'adresses personnel Procédure Étape 1 Appuyez sur , puis sélectionnez Répertoires > Répertoire personnel > Numéros simplifiés personnels. Étape 2 Mettez en surbrillance un code de numérotation simplifiée non affecté, puis appuyez sur Affecter. Étape 3 Saisissez un numéro de téléphone. Étape 4 Appuyez sur MàJ. Rechercher des codes de numérotation simplifiée Procédure Étape 1 Sélectionnez ( ) > Répertoires > Répertoire personnel > Numéros simplifiés personnels. Étape 2 Sélectionnez Suivant pour parcourir les entrées. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 74 Journaux des appels et répertoires Répertoire personnel Passage d'un appel à l'aide de la numérotation rapide Procédure Étape 1 Recherchez le code de numérotation rapide. Étape 2 Appuyez sur Composer. Supprimer un code de numérotation rapide Procédure Étape 1 Recherchez le code de numérotation rapide. Étape 2 Mettez en surbrillance l'entrée souhaitée, puis appuyez sur Supprimer. Étape 3 Appuyez de nouveau sur Supprimer. Se déconnecter du répertoire personnel Procédure Étape 1 Sélectionnez ( ) > Répertoires > Répertoire personnel (le nom exact de l'option peut varier). Étape 2 Sélectionnez Déconn. Étape 3 Appuyez sur OK. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 75 Journaux des appels et répertoires Répertoire personnel Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 76 Journaux des appels et répertoires Répertoire personnel CHAPITRE 7 Messages vocaux Pour accéder aux messages vocaux, utilisez le bouton Messages ( ) > Messages. Votre société détermine le service de messagerie vocale utilisé par votre système téléphonique. Pour plus d'informations précises et détaillées sur ce service, reportez-vous à la documentation correspondante. Ce chapitre contient les sections ci-dessous : • Identification du message vocal, page 77 • Configurer le service de messagerie vocale, page 78 • Écouter des messages vocaux ou accéder au système de messagerie vocale, page 78 Identification du message vocal Lorsque vous avez un message vocal, recherchez : • Un témoin lumineux rouge fixe sur votre combiné. Cet indicateur peut varier. Reportez-vous à Personnalisation des sonneries et de l'indicateur de messages, à la page 63. • Une icône de message en attente et un message sur l'écran du téléphone. Le témoin lumineux rouge et l'icône de message en attente ne s'affichent que lorsque vous avez un message sur votre ligne principale, même si vous recevez des messages vocaux sur d'autres lignes. Lorsque vous avez un message vocal, attendez : • Une tonalité accélérée dans le combiné, dans le casque ou dans le haut-parleur lorsque vous émettez un appel. La tonalité accélérée est propre à la ligne. Vous ne l'entendez que si vous utilisez la ligne associée au message en attente. Pour diriger un appel directement sur la messagerie vocale, appuyez sur Rvoi Im. Pour plus d'informations, reportez-vous à Transfert de l'appel vers le système de messagerie vocale, à la page 29. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 77 Configurer le service de messagerie vocale Procédure Étape 1 Appuyez sur ( ) > Messages, puis suivez les instructions vocales. Étape 2 Si un menu apparaît sur l'écran du téléphone, sélectionnez une option de menu appropriée. Écouter des messages vocaux ou accéder au système de messagerie vocale Lorsque vous vous connectez à un service de messagerie vocale, la ligne associée à un message vocal est sélectionnée par défaut.Si plusieurslignes comportent un message vocal, la première disponible estsélectionnée. Contactez votre administrateur concernant les options afin que le système se connecte toujours au service de messagerie vocale sur la ligne principale. Procédure Étape 1 Appuyez sur . En fonction de votre service de messagerie vocale, cette opération permet de composer automatiquement le numéro du service de messagerie ou d'afficher un menu sur l'écran tactile. Étape 2 Si un menu s'affiche, sélectionnez l'option de menu. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 78 Messages vocaux Configurer le service de messagerie vocale CHAPITRE 8 Pages Web Options utilisateur Votre téléphone IP Cisco Unified est un périphérique réseau qui peut partager des informations avec les autres périphériques du réseau de votre entreprise, notamment votre ordinateur. Vous pouvez utiliser votre ordinateur pour vous connecter à vos pages Web Options utilisateur Cisco Unified Communications Manager, depuis lesquelles vous pouvez contrôler les fonctions, les paramètres et les services de votre téléphone IP Cisco Unified. Par exemple, vous pouvez configurer les boutons de numérotation rapide depuis les pages Web Options utilisateur. Ce chapitre contient les sections ci-dessous : • Connexion et déconnexion des pages Web Options utilisateur, page 79 • Sélection d'un périphérique depuis la page Web Options utilisateur, page 80 • Opérations de la page Web Options utilisateur, page 80 • Configuration des fonctions et des systèmes sur le Web, page 80 Connexion et déconnexion des pages Web Options utilisateur Pour pouvoir accéder à vos options utilisateur, par exemple à la numérotation simplifiée ou au carnet d'adresses personnel, vous devez vous connecter. Une fois que vous avez terminé d'utiliser les pages Web Options utilisateur, vous devez vous déconnecter. Dans certains cas, vous pouvez accéder à vos pages Web Options utilisateur sans devoir vous connecter. Pour plus d'informations, contactez votre administrateur système. Procédure Étape 1 Demandez à votre administrateur système de vous fournir l'URL, un ID utilisateur et un mot de passe par défaut pour vos Options utilisateur. Étape 2 Ouvrez un navigateur Web sur votre ordinateur, puis saisissez l'URL. Étape 3 Si vous êtes invité à accepter les paramètres de sécurité, sélectionnez Oui ou Installer le certificat. Étape 4 Dans le champ Nom d'utilisateur, saisissez votre ID utilisateur. Étape 5 Dans le champ Mot de passe, saisissez votre mot de passe. Étape 6 Sélectionnez Connexion. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 79 La page d'accueil Options utilisateur Cisco Unified CM s'affiche. Dans cette page, vous pouvez sélectionner Options utilisateur pour choisir un périphérique, mais aussi accéder aux paramètres des utilisateurs, aux fonctions de répertoire, à votre carnet d'adresses personnel et aux numéros simplifiés. Étape 7 Pour vous déconnecter des pages Web Options utilisateur, sélectionnez Déconnexion. Sélection d'un périphérique depuis la page Web Options utilisateur Procédure Étape 1 Depuis votre page Web Options utilisateur, sélectionnez Options utilisateur > Périphérique. La fenêtre Configuration du périphérique s'affiche. Les boutonssituéssur la barre d'outils en haut de la fenêtre Configuration du périphérique sont propres au type de périphérique sélectionné. Étape 2 (facultatif) Si plusieurs périphériques vous sont affectés, sélectionnez le périphérique approprié (modèle de téléphone, profil Extension Mobility ou profil de destination distante) dans le menu déroulant Nom. Opérations de la page Web Options utilisateur Cette section explique comment vous connecter et sélectionner un périphérique de téléphonie. Sélectionner une option de configuration Procédure Étape 1 Après vous être connecté à vos pages Web Options utilisateur, sélectionnez Options utilisateur pour accéder aux paramètres des utilisateurs, au répertoire, au carnet d'adresses personnel, aux numéros simplifiés et aux paramètres de mobilité. Étape 2 Pour revenir à la page Configuration du périphérique depuis une autre page, sélectionnez Optionsutilisateur > Périphérique. Configuration des fonctions et des systèmes sur le Web Les rubriques de cette section vous expliquent comment configurer les fonctions et les services depuis de vos pages Web Options utilisateur après vous y être connecté. Reportez-vous à Opérations de la page Web Options utilisateur, à la page 80. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 80 Pages Web Options utilisateur Sélection d'un périphérique depuis la page Web Options utilisateur Répertoire personnel sur le Web Le répertoire personnel sur le Web est composé de : • Carnet d'adresses personnel (PAB, Personal Address Book) • Numéros rapides • Outil de synchronisation du carnet d'adresses Cisco Unified Communications Manager. Vous pouvez également accéder au carnet d'adresses personnel et aux numérosrapides depuis votre téléphone. Reportez-vous à Répertoire personnel, à la page 72. Cette section explique comment utiliser le carnet d'adresses personnel depuisles pages Web Options utilisateur. Ajout d'une nouvelle entrée au carnet d'adresses personnel Procédure Étape 1 Depuis votre page Web Options utilisateur,sélectionnez Optionsutilisateur > Carnetd'adressespersonnel. Étape 2 Sélectionnez Ajouter un nouveau. Étape 3 Saisissez les informations de l'entrée. Étape 4 Sélectionnez Enregistrer. Recherche d'une entrée du carnet d'adresses personnel Procédure Étape 1 Depuis votre page Web Options utilisateur,sélectionnez Optionsutilisateur > Carnetd'adressespersonnel. Étape 2 Spécifiez les informations de recherche, puis sélectionnez Rechercher. Modification d'une entrée du carnet d'adresses personnel Procédure Étape 1 Connectez-vous à la page Web Options utilisateur. Étape 2 Recherchez une entrée dans le carnet d'adresses personnel. Étape 3 Sélectionnez un pseudonyme. Étape 4 Modifiez l'entrée si nécessaire, puis sélectionnez Enregistrer. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 81 Pages Web Options utilisateur Répertoire personnel sur le Web Suppression d'une entrée du carnet d'adresses personnel Procédure Étape 1 Connectez-vous à la page Web Options utilisateur. Étape 2 Recherchez une entrée dans le carnet d'adresses personnel. Étape 3 Sélectionnez une ou plusieurs entrées. Étape 4 Sélectionnez Supprimer la sélection. Affecter un bouton de ligne à votre carnet d'adresses personnel Pour que vous puissiez affecter un bouton de ligne à votre carnet d'adresses personnel, votre administrateur système doit configurer le téléphone pour l'affichage des services. Pour plus d'informations, contactez votre administrateur système. Remarque Procédure Étape 1 Sélectionnez Options utilisateur > Périphérique. Étape 2 Cliquez sur URL de service. Étape 3 Sélectionnez le service Carnet d'adresses personnel dans la liste déroulante des boutons. Étape 4 Saisissez une étiquette de téléphone pour le bouton. Étape 5 Cliquez sur Enregistrer. Étape 6 Cliquez sur Réinitialiser, puis sur Redémarrer pour actualiser la configuration du téléphone. Vous pouvez maintenant appuyersur le bouton de ligne pour accéder aux codes du carnet d'adresses personnel. Outil de synchronisation du carnet d'adresses Vous pouvez utiliser l'outil de synchronisation du carnet d'adresses (SynchCA) pour synchroniser votre carnet d'adresses Microsoft Windows existant (le cas échéant) avec votre carnet d'adresses personnel. À partir d'une application Microsoft Windows application : Utilisez l'outil de synchronisation du carnet d'adresses(SynchCA) poursynchroniser votre carnet d'adresses personnel avec votre carnet d'adresse Microsoft Windows (WAB). Si vous voulez utiliser le carnet d'adresses Microsoft Outlook (OAB), vous devez d'abord importer les données de ce carnet d'adresses vers le carnet d'adresses Windows (WAB). La fonctionSynchCA peut alors être utilisée pour synchroniser le carnet d'adresses Windows avec votre carnet d'adresses personnel. Votre administrateur système peut vous donner accès à l'outil SynchCA et vous fournir des instructions détaillées. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 82 Pages Web Options utilisateur Répertoire personnel sur le Web Paramétrage de la numérotation rapide Dans la page Web Options utilisateur, vous pouvez ajouter, supprimer ou mettre à jour des entrées de numéros rapides. Vous pouvez créer jusqu'à 500 entrées de numéros rapides et de carnet d'adresses personnel. Vous pouvez créer une nouvelle entrée de numérotation rapide sans utiliser d'entrée du carnet d'adresses personnel. Ces entrées de numéros rapides sont répertoriées comme “brutes” dans les pages Web Options utilisateur et n'affichent pas d'étiquette de texte configurable. Affectation d'un code de numérotation rapide à une entrée du carnet d'adresses personnel Procédure Étape 1 Depuis votre page Web Options utilisateur, sélectionnez Options utilisateur > Numéros rapides. Étape 2 Sélectionnez Ajouter un nouveau. Étape 3 Utilisez la zone Options de recherche pour rechercher l'entrée souhaitée dans le carnet d'adresses personnel. Étape 4 Dans la zone Résultats de la recherche, sélectionnez un numéro de téléphone. Étape 5 (facultatif) Changez le code de numérotation rapide. Étape 6 Sélectionnez Enregistrer. Affectation d'un code de numérotation rapide au numéro de téléphone sans entrée du carnet d'adresses personnel Procédure Étape 1 Depuis votre page Web Options utilisateur, sélectionnez Options utilisateur > Numéros rapides. Étape 2 Sélectionnez Ajouter un nouveau. Étape 3 (facultatif) Changez le code de numérotation rapide. Étape 4 Saisissez un numéro de téléphone. Étape 5 Sélectionnez Enregistrer. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 83 Pages Web Options utilisateur Paramétrage de la numérotation rapide Recherche d'une entrée de numérotation rapide Procédure Étape 1 Depuis votre page Web Options utilisateur, sélectionnez Options utilisateur > Numéros rapides. Étape 2 Spécifiez les informations de recherche, puis sélectionnez Rechercher. Modifier un numéro de téléphone correspondant à un numéro rapide Procédure Étape 1 Depuis votre page Web Options utilisateur, sélectionnez Options utilisateur > Numéros rapides. Étape 2 Recherchez l'entrée de numérotation rapide à modifier. Étape 3 Sélectionnez un composant de l'entrée. Étape 4 Modifiez le numéro de téléphone. Étape 5 Sélectionnez Enregistrer. Supprimer un numéro rapide du carnet d'adresses personnel Procédure Étape 1 Depuis votre page Web Options utilisateur, recherchez une entrée de numérotation rapide. Étape 2 Sélectionnez une ou plusieurs entrées. Étape 3 Sélectionnez Supprimer la sélection. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 84 Pages Web Options utilisateur Paramétrage de la numérotation rapide Affectation d'une touche de fonction pour la numérotation rapide Procédure Étape 1 Depuis votre page Web Options utilisateur, sélectionnez Options utilisateur > Périphérique. Étape 2 Sélectionnez l'URL de service fournie par votre administrateur système. Étape 3 Sélectionnez le service Numérotation rapide dans la liste déroulante des boutons. Étape 4 Saisissez une étiquette de téléphone pour le bouton. Étape 5 Sélectionnez Enregistrer. Étape 6 Sélectionnez Réinitialiser, puis sélectionnez Redémarrer pour actualiser la configuration du téléphone. Configuration de la numérotation simplifiée sur le Web En fonction de sa configuration, votre téléphone peut prendre en charge plusieurs fonctions de numérotation simplifiée : • Boutons de numérotation simplifiée • Numérotation abrégée • Numéros rapides Pour obtenir de l'aide sur l'utilisation des fonctions de numérotation simplifiée, reportez-vous à Numérotation simplifiée, à la page 40. Configuration des boutons de numérotation simplifiée Procédure Étape 1 Depuis votre page Web Options utilisateur, sélectionnez Options utilisateur > Périphérique. Étape 2 Sélectionnez un téléphone dans le menu déroulant Nom. Étape 3 Sélectionnez Numérotations simplifiées. Étape 4 Dans la zone Paramètres de numérotation simplifiée, saisissez un numéro et un libellé pour un bouton de numérotation simplifiée sur votre téléphone. Étape 5 Sélectionnez Enregistrer. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 85 Pages Web Options utilisateur Configuration de la numérotation simplifiée sur le Web Configurer des codes de numérotation abrégée Procédure Étape 1 Sélectionnez Options utilisateur > Périphérique. Étape 2 Sélectionnez un téléphone dans le menu déroulant Nom. Étape 3 Cliquez sur Numérotations simplifiées. Étape 4 Saisissez le numéro et le libellé d'un code de numérotation abrégée. Étape 5 Cliquez sur Enregistrer. Configuration du service téléphonique sur le Web Les services téléphoniques peuvent inclure des fonctions spéciales, des données du réseau et des informations basées sur le Web (par exemple, les cours de la bourse ou les programmes de cinéma). Vous devez vous abonner à un service téléphonique pour y accéder depuis votre téléphone. Utilisez les boutons de ligne pour sélectionner les menus Services, Messages et Répertoires. • ( ) > Services • ( ) > Messages • ( ) > Répertoires Si un seul service est configuré, ce service s'ouvre par défaut. Si plusieurs services sont configurés, sélectionnez une option du menu à l'écran. Les services disponibles sur votre téléphone dépendent de la configuration du système téléphonique et des services auxquels vous êtes abonné.Pour plus d'informations, contactez votre administrateur système. Remarque Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 86 Pages Web Options utilisateur Configuration du service téléphonique sur le Web S'abonner à un service Procédure Étape 1 Depuis votre page Web Options utilisateur, sélectionnez Options utilisateur > Périphérique. Étape 2 Sélectionnez un téléphone dans le menu déroulant Nom. Étape 3 Sélectionnez Services téléphoniques. Étape 4 Sélectionnez Ajouter un nouveau. Étape 5 Sélectionnez un service dans la liste déroulante, puis sélectionnez Suivant. Étape 6 (facultatif) Changez l'intitulé du service ou saisissez des informations supplémentaires sur le service, le cas échéant. Étape 7 Sélectionnez Enregistrer. Recherche de services Procédure Étape 1 Depuis votre page Web Options utilisateur, sélectionnez un périphérique. Étape 2 Sélectionnez Services téléphoniques. Étape 3 Sélectionnez Rechercher. Modification ou résiliation de services Procédure Étape 1 Depuis votre page Web Options utilisateur, recherchez les services. Étape 2 Sélectionnez une ou plusieurs entrées. Étape 3 Sélectionnez Supprimer la sélection. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 87 Pages Web Options utilisateur Configuration du service téléphonique sur le Web Modification du nom de service Procédure Étape 1 Depuis votre page Web Options utilisateur, recherchez les services. Étape 2 Sélectionnez un nom de service. Étape 3 Modifiez les informations, puis sélectionnez Enregistrer. Ajout de service au bouton de fonction programmable Procédure Étape 1 Depuis votre page Web Options utilisateur, sélectionnez Options utilisateur > Périphérique. Étape 2 Sélectionnez un téléphone dans le menu déroulant Nom. Étape 3 Sélectionnez URL de service. Votre administrateur système configure un bouton d'URL de service pour votre téléphone. Étape 4 Sélectionnez un service dans la liste déroulante Bouton Service. Étape 5 (facultatif) Si vous voulez renommer le service, modifiez les champs d'étiquette. Si votre téléphone ne prend pas en charge les jeux de caractères à deux octets, il utilise des champs Étiquette ASCII. Étape 6 Sélectionnez Enregistrer. Étape 7 Sélectionnez Réinitialiser pour réinitialiser votre téléphone afin que la nouvelle étiquette du bouton s'affiche sur votre téléphone. Paramètres des utilisateurs Les paramètres des utilisateurs incluent votre mot de passe, votrePIN et votre langue (paramètres régionaux). Astuce Votre PIN et votre mot de passe permettent d'accéder à plusieurs fonctions et services. Par exemple, utilisez votre PIN pour vous connecter au service Cisco Extension Mobility ou au répertoire personnel de votre téléphone. Utilisez votre mot de passe pour vous connecter à vos pages Web Options utilisateur et à Cisco WebDialer depuis votre ordinateur. Pour plus d'informations, contactez votre administrateur système. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 88 Pages Web Options utilisateur Paramètres des utilisateurs Modification du mot de passe du navigateur Procédure Étape 1 Depuis votre page Web Options utilisateur, sélectionnez Options utilisateur > Paramètres des utilisateurs. Étape 2 Saisissez votre mot de passe actuel. Étape 3 Saisissez votre nouveau mot de passe. Étape 4 Dans le champ Confirmer le mot de passe, saisissez une nouvelle fois votre nouveau mot de passe. Étape 5 Sélectionnez Enregistrer. Changer le PIN Procédure Étape 1 Depuis votre page Web Options utilisateur, sélectionnez Options utilisateur > Paramètres des utilisateurs. Étape 2 Saisissez votre PIN actuel. Étape 3 Saisissez votre nouveau PIN. Étape 4 Dans le champ Confirmer le PIN, saisissez une nouvelle fois votre nouveau PIN. Étape 5 Sélectionnez Enregistrer. Modification de la langue des options utilisateur Procédure Étape 1 Depuis votre page Web Options utilisateur, sélectionnez Options utilisateur > Paramètres des utilisateurs. Étape 2 Dans la zone Langue utilisateur, choisissez une option dans la liste déroulante Langue. Étape 3 Sélectionnez Enregistrer. Modification de la langue de l'écran du téléphone Procédure Étape 1 Depuis votre page Web Options utilisateur, sélectionnez Options utilisateur > Périphérique. Étape 2 Sélectionnez une option dans la liste déroulante Langue utilisateur. Étape 3 Sélectionnez Enregistrer. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 89 Pages Web Options utilisateur Paramètres des utilisateurs Paramètres de ligne sur le Web Les paramètres de ligne ont une incidence sur une ligne (numéro d'annuaire) spécifique de votre téléphone. Les paramètres de ligne peuvent inclure le renvoi d'appels, les indicateurs de message vocal, les modèles de sonneries et les libellés de ligne. Vous pouvez configurer d'autres paramètres de ligne directement sur votre téléphone : • Configurer le renvoi d'appels sur votre ligne téléphonique principale : voir Renvoi d'appels, à la page 30. • Modifier les sonneries, l'affichage et d'autres paramètres spécifiques au modèle de téléphone : voir Personnalisation du téléphone, à la page 63. Configurer le renvoi d'appels par ligne Procédure Étape 1 Depuis votre page Web Options utilisateur, sélectionnez Options utilisateur > Périphérique. Étape 2 Sélectionnez un téléphone dans le menu déroulant Nom. Étape 3 Sélectionnez Paramètres de ligne. Étape 4 Si plusieurs numéros d'annuaire (lignes) sont affectés à votre téléphone, sélectionnez une ligne dans le menu déroulant Ligne. Étape 5 Dans la zone Transfert des appels entrants, sélectionnez les paramètres de renvoi d'appels correspondant aux différentes situations. Étape 6 Sélectionnez Enregistrer. Modification du paramètre d'indicateur de message vocal par ligne Procédure Étape 1 Depuis votre page Web Options utilisateur, sélectionnez Options utilisateur > Périphérique. Étape 2 Sélectionnez un téléphone dans le menu déroulant Nom. Étape 3 Sélectionnez Paramètres de ligne. Étape 4 (facultatif) Si plusieurs numéros d'annuaire (lignes) sont affectés à votre téléphone, sélectionnez une ligne dans le menu déroulant Ligne. Étape 5 Dans la zone Indicateur de messages en attente, choisissez parmi les différents paramètres. Généralement, le paramètre par défaut de messages en attente invite votre téléphone à afficher un témoin lumineux rouge fixe sur la bande lumineuse du combiné pour signaler la présence d'un nouveau message vocal. Étape 6 Sélectionnez Enregistrer. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 90 Pages Web Options utilisateur Paramètres de ligne sur le Web Modification du paramètre d'indicateur de message vocal audible par ligne Procédure Étape 1 Depuis votre page Web Options utilisateur, sélectionnez Options utilisateur > Périphérique. Étape 2 Sélectionnez un téléphone dans le menu déroulant Nom. Étape 3 Sélectionnez Paramètres de ligne. Étape 4 Si plusieurs numéros d'annuaire (lignes) sont affectés à votre téléphone, sélectionnez une ligne dans le menu déroulant Ligne. Étape 5 Dans la zone Indicateur de message vocal en attente, choisissez le paramètre souhaité. Étape 6 Sélectionnez Enregistrer. Modification du libellé de ligne pour l'écran du téléphone Procédure Étape 1 Depuis votre page Web Options utilisateur, sélectionnez Options utilisateur > Périphérique. Étape 2 Sélectionnez un téléphone dans le menu déroulant Nom. Étape 3 Sélectionnez Paramètres de ligne. Étape 4 Si plusieurs numéros d'annuaire (lignes) sont affectés à votre téléphone, sélectionnez une ligne dans le menu déroulant Ligne. Étape 5 Dans la zone Libellé de ligne, saisissez un libellé. Étape 6 Sélectionnez Enregistrer. Téléphone et liste d'accès pour Mobile Connect Vous devez ajouter votre téléphone portable (et tous les autres téléphones que vous utilisez) à Cisco Mobile Connect avant de pouvoir passer et recevoir des appels avec les mêmes numéros de répertoire que votre téléphone de bureau. Ces téléphones sont appelés destinations distantes. Vous pouvez également définir des listes d'accès pour interdire ou pour autoriser l'envoi sur votre téléphone portable des appels de certains numéros. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 91 Pages Web Options utilisateur Téléphone et liste d'accès pour Mobile Connect Création d'une liste d'accès Procédure Étape 1 Depuis votre page Web Options utilisateur, sélectionnez Options utilisateur > Paramètres de mobilité > Listes d'accès. Étape 2 Sélectionnez Ajouter un nouveau. Étape 3 (facultatif) Saisissez un nom pour identifier la liste d'accès et donnez une description. Étape 4 Indiquez si la liste d'accès autorise ou bloque les appels indiqués. Étape 5 Sélectionnez Enregistrer. Étape 6 Sélectionnez Ajouter un membre pour ajouter des numéros de téléphone ou des filtres à la liste. Étape 7 Sélectionnez une option dans la liste déroulante Masque de filtre. Vous pouvez filtrer un numéro d'annuaire ou les appels dont l'ID de l'appelant est restreint (Non disponible) ou anonyme (Confidentiel). Étape 8 Si vous sélectionnez un numéro d'annuaire dans la liste déroulante Masque de filtre, saisissez un numéro de téléphone ou un filtre dans le champ Masque NR. Pour définir un filtre, vous pouvez utiliser les caractères génériques ci-dessous : X (majuscule ou minuscule) Remplace un seul chiffre.Par exemple, 408555123X correspond aux numéros compris entre 4085551230 et 4085551239. ! Remplace un nombre indéfini de chiffres. Par exemple, 408! correspond à n'importe quel numéro qui commence par 408. # Remplace un chiffre pour créer une correspondance exacte. Étape 9 Pour ajouter ce membre à la liste d'accès, sélectionnez Enregistrer. Étape 10 Pour enregistrer la liste d'accès, sélectionnez Enregistrer. Ajout d'une nouvelle destination distante Procédure Étape 1 Depuis votre page Web Options utilisateur, sélectionnez Options utilisateur > Paramètres de mobilité > Destinations distantes. Étape 2 Sélectionnez Ajouter un nouveau. Étape 3 Saisissez les informations ci-dessous : Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 92 Pages Web Options utilisateur Téléphone et liste d'accès pour Mobile Connect • Nom : donnez un nom au téléphone portable (ou autre). • Numéro de destination : saisissez votre numéro de téléphone portable. Étape 4 Sélectionnez votre profil de destination distante dans la liste déroulante. Votre profil de destination distante contient les paramètres qui s'appliquent aux destinations distantes que vous créez. Étape 5 Cochez la case Téléphone portable pour autoriser votre destination distante à accepter un appel envoyé depuis votre téléphone de bureau. Étape 6 Cochez la case Activer Mobile Connect pour autoriser votre destination distante à sonner en même temps que votre téléphone de bureau. Étape 7 Sélectionnez l'une des options ci-dessous dans la zone Calendrier des appels : • En permanence : sélectionnez cette option si vous ne voulez pas appliquer de restriction de jour et d'heure pour faire sonner la destination distante. • Comme spécifié ci-dessous: choisissez cette option, puissélectionnez l'une des options ci-dessous pour définir un calendrier des appels en fonction du jour et de l'heure. ◦ Cochez les cases correspondant aux jours de la semaine au cours desquels les appels peuvent faire sonner la destination distante. ◦ Pour chaque jour, sélectionnez Toute la journée ou sélectionnez les heures de début et de fin dans les listes déroulantes. ◦ Sélectionnez le fuseau horaire dans la liste déroulante. Les listes déroulantes du calendrier des appels ne contiennent que les listes d'accès que vous avez créées. Étape 8 Sélectionnez l'une de ces options de sonnerie : • Toujours faire sonner cette destination. • Faire sonner cette destination seulement si l'appelant fait partie de la liste d'accès autorisée sélectionnée. • Ne pas faire sonner cette destination si l'appelant fait partie de la liste d'accès bloquée sélectionnée. Étape 9 Sélectionnez Enregistrer. Cisco WebDialer Cisco WebDialer permet de passer des appels depuis votre téléphone IP Cisco Unified vers des contacts du répertoire via un clic sur des éléments dans un navigateur Web. Votre administrateur système configure cette fonction à votre place. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 93 Pages Web Options utilisateur Cisco WebDialer Utiliser WebDialer avec le répertoire Options utilisateur Procédure Étape 1 Connectez-vous à vos pages Web Options utilisateur. Étape 2 Sélectionnez Options utilisateur > Répertoire, puis recherchez un collègue. Étape 3 Cliquez sur le numéro à composer. Étape 4 Si vous utilisez WebDialer pour la première fois, configurez les préférences dans la page Passage d'un appel. Étape 5 Cliquez sur Composer. Votre téléphone émet l'appel. Étape 6 Pour mettre fin à un appel, cliquez sur Raccrocher ou raccrochez votre téléphone. Utiliser WebDialer avec un autre répertoire d'entreprise en ligne (au lieu du répertoire Options utilisateur) Procédure Étape 1 Connectez-vous à un répertoire d'entreprise compatible WebDialer, puis recherchez des collègues. Étape 2 Cliquez sur le numéro à composer. Étape 3 Lorsque vous y êtes invité, saisissez votre ID utilisateur et votre mot de passe. Étape 4 Si vous utilisez WebDialer pour la première fois, configurez les préférences dans la page Passage d'un appel. Étape 5 Cliquez sur Composer. Votre téléphone émet l'appel. Étape 6 Pour mettre fin à un appel, cliquez sur Raccrocher ou raccrochez votre téléphone. Vous déconnecter de WebDialer Procédure Cliquez sur l'icône Déconnexion dans la page Passage d'un appel ou dans la page Raccrocher. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 94 Pages Web Options utilisateur Cisco WebDialer Configuration, affichage ou modification des préférences de WebDialer Procédure Étape 1 Accédez à la page Passage d'un appel. La page Passage d'un appel s'affiche lorsque vous utilisez WebDialer pour la première fois (après la sélection du numéro à composer). Étape 2 (facultatif) Modifiez vos paramètres. La page Passage d'un appel contient les options ci-dessous : • Langue souhaitée : détermine la langue utilisée pour les paramètres et les invites de WebDialer. • Utilisez le périphérique de votre choix : identifie le téléphone IP Cisco Unified (périphérique qui appelle) et le numéro d'annuaire (ligne qui appelle) que vous allez utiliser pour passer des appels WebDialer. Si votre téléphone dispose d'une seule ligne, ce téléphone et cette ligne sontsélectionnés automatiquement. Sinon, choisissez un téléphone ou une ligne. Si vous avez plusieurs téléphones, l'appareil sera spécifié par type de périphérique et adresse MAC. (Pour afficher l'adresse MAC de votre téléphone, sélectionnez > Paramètres > Configuration réseau > Adresse MAC.) Si vous disposez d'un profil Extension Mobility, vous pouvez sélectionner le périphérique connecté à ce service dans le menu Périphérique appelant. Remarque • Ne pas afficher la confirmation d'appel :si cette option estsélectionnée, elle invite WebDialer à supprimer la page Passage d'un appel. Cette page s'affiche par défaut lorsque vous cliquez sur un numéro de téléphone dans un répertoire en ligne compatible WebDialer. • Désactiver la fermeture automatique : si cette option est sélectionnée, la fenêtre d'appel ne se ferme pas automatiquement au bout de quinze secondes. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 95 Pages Web Options utilisateur Cisco WebDialer Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 96 Pages Web Options utilisateur Cisco WebDialer CHAPITRE 9 Options supplémentaires Votre administrateur système peut configurer votre téléphone de manière à ce que vous puissiez utiliser des modèles spécifiques de boutons et de touches, associés à des fonctions et à des services particuliers. Le tableau ci-dessous présente les options de configuration que vous pouvez demander à votre administrateur système, en fonction de vos besoins en matière des appels ou de votre environnement de travail. Les guides destéléphones et autres documents auxquelsil est fait référence dans ce tableau sont disponibles à l'adresse : http://www.cisco.com/en/US/products/hw/phones/ps379/tsd_products_support_series_ home.html Remarque Si vous... Procédez comme suit... Pour plus d'informations... Contactez votre administrateur système ou l'équipe d'assistance téléphonique. Contactez votre administrateur système pour qu'il configure un ou plusieurs numéros d'annuaire supplémentaires. Avez besoin de plusieurs lignes téléphoniques Reportez-vous à Numérotation simplifiée, à la page 40. Vérifiez d'abord que vous utilisez déjà la totalité des boutons de numérotation simplifiée disponibles. Si vous avez effectivement besoin de boutons de numérotation simplifiée supplémentaires, utilisez la fonction de numérotation simplifiée ou abonnez-vous au service de numérotation simplifiée. Avez besoin de plus de boutons de numérotation simplifiée Reportez-vous à Lignes partagées, à la page 46. Demandez une ligne partagée. Par exemple, cela permet d'utiliser un numéro de poste unique pour les téléphones de votre bureau et de votre laboratoire. Voulez utiliser un même numéro de poste pour plusieurs téléphones Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 97 Si vous... Procédez comme suit... Pour plus d'informations... Contactez votre administrateur système à propos de ces fonctions et reportez-vous aux sections ci-dessous : • Gestion avancée des appels, à la page 39. • Lignes partagées, à la page 46. • Cisco Extension Mobility, à la page 52. Pensez à utiliser : • La fonction de parcage d'appels pourstocker et récupérer des appels sans utiliser la fonction de transfert. • La fonction d'interception d'appels pour répondre à des appels qui sonnent sur un autre téléphone. • Une ligne partagée pour afficher les appels de vos collègues. • La fonction Cisco Extension Mobility pour affecter votre numéro de téléphone et votre profil utilisateur à un téléphone IP Cisco Unified partagé. Partagez vos téléphones ou votre bureau avec des collègues Reportez-vous à Réponse automatique avec casque ou haut-parleur, à la page 61. Contactez votre administrateur système pour configurer la réponse automatique de votre téléphone. Répondez à de nombreux appels ou gérez des appels pour une autre personne Si vous avez besoin d'aide, contactez votre administrateur système et reportez-vous aux documents Guide de l'utilisateur et Guide de démarrage simplifié de Cisco Unified VT Advantage. Pensez à utiliser Cisco Unified Video Advantage pour réaliser des appels vidéo en utilisant votre téléphone IP Cisco Unified, votre PC et une caméra vidéo externe. Devez effectuer des appels vidéo Reportez-vous à Fonctions de supervision de ligne occupée, à la page 48. Contactez votre administrateur pour configurer la Fonction ligne occupée (BLF) sur votre téléphone. Déterminez l'état d'une ligne téléphonique associée à une touche de numérotation simplifiée sur votre téléphone Reportez-vous à Cisco Extension Mobility, à la page 52. Contactez votre administrateur système à propos de Cisco Extension Mobility Service. Voulez affecter temporairement vos numéro de téléphone et paramètres à un téléphone IP Cisco Unified partagé Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 98 Options supplémentaires CHAPITRE 10 Dépannage Cette section fournit des informations de dépannage concernant le téléphone IP Cisco Unified. • Problèmes, page 99 • Données de dépannage du téléphone, page 102 • Outil de génération de rapports qualité, page 102 Problèmes La présente section donne des indications destinées à vous aider à résoudre les problèmes classiques que vous êtes susceptible de rencontrer avec votre téléphone. Pour plus d'informations, contactez votre administrateur système. Pas de tonalité ou impossible de passer un appel Problème Vous n'entendez pas de tonalité ou vous ne parvenez pas à passer un appel. Cause Cela peut être dû à une ou à plusieurs des raisons ci-dessous : • Vous n'êtes pas connecté au service Extension Mobility. • Le système exige un code d'affaire client (CMC) ou un code d'autorisation forcée (FAC) après la composition d'un numéro. (Uniquement sur les téléphones SCCP) • Votre téléphone est soumis à des restrictions horaires qui vous empêchent d'utiliser certaines fonctions à certaines heures de la journée. Solution Essayez la méthode suivante : Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 99 • Connectez-vous au service Extension Mobility. • Saisissez un CMC ou un FAC après avoir composé un numéro. (Uniquement sur les téléphones SCCP) • Modifiez les restrictions horaires qui vous empêchent d'utiliser certaines fonctions à certaines heures de la journée. Pour plus d'informations, contactez votre administrateur système. Touche manquante Problème La touche que vous voulez utiliser ne s'affiche pas. Cause Cela peut être dû à une ou à plusieurs des raisons ci-dessous : • D'autres touches peuvent être affichées. • L'état de la ligne détermine les touches du téléphone. • Votre téléphone n'est pas configuré pour prendre en charge la fonction associée à cette touche. Solution Utilisez l'une des options ci-dessous : • Appuyez sur Autres pour afficher les touches supplémentaires. • Modifiez l'état de la ligne (par exemple, décrocher ou avoir un appel connecté). • Pour pouvoir accéder à cette fonction, contactez votre administrateur système. Impossible d'utiliser la fonction Rappel Problème Le rappel échoue. Cause Votre interlocuteur a peut-être activé la fonction de renvoi d'appels. Message d'erreur de renvoi de tous les appels Problème Le téléphone affiche un message d'erreur lorsque vous tentez de configurer le renvoi de tous les appels. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 100 Dépannage Touche manquante Cause Il est possible que votre tentative de configuration du renvoi de tous les appels directement sur le téléphone soit refusée parce que le numéro cible saisi a pour effet de créer une boucle de renvoi de tous les appels ou de dépasser le nombre maximum de liens autorisés dans une chaîne de renvoi de tous les appels (également appelé nombre maximum de sauts). Solution Pour plus d'informations, contactez votre administrateur système. Le téléphone ne répond pas Problème L'écran du téléphone n'affiche rien et le bouton Affichage est éteint. Cause Le téléphone est arrêté (mode veille) afin d'économiser de l'énergie. Solution Le téléphone se met en marche (réveil) lorsque le système envoie un message de réveil. Vous ne pouvez pas réveiller le téléphone avant l'heure prévue de mise en marche. Message d'erreur de sécurité Problème Votre téléphone affiche Erreur de sécurité. Cause Le micrologiciel de votre téléphone a rencontré une erreur interne. Solution Si le message persiste, contactez votre administrateur système. Impossible d'accéder au menu Paramètres Problème Le menu Paramètre n'est pas disponible dans le menu Application. Cause Votre administrateur système a peut-être désactivé l'option Paramètres sur votre téléphone. Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 101 Dépannage Le téléphone ne répond pas Solution Contactez votre administrateur système. Données de dépannage du téléphone Votre administrateursystème peut vous demander d'accéder à des données d'administration sur votre téléphone en vue du dépannage. Si vous devez... Procédez comme suit... Sélectionnez ( ) > Paramètres > Configuration réseau, puis l'élément de configuration réseau que vous voulez afficher. Accéder aux données de configuration du réseau Sélectionnez ( ) > Paramètres > État,, puis l'élément d'état que vous voulez afficher. Accéder aux données d'état Accéder Sélectionnez ( ) > Paramètres > Caractéristiques. aux caractéristiques du téléphone Accéder Sélectionnez ( ) > Paramètres > État > Statistiques d'appel. aux informations relatives aux appels et à la qualité vocale du téléphone Outil de génération de rapports qualité L'administrateur système peut configurer temporairement votre téléphone avec la fonction Outil de génération de rapports qualité (QRT, Quality Reporting Tool) afin de résoudre les problèmes de performances. Appuyez sur QRT pour soumettre des informations à votre administrateur système. En fonction de la configuration de votre téléphone, l'outil QRT permet : • De signaler immédiatement un problème audio sur un appel en cours • De sélectionner un problème général dans une liste de catégories et de choisir des codes motifs Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 102 Dépannage Données de dépannage du téléphone CHAPITRE 11 Garantie • Conditions générales de la garantie matérielle limitée à un an de Cisco, page 103 Conditions générales de la garantie matérielle limitée à un an de Cisco Des conditions spéciales s'appliquent à votre garantie matérielle et aux services qui sont à votre disposition au cours de la période couverte par la présente garantie. Votre déclaration de garantie formelle, les garanties et les accords de licence applicables aux logiciels Cisco sont disponibles sur Cisco.com à l'adresse : http://www.cisco.com/en/US/docs/general/warranty/English/1Y1DEN__.html Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 103 Guide de l'utilisateur du téléphone IP Cisco Unified 7931G pour Cisco Unified Communications Manager 9.0 (SCCP et SIP) 104 Garantie Conditions générales de la garantie matérielle limitée à un an de Cisco 4-1 Cisco 850 Series and Cisco 870 Series Access Routers Cabling and Setup Quick Start Guide 78-16262-04 CHAPITRE 4 Configuration et câblage des gammes de routeurs d'accès Cisco 850 et Cisco 870 – Guide de démarrage rapide Table des matières • Garantie limitée Cisco d'un an sur le matériel, page 4-2 • Localisation de la référence du produit, page 4-4 • Vérification des éléments livrés avec le routeur, page 4-5 • Routeurs câblés, page 4-7 • Lecture des mises en garde et recommandations relatives à la sécurité, page 4-7 • Connexion de l'antenne au routeur sans fil (opération facultative), page 4-8 • Connexion du module PoE (Power-over-Ethernet) au routeur (opération facultative), page 4-10 • Installations types des gammes de routeurs Cisco 850 et Cisco 870, page 4-12 • Connexion du routeur, page 4-17 • Installation du logiciel SDM et configuration du routeur, page 4-19 • Documentation associée, page 4-20 • Obtention de documentation, page 4-21 Français Chapitre 4 Configuration et câblage des gammes de routeurs d'accès Cisco 850 et Cisco 870 – Guide de démarrage rapide Garantie limitée Cisco d'un an sur le matériel 4-2 Cisco 850 Series and Cisco 870 Series Access Routers Cabling and Setup Quick Start Guide 78-16262-04 • Vos commentaires sur la documentation, page 4-22 • Assistance technique, page 4-22 • Obtention de publications et d'informations complémentaires, page 4-25 Garantie limitée Cisco d'un an sur le matériel Des conditions spécifiques s'appliquent à la garantie de votre matériel et aux prestations de services dont vous pouvez bénéficier pendant la période de validité de cette garantie. Votre déclaration formelle de garantie, qui inclut la garantie et les accords de licence applicables aux logiciels Cisco, est disponible sur le site Cisco.com. Pour accéder aux informations Cisco (Cisco Information Packet), à la garantie et aux accords de licence et les télécharger à partir du site Cisco.com, procédez comme suit : 1. Démarrez votre navigateur et accédez à l'URL suivante : http://www.cisco.com/univercd/cc/td/doc/es_inpck/cetrans.htm La page relative aux accords de licence et aux garanties s'affiche. 2. Pour consulter le Cisco Information Packet, procédez comme suit : a. Dans le champ Information Packet Number (Référence des informations), sélectionnez la référence 78-5235-03A0. b. Sélectionnez la langue souhaitée pour le document. c. Cliquez sur Go (Aller à). La page relative à la garantie limitée Cisco et à la licence d'utilisation du logiciel pour la référence sélectionnée s'affiche. d. Vous pouvez alors consulter le document en ligne ou cliquer sur l'icône PDF pour télécharger et imprimer le document au format PDF (Adobe Portable Document Format). Remarque Vous devez disposer d'Adobe Acrobat Reader pour pouvoir afficher et imprimer les fichiers PDF. Ce programme peut être téléchargé à partir du site Web d'Adobe à l'adresse : http://www.adobe.com 4-3 Cisco 850 Series and Cisco 870 Series Access Routers Cabling and Setup Quick Start Guide 78-16262-04 Chapitre 4 Configuration et câblage des gammes de routeurs d'accès Cisco 850 et Cisco 870 – Guide de démarrage rapide Garantie limitée Cisco d'un an sur le matériel 3. Pour obtenir une traduction des informations relatives à la garantie s'appliquant à votre produit, procédez comme suit : a. Dans le champ correspondant au numéro du document de la garantie, indiquez la référence suivante : 78-10747-01C0 b. Sélectionnez la langue désirée pour le document. c. Cliquez sur Go (Aller à). La page relative à la garantie Cisco s'affiche. d. Vous pouvez alors consulter le document en ligne ou cliquer sur l'icône PDF pour télécharger et imprimer le document au format PDF (Adobe Portable Document Format). Vous pouvez également vous rendre sur le site Web de l'assistance technique et des services Cisco pour obtenir une aide : http://www.cisco.com/public/Support_root.shtml. Durée de la garantie sur le matériel Un (1) an Procédure de remplacement, réparation ou remboursement du matériel Cisco ou son centre de service sera en mesure d'expédier une pièce de rechange dans un délai de dix (10) jours suivant la réception de la demande d'autorisation de retour de matériel (ARM). Le délai effectif de livraison pourra varier en fonction de la destination. Cisco se réserve le droit de rembourser le prix d'achat comme seule garantie. Pour recevoir un numéro d'autorisation de retour de matériel (ARM) Contactez la société auprès de laquelle vous avez acheté le produit. Si vous avez acheté le produit directement auprès de Cisco, contactez votre responsable des ventes Cisco. Chapitre 4 Configuration et câblage des gammes de routeurs d'accès Cisco 850 et Cisco 870 – Guide de démarrage rapide Localisation de la référence du produit 4-4 Cisco 850 Series and Cisco 870 Series Access Routers Cabling and Setup Quick Start Guide 78-16262-04 Complétez les informations ci-dessous et conservez-les comme référence. Localisation de la référence du produit L'étiquette mentionnant la référence du routeur se trouve à l'arrière du châssis, au-dessus des ports réseau Ethernet. (Reportez-vous à la Figure 4-1.) Figure 4-1 Emplacement de la référence du produit Vendeur du produit Numéro de téléphone du vendeur Modèle du produit Référence du produit Numéro du contrat de maintenance 120729, 78-16262-01 Rev A0 G.SHDSL ISDN S/T LAN FE0 FE1 FE2 FE3 Cisco 878 CONSOLE AUX RESET +5,+9 VDC SN: AAANNNNXXXX SN: AAANNNNXXXX 4-5 Cisco 850 Series and Cisco 870 Series Access Routers Cabling and Setup Quick Start Guide 78-16262-04 Chapitre 4 Configuration et câblage des gammes de routeurs d'accès Cisco 850 et Cisco 870 – Guide de démarrage rapide Vérification des éléments livrés avec le routeur Vérification des éléments livrés avec le routeur Le Tableau 4-1 répertorie le nombre d'éléments fournis avec chaque modèle de routeur des gammes Cisco 850 et Cisco 870. La Figure 4-2 représente les différents éléments. Assurez-vous que les éléments indiqués dans le Tableau 4-1 ont bien été livrés avec le routeur. Si l'un des éléments manque ou est endommagé, contactez votre service clientèle. Tableau 4-1 Éléments fournis avec les gammes de routeurs Cisco 850 et Cisco 870 Élément Cisco 851 et Cisco 871 Cisco 857 et Cisco 877 Cisco 876 Cisco 878 Câble Ethernet (direct) 1 1 1 1 Câble DSL1 (pour ADSL et G.SHDSL) 1. DSL = ligne d'abonné numérique. Utilisé pour une ligne d'abonné numérique asynchrone (ADSL) ou une ligne d'abonné numérique symétrique haut débit (G.SHDSL). Un câble RJ-11 à RJ-11 est fourni, à moins que le câble RJ-11 à RJ-45 ne soit spécifié. Non applicable Facultatif Facultatif Facultatif Câble de console 1 1 1 1 Adaptateur secteur 1 1 1 1 Cordon d'alimentation2 2. Les cordons d'alimentation sont commandés en fonction du pays ou de la zone géographique. 1 1 1 1 Documentation Cisco3 3. Inclut le document Regulatory Compliance and Safety Information for Cisco 800 Series Routers (Gamme de routeurs Cisco 800 – Informations relatives au respect des réglementations et à la sécurité) ainsi que le présent document Configuration et câblage des gammes de routeurs d'accès Cisco 850 et Cisco 870 – Guide de démarrage rapide. 1 1 1 1 CD Cisco Router and Security Device Manager (SDM) 1111 Antenne doublet pivotante (pour routeurs sans fil uniquement) Cisco 851 : 1 antenne Cisco 871 : 2 antennes Cisco 857 : 1 antenne Cisco 877 : 2 antennes 2 2 Chapitre 4 Configuration et câblage des gammes de routeurs d'accès Cisco 850 et Cisco 870 – Guide de démarrage rapide Vérification des éléments livrés avec le routeur 4-6 Cisco 850 Series and Cisco 870 Series Access Routers Cabling and Setup Quick Start Guide 78-16262-04 Figure 4-2 Éléments fournis avec les gammes de routeurs Cisco 850 et Cisco 870 Les câbles ci-après ne sont pas fournis avec le routeur. Vous devez les commander séparément. • Câble modem : permet de connecter le port console du routeur à un modem asynchrone pour doter le routeur de fonctionnalités de sauvegarde et de gestion à distance. • Câble S/T RNIS orange : permet de connecter des périphériques au port S/T RNIS. 1 Câble Ethernet jaune 5 Cordon d'alimentation noir pour adaptateur 2 Câble DSL bleu lavande (facultatif) 6 Documentation produit 3 Câble de console bleu clair 7 CD Cisco SDM 4 Adaptateur secteur du routeur 8 Antenne doublet pivotante (pour routeurs sans fil uniquement) 4-7 Cisco 850 Series and Cisco 870 Series Access Routers Cabling and Setup Quick Start Guide 78-16262-04 Chapitre 4 Configuration et câblage des gammes de routeurs d'accès Cisco 850 et Cisco 870 – Guide de démarrage rapide Routeurs câblés Routeurs câblés Le présent document contient des sections non applicables aux modèles câblés des gammes de routeurs Cisco 850 et Cisco 870. Certaines illustrations présentent le routeur doté d'antennes, alors que les routeurs câblés ne sont pas équipés d'antennes ni de connecteurs d'antenne sur le panneau arrière. Toutefois, à l'exception de la section « Connexion de l'antenne au routeur sans fil (opération facultative) », la procédure de connexion des routeurs sans fil est identique à celle des routeurs câblés. Lecture des mises en garde et recommandations relatives à la sécurité Avant d'entreprendre de connecter votre routeur, lisez le document Regulatory Compliance and Safety Information for Cisco 800 Series Routers (Gamme de routeurs Cisco 800 – Informations relatives au respect des réglementations et à la sécurité) fourni avec le routeur. Ce document contient d'importantes mises en garde et recommandations en matière de sécurité. Chapitre 4 Configuration et câblage des gammes de routeurs d'accès Cisco 850 et Cisco 870 – Guide de démarrage rapide Connexion de l'antenne au routeur sans fil (opération facultative) 4-8 Cisco 850 Series and Cisco 870 Series Access Routers Cabling and Setup Quick Start Guide 78-16262-04 Connexion de l'antenne au routeur sans fil (opération facultative) Les routeurs sans fil de la gamme Cisco 850 doivent être utilisés avec une seule antenne de 2,4 GHz. (Reportez-vous à la Figure 4-3.) Les routeurs sans fil de la gamme Cisco 870 sont utilisables avec deux antennes de 2,4 GHz. (Reportez-vous à la Figure 4-4.) Figure 4-3 Routeur sans fil Cisco 857 doté d'une seule antenne LAN ADSLoPOTS FE0 FE1 FE2 FE3 Cisco 857W CONSOLE AUX RESET +5,+12 VDC 122242 SN: XXXNNNNXXXX 4-9 Cisco 850 Series and Cisco 870 Series Access Routers Cabling and Setup Quick Start Guide 78-16262-04 Chapitre 4 Configuration et câblage des gammes de routeurs d'accès Cisco 850 et Cisco 870 – Guide de démarrage rapide Connexion de l'antenne au routeur sans fil (opération facultative) Figure 4-4 Routeur sans fil Cisco 871 doté de deux antennes Pour connecter une ou plusieurs antennes à un routeur sans fil, procédez comme suit : Étape 1 Fixez chaque antenne à un connecteur Neill-Concelman vissé de polarité inversée (RP-TNC) situé à l'arrière du routeur, puis verrouillez le connecteur manuellement. Étape 2 Après avoir fixé l'antenne à l'arrière du routeur, positionnez-la à la verticale. LAN FE0 FE1 FE2 FE3 Cisco 871W CONSOLE AUX RESET +5,+12 VDC LEFT RIGHT / PRIMARY 1 0 WAN FE4 122241 SN: XXXNNNNXXXX Chapitre 4 Configuration et câblage des gammes de routeurs d'accès Cisco 850 et Cisco 870 – Guide de démarrage rapide Connexion du module PoE (Power-over-Ethernet) au routeur (opération facultative) 4-10 Cisco 850 Series and Cisco 870 Series Access Routers Cabling and Setup Quick Start Guide 78-16262-04 Connexion du module PoE (Power-over-Ethernet) au routeur (opération facultative) Si vous avez acheté un module d'alimentation par câble Ethernet (PoE), connectez les quatre câbles Ethernet jaunes du module aux quatre ports Ethernet LAN du routeur. (Reportez-vous à la Figure 4-5.) Assurez-vous de bien connecter les quatre câbles Ethernet. Si les câbles sont trop rapprochés les uns des autres pour cette opération, éloignez le protège-câble en plastique de l'extrémité des câbles équipée des connecteurs. Prudence Pour assurer le bon fonctionnement du module d'alimentation par câble Ethernet (PoE), ne le reliez pas à l'adaptateur secteur avant de l'avoir connecté au routeur. La Figure 4-5 présente le routeur Cisco 871 relié à un module PoE. Notez toutefois que cette connexion fonctionne pour tous les modèles de routeur des gammes Cisco 870. Remarque Lorsque vous connectez un appareil (tel qu'un PC ou un téléphone IP) au module d'alimentation par câble Ethernet (PoE), vous pouvez attendre une à deux secondes avant que le voyant lumineux indique que le port est activé. 4-11 Cisco 850 Series and Cisco 870 Series Access Routers Cabling and Setup Quick Start Guide 78-16262-04 Chapitre 4 Configuration et câblage des gammes de routeurs d'accès Cisco 850 et Cisco 870 – Guide de démarrage rapide Connexion du module PoE (Power-over-Ethernet) au routeur (opération facultative) Figure 4-5 Connexion du module PoE au routeur 1 Routeur de la gamme Cisco 870 5 Adaptateur secteur du routeur 2 Câbles Ethernet du module PoE 6 Fiche secteur PoE 3 Module PoE 7 Fiche secteur du routeur 4 Adaptateur secteur PoE 122351 +5,+12 VDC LEFT RIGHT / PRIMARY LAN FE0 FE1 FE2 FE3 Cisco 871W CONSOLE AUX RESET 1 0 WAN FE4 1 2 4 6 To LAN 0 1 2 3 PWR 3 5 7 SN: XXXNNNNXXXX Chapitre 4 Configuration et câblage des gammes de routeurs d'accès Cisco 850 et Cisco 870 – Guide de démarrage rapide Installations types des gammes de routeurs Cisco 850 et Cisco 870 4-12 Cisco 850 Series and Cisco 870 Series Access Routers Cabling and Setup Quick Start Guide 78-16262-04 Installations types des gammes de routeurs Cisco 850 et Cisco 870 Les installations types des gammes de routeurs Cisco 850 et Cisco 870 sont illustrées de la Figure 4-6 à la Figure 4-9, dans l'ordre suivant : • routeurs Cisco 851 et Cisco 871 : voir la Figure 4-6 ; • routeurs Cisco 857 et Cisco 87 : voir la Figure 4-7 ; • routeur Cisco 876 : voir la Figure 4-8 ; • routeur Cisco 878 : voir la Figure 4-9. La Figure 4-6 présente l'installation type d'un routeur Cisco 851 ou Cisco 871. Cette figure illustre le panneau arrière d'un routeur Cisco 871, équipé de deux ports USB (Universal Serial Bus). Le routeur Cisco 851 ne comporte aucun port USB ; toutefois, les connexions des autres ports du routeur Cisco 851 sont identiques à celles du routeur Cisco 871. 4-13 Cisco 850 Series and Cisco 870 Series Access Routers Cabling and Setup Quick Start Guide 78-16262-04 Chapitre 4 Configuration et câblage des gammes de routeurs d'accès Cisco 850 et Cisco 870 – Guide de démarrage rapide Installations types des gammes de routeurs Cisco 850 et Cisco 870 Figure 4-6 Installation type d'un routeur Cisco 851 ou Cisco 871 1 Connexion Ethernet à un commutateur externe 4 Port console 2 Connexion Ethernet à un PC 5 Adaptateur secteur 3 Connexion WAN (réseau étendu) à Internet à l'aide d'un modem à large bande LAN 4 3 2 1 Cisco 871W CONSOLE AUX RESET +5,+12 VDC LEFT RIGHT / PRIMARY 1 0 WAN FE0 FE1 FE2 FE3 FE4 1X 2X 1X 2X 1 Internet 1 2 3 4 5 122237 SN: XXXNNNNXXXX Chapitre 4 Configuration et câblage des gammes de routeurs d'accès Cisco 850 et Cisco 870 – Guide de démarrage rapide Installations types des gammes de routeurs Cisco 850 et Cisco 870 4-14 Cisco 850 Series and Cisco 870 Series Access Routers Cabling and Setup Quick Start Guide 78-16262-04 La Figure 4-7 présente l'installation type d'un routeur Cisco 857 ou Cisco 877. Figure 4-7 Installation type d'un routeur Cisco 857 ou Cisco 877 1 Connexion Ethernet à un commutateur externe 4 Port console 2 Connexion Ethernet à un PC 5 Adaptateur secteur 3 Connexion ADSL sur POTS (service téléphonique traditionnel) RIGHT / PRIMARY ETHERNET LAN ADSLoPOTS 3 2 1 0 Cisco 877W CONSOLE AUX RESET +5,+12 VDC LEFT FE4 FE3 FE2 FE1 1X 2X 1X 2X 1 1 2 3 5 122238 4 SN: XXXNNNNXXXX 4-15 Cisco 850 Series and Cisco 870 Series Access Routers Cabling and Setup Quick Start Guide 78-16262-04 Chapitre 4 Configuration et câblage des gammes de routeurs d'accès Cisco 850 et Cisco 870 – Guide de démarrage rapide Installations types des gammes de routeurs Cisco 850 et Cisco 870 La Figure 4-8 présente l'installation type d'un routeur Cisco 876. Figure 4-8 Installation type d'un routeur Cisco 876 1 Connexion Ethernet à un commutateur externe 4 Connexion ADSL sur RNIS 2 Connexion Ethernet à un PC 5 Port console 3 Connexion S/T RNIS 6 Adaptateur secteur LAN ISDN S/T ADSL o ISDN FE0 FE1 FE2 FE3 Cisco 876W CONSOLE AUX RESET +5,+12 VDC LEFT RIGHT / PRIMARY 1X 2X 1X 2X 1 1 2 6 122239 3 4 5 SN: XXXNNNNXXXX Chapitre 4 Configuration et câblage des gammes de routeurs d'accès Cisco 850 et Cisco 870 – Guide de démarrage rapide Installations types des gammes de routeurs Cisco 850 et Cisco 870 4-16 Cisco 850 Series and Cisco 870 Series Access Routers Cabling and Setup Quick Start Guide 78-16262-04 La Figure 4-9 présente l'installation type d'un routeur Cisco 878. Figure 4-9 Installation type d'un routeur Cisco 878 1 Connexion Ethernet à un commutateur externe 4 Connexion G.SHDSL 2 Connexion Ethernet à un PC 5 Port console 3 Connexion S/T RNIS 6 Adaptateur secteur LAN ISDN S/T G.SHDSL FE0 FE1 FE2 FE3 Cisco 878W CONSOLE AUX RESET +5,+12 VDC LEFT RIGHT / PRIMARY 1X 2X 1X 2X 1 1 2 3 4 6 122240 5 SN: XXXNNNNXXXX 4-17 Cisco 850 Series and Cisco 870 Series Access Routers Cabling and Setup Quick Start Guide 78-16262-04 Chapitre 4 Configuration et câblage des gammes de routeurs d'accès Cisco 850 et Cisco 870 – Guide de démarrage rapide Connexion du routeur Connexion du routeur Connectez le routeur en vous reportant à l'installation type de votre modèle de routeur illustrée à la section « Installations types des gammes de routeurs Cisco 850 et Cisco 870 » la section sur la page 4-12. Procédez comme suit pour connecter le routeur à l'adaptateur secteur, à votre réseau local et au réseau de votre fournisseur d'accès : Étape 1 Modèles sans fil uniquement : vérifiez que les antennes ont été fixées au routeur conformément aux instructions de la section « Connexion de l'antenne au routeur sans fil (opération facultative) » la section sur la page 4-8. Étape 2 Si vous utilisez un module PoE, assurez-vous qu'il est connecté au routeur (reportez-vous à la section « Connexion du module PoE (Power-over-Ethernet) au routeur (opération facultative) » la section sur la page 4-10). Connectez les périphériques Ethernet au module PoE, mais non au routeur. Étape 3 Si vous connectez plus de quatre PC au routeur, raccordez ce dernier à un commutateur ou à un concentrateur à l'aide d'un câble Ethernet jaune, comme illustré de la Figure 4-6 à la Figure 4-9. Étape 4 Connectez un PC directement au routeur, comme illustré de la Figure 4-6 à la Figure 4-9. Mettez le PC hors tension afin qu'il obtienne une adresse IP du routeur lorsqu'il sera remis sous tension. Vous pouvez connecter d'autres PC aux ports Ethernet numérotés restants. Étape 5 Le port console est un port de service auquel vous pouvez connecter un terminal ou un PC pour configurer le logiciel à l'aide de l'interface CLI (interface de ligne de commande) ou pour résoudre les problèmes rencontrés avec le routeur. Si vous avez besoin d'accéder à la console du routeur, connectez un PC ou un terminal au port console. Remarque En connectant le port console à un modem asynchrone à l'aide du câble modem pour routeur disponible en option, vous pouvez doter le routeur de fonctionnalités de sauvegarde et de gestion à distance. Étape 6 Routeurs Cisco 851 et Cisco 871 uniquement : connectez le second câble Ethernet jaune entre le port WAN Ethernet du routeur et un port disponible sur un modem DSL, câblé ou Ethernet LRE (longue portée) déjà installé, comme illustré à la Figure 4-6. Pour choisir le port de connexion sur le modem, suivez les instructions livrées avec votre modem à large bande. Si ce dernier est éteint, mettez-le sous tension. Chapitre 4 Configuration et câblage des gammes de routeurs d'accès Cisco 850 et Cisco 870 – Guide de démarrage rapide Connexion du routeur 4-18 Cisco 850 Series and Cisco 870 Series Access Routers Cabling and Setup Quick Start Guide 78-16262-04 Étape 7 Routeur Cisco 871 uniquement : Connectez les périphériques USB pris en charge, tels que des modules de mémoire Flash ou des eTokens, aux deux ports USB. Pour plus d'informations, reportez-vous au document Cisco Access Router USB Flash Module and USB eToken Hardware Installation Guide (Modules Flash USB et eTokens USB pour routeurs d'accès Cisco – Guide d'installation matérielle), puis passez à l'Étape 12. Étape 8 Routeurs Cisco 857 et Cisco 877 uniquement : connectez le port ADSLoPOTS du routeur à la prise téléphonique murale à l'aide du câble DSL bleu lavande. Si la ligne ADSL sert aussi à la communication vocale, vous pouvez empêcher toute interruption de la transmission de données en connectant le routeur à un filtre ADSL ou en installant des microfiltres entre les téléphones ou les télécopieurs et la prise murale. Passez à l'Étape 12. Étape 9 Routeurs Cisco 876 et Cisco 878 uniquement : pour disposer de fonctions de sauvegarde et de gestion à distance, vous pouvez connecter le port S/T RNIS à une terminaison réseau (NT1) ou à un filtre ADSL à l'aide du câble S/T RNIS orange (disponible en option). Passez à l'Étape 10 ou à l'Étape 11, selon le modèle de routeur dont vous disposez. Étape 10 Routeurs Cisco 876 uniquement : branchez le câble DSL sur le port ADSLoRNIS du routeur et sur le filtre ADSL ou sur la prise murale. Si vous utilisez un filtre ADSL, connectez-le à la prise murale à l'aide d'un câble à paire torsadée non blindée de catégorie 5. Passez à l'Étape 12. Étape 11 Routeurs Cisco 878 uniquement : branchez le câble DSL sur le port G.SHDSL du routeur et sur la prise murale. Étape 12 Tous les modèles de routeurs : raccordez le cordon d'alimentation au routeur, puis mettez le routeur sous tension. Assurez-vous d'utiliser l'adaptateur secteur livré avec le routeur. Le routeur n'accepte pas d'autres adaptateurs secteur. Lorsque vous connectez le routeur à une source d'alimentation, le témoin vert OK du panneau avant du routeur doit s'allumer. Le routeur est alors prêt à l'emploi. Si le témoin vert OK ne s'allume pas, reportez-vous au chapitre « Troubleshooting » (« Dépannage ») du document Cisco 850 Series and Cisco 870 Series Routers Hardware Installation Guide (Gammes de routeurs Cisco 850 et Cisco 870 – Guide d'installation matérielle). 4-19 Cisco 850 Series and Cisco 870 Series Access Routers Cabling and Setup Quick Start Guide 78-16262-04 Chapitre 4 Configuration et câblage des gammes de routeurs d'accès Cisco 850 et Cisco 870 – Guide de démarrage rapide Installation du logiciel SDM et configuration du routeur Remarque Dans le cas des routeurs Cisco 857, Cisco 876, Cisco 877 et Cisco 878, la ligne DSL doit avoir été fournie par votre fournisseur d'accès et être correctement configurée. Vérifiez l'état de détection de porteuse (CD) indiqué par le témoin CD ADSL ou G.SHDSL du routeur. Si le témoin CD ADSL ou G.SHDSL ne s'allume pas, contactez votre fournisseur d'accès. Étape 13 Si vous avez connecté un module PoE au routeur, branchez l'adaptateur secteur du module PoE sur la prise d'entrée située sur le panneau arrière du module. Le témoin vert situé sur le panneau avant du module PoE s'allume et les périphériques connectés au module sont alimentés. Pour obtenir des instructions de connexion détaillées, reportez-vous au document Cisco 850 Series and Cisco 870 Series Routers Hardware Installation Guide (Gammes de routeurs Cisco 850 et Cisco 870 – Guide d'installation matérielle). Installation du logiciel SDM et configuration du routeur Pour installer le logiciel Cisco SDM permettant de configurer le routeur, procédez comme suit : Étape 1 Connectez un PC à n'importe quel port LAN du routeur, comme illustré de la Figure 4-7, Figure 4-8 et Figure 4-9. Étape 2 Insérez le CD du logiciel Cisco SDM dans le lecteur de CD du PC. Un assistant d'installation s'exécute à partir du CD. Installez le logiciel Cisco SDM en suivant les instructions de l'interface utilisateur de l'assistant d'installation. Étape 3 Utilisez le logiciel Cisco SDM pour configurer le routeur conformément aux instructions du document Cisco Router and Security Device Manager (SDM) Quick Start Guide (Guide de démarrage rapide de SDM). Chapitre 4 Configuration et câblage des gammes de routeurs d'accès Cisco 850 et Cisco 870 – Guide de démarrage rapide Documentation associée 4-20 Cisco 850 Series and Cisco 870 Series Access Routers Cabling and Setup Quick Start Guide 78-16262-04 Documentation associée Le présent document décrit les procédures élémentaires de câblage et de configuration des gammes de routeurs Cisco 850 et Cisco 870. Pour plus d'informations, reportez-vous aux documents suivants : • Cisco 850 Series and Cisco 870 Series Access Routers Hardware Installation Guide (Gammes de routeurs d'accès Cisco 850 et Cisco 870 – Guide d'installation matérielle) : fournit des informations détaillées concernant le câblage et le matériel des routeurs Cisco 850 et Cisco 870. • Cisco Router and Security Device Manager (SDM) Quick Start Guide (Guide de démarrage rapide de SDM) : fournit des instructions détaillées concernant la configuration du routeur et des fonctionnalités sans fil de ce dernier à l'aide de l'interface utilisateur graphique Cisco SDM. • Cisco 850 Series and Cisco 870 Series Access Routers Software Configuration Guide (Gammes de routeurs d'accès Cisco 850 et Cisco 870 – Guide de configuration logicielle) : fournit des informations et des exemples de configuration logicielle des routeurs Cisco 850 et Cisco 870. • Cisco Access Router Wireless Configuration Guide (Routeurs d'accès Cisco – Guide de configuration sans fil) : fournit des informations concernant la configuration logicielle sans fil des routeurs d'accès Cisco, englobant les gammes de routeurs Cisco 850 et Cisco 870. • Upgrading Memory in Cisco 800 Series Routers (Routeurs Cisco 800 – Mise à niveau de la mémoire) : fournit des informations sur la mise à niveau de la mémoire des routeurs Cisco 800. • Regulatory Compliance and Safety Information for Cisco 800 Series and SOHO Series Routers (Routeurs des gammes Cisco 800 et SOHO – Informations relatives au respect des réglementations et à la sécurité) : fournit des informations sur les normes de sécurité et les réglementations internationales pour les routeurs des gammes Cisco 800 et SOHO. • Cisco Access Router USB Flash Module and USB eToken Hardware Installation Guide (Modules Flash USB et eTokens USB pour routeurs d'accès Cisco – Guide d'installation matérielle) fournit des informations concernant l'installation de modules de mémoire Flash et d'eTokens USB. 4-21 Cisco 850 Series and Cisco 870 Series Access Routers Cabling and Setup Quick Start Guide 78-16262-04 Chapitre 4 Configuration et câblage des gammes de routeurs d'accès Cisco 850 et Cisco 870 – Guide de démarrage rapide Obtention de documentation Ces documents sont tous disponibles sur Internet. La documentation Cisco la plus récente est disponible sur Internet à partir des sites suivants : • http://www.cisco.com • http://www-china.cisco.com • http://www-europe.cisco.com Obtention de documentation La documentation Cisco est disponible sur le site Cisco.com. Cisco propose également divers moyens pour obtenir une assistance technique et d'autres ressources techniques. Les sections qui suivent expliquent comment obtenir des informations techniques de Cisco Systems. Cisco.com Vous pouvez accéder à la documentation Cisco la plus récente à l'adresse suivante : http://www.cisco.com/cisco/web/psa/default.html?mode=prod Vous pouvez accéder au site Web de Cisco à l'adresse suivante : http://www.cisco.com Vous pouvez accéder aux sites Web internationaux de Cisco à l'adresse suivante : http://www.cisco.com/public/countries_languages.shtml Commande de documentation Vous trouverez les instructions de commande de documentation à l'adresse suivante : http://www.cisco.com/univercd/cc/td/doc/es_inpck/pdi.htm Chapitre 4 Configuration et câblage des gammes de routeurs d'accès Cisco 850 et Cisco 870 – Guide de démarrage rapide Vos commentaires sur la documentation 4-22 Cisco 850 Series and Cisco 870 Series Access Routers Cabling and Setup Quick Start Guide 78-16262-04 Vous pouvez commander de la documentation Cisco en procédant comme suit : • Les utilisateurs inscrits sur Cisco.com (clients directs de Cisco) peuvent commander de la documentation à l'adresse suivante : http://www.cisco.com/en/US/partner/ordering/index.shtml • Les utilisateurs non inscrits sur Cisco.com peuvent se procurer de la documentation par l'intermédiaire d'un représentant de compte local en appelant le siège social de Cisco Systems (Californie, États-Unis) au numéro 408 526-7208 ou, en dehors des États-Unis, en composant le 1 800 553-NETS (6387). Vos commentaires sur la documentation Vous pouvez envoyer vos commentaires sur la documentation technique à l'adresse bug-doc@cisco.com. Pour envoyer vos commentaires par courrier ordinaire, utilisez le coupon-réponse situé au verso de la couverture de votre document ou, à défaut, écrivez à l'adresse suivante : Cisco Systems Attn : Customer Document Ordering 170 West Tasman Drive San Jose, CA 95134-9883 Vos commentaires sont les bienvenus. Assistance technique Pour tous les clients, partenaires, revendeurs et distributeurs en possession de contrats de service Cisco valides, le centre d'assistance technique Cisco propose une assistance hors pair disponible 24 heures sur 24. Le site Web d'assistance technique Cisco sur Cisco.com offre des ressources en ligne très complètes. En outre, le centre d'assistance technique (TAC) Cisco fournit une assistance téléphonique. Si vous ne disposez pas d'un contrat de service Cisco valide, contactez votre revendeur. 4-23 Cisco 850 Series and Cisco 870 Series Access Routers Cabling and Setup Quick Start Guide 78-16262-04 Chapitre 4 Configuration et câblage des gammes de routeurs d'accès Cisco 850 et Cisco 870 – Guide de démarrage rapide Assistance technique Site Web d'assistance technique Cisco Ce site propose des documents et outils en ligne pour dépanner et résoudre les problèmes techniques liés aux technologies et produits Cisco. Il est disponible 24 heures sur 24, 365 jours par an, à l'adresse suivante : http://www.cisco.com/techsupport Pour accéder aux outils du site, vous devez être inscrit à Cisco.com et posséder un ID utilisateur ainsi qu'un mot de passe. Si vous êtes en possession d'un contrat de service valide, mais que vous n'avez ni ID utilisateur ni mot de passe, connectez-vous à l'adresse suivante pour vous inscrire : http://tools.cisco.com/RPF/register/register.do Remarque Avant de demander une assistance par Internet ou par téléphone, utilisez l'outil d'identification produit Cisco (CPI) pour déterminer votre référence produit. Pour accéder à l'outil CPI à partir du site Web d'assistance technique Cisco, cliquez sur le lien Tools & Resources (Outils et ressources) sous Documentation & Tools (Documentation et outils). Sélectionnez l'option Cisco Product Identification Tool (Outil d'identification produit Cisco) dans la liste déroulante Alphabetical Index (Index alphabétique), ou cliquez sur le lien Cisco Product Identification Tool sous Alerts & RMAs (Alertes et RMA). L'outil CPI vous propose trois options de recherche : par ID produit ou nom de modèle, par arborescence, ou, dans le cas de certains produits, par copier-coller du résultat de la commande show (afficher). Les résultats de la recherche vous présentent votre produit en mettant en surbrillance l'étiquette mentionnant sa référence. Localisez cette étiquette sur votre produit, puis notez cette information avant d'effectuer votre demande d'assistance. Chapitre 4 Configuration et câblage des gammes de routeurs d'accès Cisco 850 et Cisco 870 – Guide de démarrage rapide Assistance technique 4-24 Cisco 850 Series and Cisco 870 Series Access Routers Cabling and Setup Quick Start Guide 78-16262-04 Soumission d'une demande de service L'outil de demande de service en ligne sur le TAC constitue le moyen le plus rapide de soumettre des demandes de service S3 et S4. (Ces demandes correspondent à une dégradation minimale du fonctionnement de votre réseau ou à une demande d'information produit.) Lorsque vous avez décrit la situation, l'outil de demande de service du TAC vous propose les solutions recommandées. Si ces solutions ne permettent pas de résoudre le problème, votre demande de service est affectée à un ingénieur du TAC Cisco. Vous trouverez l'outil de demande de service du TAC à l'adresse suivante : http://www.cisco.com/techsupport/servicerequest Pour les demandes de service S1 ou S2 ou dans le cas où vous n'avez pas d'accès à Internet, contactez le TAC Cisco par téléphone. (Vous soumettez ce type de demandes lorsque votre réseau d'exploitation est très dégradé ou paralysé.) Ces demandes sont immédiatement affectées aux ingénieurs du TAC Cisco pour préserver le bon fonctionnement de vos activités. Pour soumettre une demande de service par téléphone, composez l'un des numéros suivants : Asie-Pacifique : +61 2 8446 7411 (Australie : 1 800 805 227) Zone EMEA : +32 2 704 55 55 États-Unis : 1 800 553-2447 Pour consulter la liste complète des contacts du TAC Cisco, rendez-vous à l'adresse : http://www.cisco.com/techsupport/contacts Définition de la gravité des demandes de service Cisco a défini des niveaux de gravité afin que toutes les demandes de service soient soumises dans un format standard. Gravité 1 (S1) : votre réseau est « paralysé » ou la situation a un impact très négatif sur vos activités professionnelles. Vous et Cisco engagerez 24 heures sur 24 toutes les ressources nécessaires pour résoudre le problème. 4-25 Cisco 850 Series and Cisco 870 Series Access Routers Cabling and Setup Quick Start Guide 78-16262-04 Chapitre 4 Configuration et câblage des gammes de routeurs d'accès Cisco 850 et Cisco 870 – Guide de démarrage rapide Obtention de publications et d'informations complémentaires Gravité 2 (S2) : le fonctionnement d'un réseau existant est très dégradé ou des aspects importants de vos activités professionnelles sont affectés par les performances inadéquates des produits Cisco. Vous et Cisco engagerez des ressources à temps plein pendant les heures de bureau normales pour résoudre le problème. Gravité 3 (S3) : les performances de votre réseau sont affectées mais la plupart de vos activités professionnelles restent fonctionnelles. Vous et Cisco engagerez des ressources pendant les heures de bureau normales pour rétablir des niveaux de service satisfaisants. Gravité 4 (S4) : vous avez besoin d'informations ou d'assistance concernant des fonctionnalités, l'installation ou la configuration de produits Cisco. L'impact sur vos activités professionnelles est faible, voire nul. Obtention de publications et d'informations complémentaires Des informations sur les produits, les technologies et les solutions réseau Cisco sont disponibles en ligne et sous forme imprimée. • La boutique Cisco Marketplace offre un grand choix d'ouvrages, de guides de référence et de produits Cisco. Pour la découvrir, rendez-vous à l'adresse suivante : http://www.cisco.com/go/marketplace/ • Le Catalogue des produits Cisco détaille les produits réseau proposés par Cisco Systems, ainsi que les services clients gérant les commandes et les demandes d'assistance. Vous pouvez accéder au Catalogue des produits Cisco à l'adresse suivante : http://cisco.com/univercd/cc/td/doc/pcat/ • Cisco Press publie une large gamme d'ouvrages traitant de l'administration réseau, des formations et des certifications. Les utilisateurs débutants comme les plus expérimentés y trouveront des informations utiles. Pour connaître les dernières publications de Cisco Press et consulter d'autres informations, visitez le site de Cisco Press à l'adresse suivante : http://www.ciscopress.com Chapitre 4 Configuration et câblage des gammes de routeurs d'accès Cisco 850 et Cisco 870 – Guide de démarrage rapide Obtention de publications et d'informations complémentaires 4-26 Cisco 850 Series and Cisco 870 Series Access Routers Cabling and Setup Quick Start Guide 78-16262-04 • Le magazine Packet destiné aux utilisateurs techniques de Cisco Systems détaille comment optimiser les investissements Internet et réseau. Chaque trimestre, il présente les dernières tendances en matière de réseaux, les innovations technologiques ainsi que les produits et solutions Cisco. Il donne des conseils pour le déploiement et le dépannage des réseaux et propose des exemples de configuration, des études de cas relatives à la clientèle, des informations sur les certifications et les formations, ainsi que des liens vers des ressources plus détaillées accessibles en ligne. Vous pouvez accéder au magazine Packet à l'adresse suivante : http://www.cisco.com/packet • Le journal trimestriel Internet Protocol Journal publié par Cisco Systems s'adresse aux ingénieurs concernés par la conception, le développement et l'exploitation de réseaux Internet et intranet publics et privés. Vous pouvez y accéder à l'adresse suivante : http://www.cisco.com/ipj • Cisco propose des formations de niveau international sur les réseaux. Les programmes en vigueur sont présentés à l'adresse suivante : http://www.cisco.com/en/US/learning/index.html