Cisco Application Policy Infrastructure Controller Enterprise Module User Guide

Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x First Published: 2015-11-02 Last Modified: 2017-10-23 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com go trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1721R) © 2017 Cisco Systems, Inc. All rights reserved. CONTENTS Preface vii Audience vii Document Conventions vii Related Documentation viii Obtaining Documentation and Submitting a Service Request x CHAPTER 1 New and Changed Information 1 New and Changed Information 1 CHAPTER 2 Overview 3 About the Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM) 3 Logging into the Cisco APIC-EM 6 Cisco APIC-EM GUI 7 CHAPTER 3 Device Configuration Prerequisites 13 Required Platform Configurations 13 NETCONF Configuration 14 SNMP Trap Configuration 14 IP Device Tracking Configuration 15 Wireless LAN Controller Configuration 15 CHAPTER 4 Discovering Devices and Hosts 17 About Discovery 17 Understanding Discovery Credentials 18 Global Credentials 18 Job Specific Credentials 19 Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x iii Contents Discovery Credentials Example 19 Discovery Credentials Rules 20 Discovery Credentials Caveats 21 Configuring Global Discovery Credentials 22 Configuring CLI Credentials 22 Configuring SNMP 23 Configuring SNMPv2c 24 Configuring SNMPv3 26 Configuring SNMP Properties 29 Enabling Device Controllability 31 Configuring the Polling Interval 32 Performing Discovery 33 Performing Discovery Using CDP 33 Performing Discovery Using an IP Address Range 38 Copying a Discovery Job 41 Stopping and Starting a Discovery Job 42 Deleting a Discovery Job 42 Understanding the Discovery Results 43 CHAPTER 5 Managing Devices and Hosts 47 Managing Your Device Inventory 47 Device Inventory Information 48 Device Inventory Tasks 54 Adding a Device Manually 55 Deleting a Device 57 Filtering Devices in the Device Inventory Window 58 Changing the Devices Layout View 59 Changing the Device Role 60 Adding or Removing a Device Tag in Device Inventory 62 Adding or Removing a Policy Tag in Device Inventory 63 Adding or Removing Location Tags 64 Adding or Changing a Location Marker 66 Deleting a Tag 67 Updating Device Credentials 68 Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x iv Contents Resynchronizing Device Information 71 Running Commands on Devices 71 Updating a Device's Polling Interval 72 Managing Your Host Inventory 73 Filtering Hosts in the Host Inventory Window 74 CHAPTER 6 Using the Topology Map 77 About Topology 77 Topology Toolbar 78 Topology Icons 82 Displaying Device Data 83 Aggregating Devices 84 Aggregating Devices in the Topology Window 84 Disaggregating Devices in the Topology Window 86 Changing the Aggregated Devices Label 87 Configuring the Topology Structure 88 Saving a Topology Layout 90 Opening a Saved Topology Layout 91 Changing a Device's Role From the Topology Window 92 Searching for Devices and Hosts 93 Adding or Removing a Device Tag in Topology 95 Adding or Removing a Policy Tag in Topology 96 Displaying Devices with Tags 97 Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x v Contents Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x vi Preface Audience This publication is intended for experienced network administrators who will configure and maintain the Cisco Application Policy Infrastructure Controller Enterprise Module (Cisco APIC-EM). This guide is part of a documentation set that is designed to help you install, troubleshoot, and upgrade your Cisco APIC-EM. For a complete list of the Cisco APIC-EM documentation set, see Related Documentation, on page viii. Note In this guide, the Cisco Application Policy Infrastructure Controller Enterprise Module (Cisco APIC-EM) is also referred to as the controller. Document Conventions This documentation uses the following conventions: Convention Description ^ or Ctrl The ^ and Ctrl symbols represent the Control key. For example, the key combination ^D or Ctrl-D means hold down the Control key while you press the D key. Keys are indicated in capital letters but are not case sensitive. string A string is a unquoted set of characters shown in italics. For example, when setting an SNMP community string to public, do not use quotation marks around the string or the string will include the quotation marks. Command syntax descriptions use the following conventions: Convention Description bold Bold text indicates commands and keywords that you enter exactly as shown. italics Italic text indicates arguments for which you supply values. [x] Square brackets enclose an optional element (keyword or argument). | A vertical line indicates a choice within an optional or required set of keywords or arguments. [x | y] Square brackets enclosing keywords or arguments separated by a vertical line indicate an optional choice. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x vii Preface Related Documentation Convention Description {x | y} Braces enclosing keywords or arguments separated by a vertical line indicate a required choice. Nested sets of square brackets or braces indicate optional or required choices within optional or required elements. For example: Convention Description [x {y | z}] Braces and a vertical line within square brackets indicate a required choice within an optional element. Examples use the following conventions: Convention Description screen Examples of information displayed on the screen are set in Courier font. bold screen Examples of text that you must enter are set in Courier bold font. <> Angle brackets enclose text that is not printed to the screen, such as passwords. ! An exclamation point at the beginning of a line indicates a comment line. [] Square brackets enclose default responses to system prompts. Caution Means reader be careful. In this situation, you might do something that could result in equipment damage or loss of data. Note Means reader take note. Notes contain helpful suggestions or references to materials that may not be contained in this manual. Related Documentation This section lists the Cisco APIC-EM and related documents available on Cisco.com at the following url: http://www.cisco.com/c/en/us/support/cloud-systems-management/one-enterprise-network-controller/tsd-products-support-series-home.html • Cisco APIC-EM Documentation: • Cisco Application Policy Infrastructure Controller Enterprise Module Release Notes Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x viii Preface Preface • Cisco APIC-EM Quick Start Guide (directly accessible from the controller's GUI) • Cisco Application Policy Infrastructure Controller Enterprise Module Installation Guide • Cisco Application Policy Infrastructure Controller Enterprise Module Upgrade Guide • Cisco Application Policy Infrastructure Controller Enterprise Module Administrator Guide • Cisco Application Policy Infrastructure Controller Enterprise Module Troubleshooting Guide • Open Source Used In Cisco APIC-EM • Cisco EasyQoS Application for Cisco APIC-EM • Cisco EasyQoS Application for APIC-EM Release Notes • Cisco EasyQoS Application for APIC-EM Supported Platforms • Cisco EasyQoS Application for APIC-EM User Guide • Cisco Network Visibility Application for the Cisco APIC-EM • Cisco Network Visibility Application for APIC-EM Release Notes • Cisco Network Visibility Application for APIC-EM Supported Platforms • Cisco Network Visibility Application for APIC-EM User Guide • Cisco Path Trace Application for Cisco APIC-EM • Cisco Path Trace Application for APIC-EM Release Notes • Cisco Path Trace Application for APIC-EM Supported Platforms • Cisco Path Trace Application for APIC-EM User Guide • Cisco IWAN Documentation for the Cisco APIC-EM: • Release Notes for Cisco IWAN • Release Notes for Cisco Intelligent Wide Area Network Application (Cisco IWAN App) • Configuration Guide for Cisco IWAN on Cisco APIC-EM • Software Configuration Guide for Cisco IWAN on APIC-EM • Open Source Used in Cisco IWAN and Cisco Network Plug and Play • Cisco Network Plug and Play Documentation for the Cisco APIC-EM: • Release Notes for Cisco Network Plug and Play • Solution Guide for Cisco Network Plug and Play • Configuration Guide for Cisco Network Plug and Play on Cisco APIC-EM • Cisco Network Plug and Play Agent Configuration Guide or Cisco Open Plug-n-Play Agent Configuration Guide (depending on the Cisco IOS XE release) • Mobile Application User Guide for Cisco Network Plug and Play Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x ix Preface Obtaining Documentation and Submitting a Service Request • Cisco Active Advisor Documentation for the Cisco APIC-EM: • Cisco Active Advisor for APIC-EM Release Notes • Cisco Integrity Verification Documentation for the Cisco APIC-EM: • Cisco Integrity Verification Application (Beta) for APIC-EM Release Notes • Cisco Integrity Verification Application (Beta) for APIC-EM User Guide • Cisco Remote Troubleshooter Documentation for the Cisco APIC-EM: • Cisco Remote Troubleshooter Application for APIC-EM Release Notes • Cisco Remote Troubleshooter Application for APIC-EM User Guide Note For information about developing your own application that interacts with the controller by means of the northbound REST API, see the https://developer.cisco.com/site/apic-em/ Web site. Obtaining Documentation and Submitting a Service Request For information on obtaining documentation, submitting a service request, and gathering additional information, see the monthly What's New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation at: http://www.cisco.com/c/en/us/td/docs/general/whatsnew/whatsnew.html. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x x CHAPTER 1 New and Changed Information • New and Changed Information, on page 1 New and Changed Information The Cisco APIC-EM software release provides the following new network visibility applications (Discovery, Inventory, Host) features and functionality: • Support for Cisco 4221 Series Integrated Services Routers (ISR). • Support for Cisco 1100 Series Integrated Service Routers (ISR). Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 1 New and Changed Information New and Changed Information Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 2 CHAPTER 2 Overview • About the Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM), on page 3 • Logging into the Cisco APIC-EM, on page 6 • Cisco APIC-EM GUI, on page 7 About the Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM) The Cisco Application Policy Infrastructure Controller - Enterprise Module (APIC-EM) is Cisco's Software Defined Networking (SDN) Controller for Enterprise Networks (Access, Campus, WAN and Wireless). The platform hosts multiple applications (SDN apps) that use open northbound REST APIs that drive core network automation solutions. The platform also supports a number of south-bound protocols that enable it to communicate with the breadth of network devices that customers already have in place, and extend SDN benefits to both greenfield and brownfield environments. The Cisco APIC-EM platform supports both wired and wireless enterprise networks across the Campus, Branch and WAN infrastructures. It offers the following benefits: • Creates an intelligent, open, programmable network with open APIs • Saves time, resources, and costs through advanced automation • Transforms business intent policies into a dynamic network configuration • Provides a single point for network wide automation and control The following table describes the features and benefits of the Cisco APIC-EM. Table 1: Cisco APIC Enterprise Module Features and Benefits Feature Description Network Information Database The Cisco APIC-EM periodically scans the network to create a “single source of truth” for IT. This inventory includes all network devices, along with an abstraction for the entire enterprise network. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 3 Overview About the Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM) Feature Description Network topology visualization The Cisco APIC-EM automatically discovers and maps network devices to a physical topology with detailed device-level data. The topology of devices and links can also be presented on a geographical map. You can use this interactive feature to troubleshoot your network. EasyQoS application The EasyQoS application abstracts away the complexity of deploying Quality of Service across a heterogeneous network. It presents users with a workflow that allows them to think of QoS in terms of business intent policies that are then translated by Cisco APIC-EM into a device centric configuration. Cisco Network Plug and Play (PnP) application The Cisco Network PnP solution extends across Cisco's enterprise portfolio. It provides a highly secure, scalable, seamless, and unified zero-touch deployment experience for customers across Cisco routers, switches and wireless access points. Note Cisco Intelligent WAN (IWAN) application This application is not bundled with the Cisco APIC-EM controller for this release. You need to download, install, and enable this application to use it. For information about these procedures, see the Cisco Application Infrastructure Controller Enterprise Module Upgrade Guide. The separately licensed IWAN application for APIC-EM simplifies the provisioning of IWAN network profiles with simple business policies. The IWAN application defines business-level preferences by application or groups of applications in terms of the preferred path for hybrid WAN links. Doing so improves the application experience over any connection and saves telecom costs by leveraging cheaper WAN links. Note This application is not bundled with the Cisco APIC-EM controller for this release. You need to download, install, and enable this application to use it. For information about these procedures, see the Cisco Application Infrastructure Controller Enterprise Module Upgrade Guide. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 4 Overview About the Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM) Feature Description Cisco Active Advisor application The Cisco Active Advisor application for APIC-EM offers personalized life cycle management for your network devices by keeping you up-to-date on: • End-of-life milestones for hardware and software • Product advisories, including Product Security Incident Response Team (PSIRT) bulletins and field notices • Warranty and service contract status Note Cisco Integrity Verification application This application is not bundled with the Cisco APIC-EM controller for this release. You need to download, install, and enable this application to use it. For information about these procedures, see the Cisco Application Infrastructure Controller Enterprise Module Upgrade Guide. The Cisco Integrity Verification (IV) application provides automated and continuous monitoring of network devices, noting any unexpected or invalid results that may indicate compromise. The objective of the Cisco IV application is early detection of the compromise, so as to reduce its impact. The Cisco IV application operates within the Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM) as a beta version for this release. Note Cisco Remote Troubleshooter application This application is not bundled with the Cisco APIC-EM controller for this release. You need to download, install, and enable this application to use it. For information about these procedures, see the Cisco Application Infrastructure Controller Enterprise Module Upgrade Guide. The Cisco Remote Troubleshooter application uses the Cisco IronPort infrastructure to create a tunnel that enables a support engineer to connect to an APIC-EM cluster and troubleshoot issues with your system. The app uses outbound SSH to create a secure connection to the cluster through this tunnel. As an administrator, you can use the Remote Troubleshooter application to control when a support engineer has access to a particular cluster and for how long (since a support engineer cannot establish a secure tunnel on their own). You will receive indication that a support engineer establishes a remote access session, and you can end a session at any time by disabling the tunnel they are using. Public Key Infrastructure (PKI) server The Cisco APIC-EM provides an integrated PKI service that acts as Certificate Authority (CA) or sub-CA to automate X.509 SSL certificate lifecycle management. Applications, such as IWAN and PnP, use the capabilities of the embedded PKI service for automatic SSL certificate management. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 5 Overview Logging into the Cisco APIC-EM Feature Description Path Trace application The path trace application helps to solve network problems by automating the inspection and interrogation of the flow taken by a business application in the network. High Availability (HA) HA is provided in N+ 1 redundancy mode with full data persistence for HA and Scale. All the nodes work in Active-Active mode for optimal performance and load sharing. Back Up and Restore The Cisco APIC-EM supports complete back up and restore of the entire database from the controller GUI. Audit Logs The audit log captures user and network activity for the Cisco APIC-EM applications. Logging into the Cisco APIC-EM You access the Cisco APIC-EM GUI by entering its network IP address in your browser. The IP address was configured for the Cisco APIC-EM network adapter during the initial setup using the configuration wizard. This IP address connects to the external network. Step 1 In your browser address bar, enter the IP address of the Cisco APIC-EM in the following format: https://IP address Step 2 On the launch page, enter your username and password that you configured during the deployment procedure. The Home page of the APIC-EM controller appears. The Home page consists of the following three tabs: • DASHBOARD • SYSTEM HEALTH • SYSTEM INFO Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 6 Overview Cisco APIC-EM GUI Figure 1: SYSTEM INFO Tab What to do next Click on each tab and review the data provided in the GUI. Cisco APIC-EM GUI First GUI Window When you log into the Cisco APIC-EM, the GUI appears. See the following tables for descriptions of the GUI elements. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 7 Overview Cisco APIC-EM GUI Table 2: Cisco APIC-EM GUI Elements Name Description Navigation pane At the left side of the window, the Navigation pane provides access to the Cisco APIC-EM functions and additional applications, such as EasyQoS, Path Trace, IWAN, and Network Plug and Play. Global toolbar At the top of the window, the Global toolbar provides access to tools, such as API documentation, settings, and notifications. For a full explanation of the icons on the Global toolbar, see the Global Toolbar Options table below. Application or Function Pane In the main window area, the application or function pane displays the interface of the application or function. When you click an option in the Navigation pane or from the Global toolbar, the corresponding application or function opens in this pane. I wish this page would... feedback link At the bottom of the window, the I wish this page would... feedback link opens a preaddressed email in your email application, where you can provide input about your experience using the Cisco APIC-EM and suggestions for improvements. Navigation Pane Options The Navigation pane provides options to access the major Cisco APIC-EM features and applications. Table 3: Navigation Pane Options Icon Name Description Hide/Unhide Navigation Allows you to hide and unhide the Navigation pane. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 8 Overview Cisco APIC-EM GUI Icon Name Description Home Provides information about the APIC-EM, such as its network status, system health, and system information. Discovery Allows you to configure discovery options for scanning the devices and hosts in your network. Device Inventory Provides access to the inventory database, where you can display, filter, and sort tabular information about the discovered devices in your network. Host Inventory Provides access to the inventory database, where you can display, filter, and sort tabular information about the discovered hosts in your network. Topology Presents the devices and links that the Cisco APIC-EM discovers as a physical topology map with detailed device-level data. The topology of devices and links can also be presented on a geographical map. You can use this interactive feature to troubleshoot your network. IWAN Simplifies the provisioning of IWAN network profiles with simple business policies. The IWAN application defines business-level preferences by application or groups of applications with preferred paths for hybrid WAN links. Doing so improves the application experience over any connection and saves telecommunication costs by leveraging cheaper WAN links. EasyQoS Enables you to configure quality of service on previously discovered Cisco network devices that support the EasyQoS feature. Using EasyQoS, you can group devices and then define the business relevance of applications that are used in your network. The Cisco APIC-EM takes your QoS selections, translates them into the proper command line interface (CLI) commands, and deploys them onto the selected devices. Path Trace Helps to solve network problems by automating the inspection and interrogation of the flow taken by a business application in the network. Network Plug and Play Provides a highly secure, scalable, seamless, and unified zero-touch deployment experience for customers across Cisco routers, switches and wireless access points. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 9 Overview Cisco APIC-EM GUI Icon Name Description Active Advisor Provides information about devices in your Cisco APIC-EM inventory that have hardware End-of-Life warnings and vulnerabilities that have been identified by the Cisco Product Security Incident Response Team (PSIRT), Cisco Active Advisor provides Software End-of-Life, Field Notice, warranty, and service contract coverage information about those devices. Integrity Verification Provides automated and continuous monitoring of network device integrity measurements, noting any unexpected or invalid results that may indicate compromise. The objective of the IV application is early detection of a compromise to reduce its impact. Remote Troubleshooter Utilizes the Cisco IronPort infrastructure to create a tunnel that enables a support engineer to connect to an APIC-EM cluster and troubleshoot issues. The application uses outbound SSH to create a secure connection to the cluster through this tunnel. Wide Area Bonjour Provides controller functions in the network, as it enables discovery and distribution of policy-based Apple Bonjour services independent of network boundaries. Global Toolbar Options The Global toolbar provides access to API information, administrative functions, system notifications. Table 4: Global Toolbar Options Icon Option Description API Displays the automatically generated documentation for the northbound REST APIs. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 10 Overview Cisco APIC-EM GUI Icon Option Description System Notifications Opens the System Notifications dialog box, which provides information about system notifications that have occurred. The icons at the top provide a total of the number of notifications in each of the following categories: • Minor (yellow triangle icon) • Major (orange triangle icon) • Critical (red octagon icon) If notifications have occurred, they are listed below the icons. For example, any notifications about software updates or security certificates updates appear in this window. Click the Notification History link to open the Notifications window. This window provides information about the notification, such as its severtiy, source, timestamp, and status. You can perform the following actions in this window: • Acknowledge a notification. • Filter notifications by status or security level. • Sort notifications by source, detail, description, timestamp, or status. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 11 Overview Cisco APIC-EM GUI Icon Option Description Administrative Functions Opens a menu of options. From this menu, you can choose the following administrative options: • Settings—Allows you to configure controller settings, such user profiles, discovery credentials, network security settings, backup and restore, and other controller settings. • App Management—Allows you to individually upload and enable Cisco and third-party applications, backup and restore the controller data, and update the Cisco APIC-EM software. • System Administration—Allows you to manage and troubleshoot controller services. Important Only advanced users should access the System Administration console to attempt to troubleshoot the controller services. • Audit Logs—Provides information to help you monitor policy creation and application. • About APIC-EM—Displays the installed Cisco APIC-EM software version. You can perform the following user functions: • Change Password—Allows you to change your own password. • Sign Out—Logs you out of the Cisco APIC-EM. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 12 CHAPTER 3 Device Configuration Prerequisites • Required Platform Configurations, on page 13 Required Platform Configurations You need to make the following configuration changes on these platforms for Discovery to work properly. Table 5: Required Platform Configurations Feature Platform Required Configuration Discovery (device inventory collection) Cisco ASR 9000 router or any other Configure NETCONF on these Cisco device that requires platforms. NETCONF support for their device For information, see NETCONF pack. Configuration, on page 14. Discovery (host inventory collection) Devices connected to hosts using SNMP. Configure SNMP traps on these devices. For information, see SNMP Trap Configuration, on page 14. Devices connected to hosts using IPDT. Enable IPDT for these devices. For information, see IP Device Tracking Configuration, on page 15. • Cisco Series 2504 WLC Configure SNMP traps and object identifiers on these wireless LAN • Cisco Series 5508/5520 WLC controllers. • Cisco Series 8510/8540 WLC For information, see Wireless LAN Controller Configuration, on page 15. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 13 Device Configuration Prerequisites NETCONF Configuration NETCONF Configuration You must enable the NETCONF protocol for the Cisco ASR 9000 router or for any other Cisco device that requires NETCONF support for their device pack. If NETCONF is not enabled, then the controller's inventory collection process will be incomplete for that device. Note Though NETCONF typically runs over SSH or on its own port, with the Cisco APIC-EM and for the Cisco ASR 9000 router NETCONF is run over a CLI session. For specific information about enabling NETCONF for your own Cisco device, refer to that device’s documentation. As an example, a typical configuration sequence on a terminal to enable NETCONF on a Cisco device is as follows: #ssh server v2 #netconf agent tty #! #xml agent tty #! #commit #end #crypto key generate rsa Note The rsa key needs to be generated to succeed with SSH. For this reason, the crypto key generate rsa command needs to be executed in exec mode at the end of the configuration sequence if it has not already been done. SNMP Trap Configuration To ensure that Cisco APIC-EM captures data about the hosts connected to your network devices, you must set up SNMP traps or notifications. Enter the following SNMP commands to set up SNMP traps on the devices that connect to hosts within your network: 1. snmp-server enable traps snmp linkdown linkup 2. snmp-server host IP address version 2c public Note For Cisco Nexus devices, enter the following SNMP commands instead of the commands listed above: 1. snmp-server enable traps snmp linkdown linkup 2. snmp-server host IP address use-vrf default After configuring SNMP traps on the network devices, the following data is captured and made available in the controller's GUI: • Host data including the MAC address, IP address, and type • Device interface status Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 14 Device Configuration Prerequisites IP Device Tracking Configuration IP Device Tracking Configuration The Cisco APIC-EM discovery function uses several protocols and methods to retrieve network information, such as hosts IP addresses, MAC addresses, and network attachment points. To use IP Device Tracking (IPDT) for discovery, you must manually enable IPDT on the devices and interfaces for this protocol to be used to collect host information. To enable IPDT on your devices, refer to your specific device documentation. For general information about IPDT, see IP Device Tracking (IPDT) Overview. Wireless LAN Controller Configuration The Cisco APIC-EM accepts SNMP traps from several Cisco Wireless LAN Controllers (WLCs). The SNMP traps are used to update the host inventory database. You need to configure the WLCs so that the Cisco APIC-EM is the trap receiver, and the WLCs send the enhanced traps to the Cisco APIC-EM. The following WLCs require SNMP traps to be enabled: • Cisco Series 2504 Wireless LAN Controller • Cisco Series 5508/5520 Wireless LAN Controller • Cisco Series 8510/8540 Wireless LAN Controller The following table specifies the SNMP traps and object identifiers that must be set on the WLCs. Trap Name OID ciscoLwappDot11ClientAssocTrap 1.3.6.1.4.1.9.9.599.0.9 ciscoLwappDot11ClientDeAuthenticatedTrap 1.3.6.1.4.1.9.9.599.0.10 ciscoLwappDot11ClientMovedToRunStateNewTrap 1.3.6.1.4.1.9.9.599.0.11 ciscoLwappDot11ClientMobilityTrap 1.3.6.1.4.1.9.9.599.0.12 The following configurations must be set to enable the above SNMP traps: • config trapflags client enhanced-802.11-associate enable • config trapflags client enhanced-802.11-deauthenticate enable • config trapflags client enhanced-authentication enable • config trapflags client enhanced-802.11-stats enable Note When setting the SNMP traps on the WLCs, ensure you configure the IP address of the Cisco APIC-EM as the SNMP trap destination IP address. You set the Cisco APIC-EM IP address using the configuration wizard during the deployment process. For information about this process and the controller IP address, see the Cisco Application Policy Infrastructure Controller Enterprise Module Deployment Guide for additional information. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 15 Device Configuration Prerequisites Wireless LAN Controller Configuration Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 16 CHAPTER 4 Discovering Devices and Hosts • About Discovery, on page 17 • Understanding Discovery Credentials, on page 18 • Configuring Global Discovery Credentials, on page 22 • Performing Discovery, on page 33 • Understanding the Discovery Results, on page 43 About Discovery The process of finding network devices and hosts is known as discovery. The Discovery function scans the devices and hosts in your network and populates the Cisco APIC-EM database with the information that it retrieves. To discover devices and hosts, you need to provide the controller with information about the devices so that the Discovery function can reach as many of the devices in your network as possible and gather as much information as it can. The Discovery function uses the following protocols and methods to retrieve device information, such as hosts IP addresses, MAC addresses, and network attachment points: • Cisco Discovery Protocol (CDP) • Community-based Simple Network Management Protocol Version 2 (SNMPv2c) • Simple Network Management Protocol version 3 (SNMPv3) • Link Layer Discovery Protocol (LLDP) • IP Device Tracking (IPDT) (For Discovery to collect host information, you must manually enable IPDT on devices. After IPDT is enabled, Discovery collects host information on a best-effort basis, because in addition to IPDT, Discovery relies on ARP entries for host information.) • LLDP Media Endpoint Discovery (LLDP-MED) (IP phones and some servers are discovered using LLDP-MED). For information about the required protocol configuration for your devices, see Device Configuration Prerequisites, on page 13. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 17 Discovering Devices and Hosts Understanding Discovery Credentials Understanding Discovery Credentials The Cisco APIC-EM supports two different types of discovery credentials: global and job specific (or discovery request-specific). Both types of discovery credentials can consist of CLI or SNMP credentials that are configured using the controller's GUI. Global credentials can be configured in either the Discovery window or the Discovery Credentials windows (as described in this chapter). Job specific credentials are only configured in the Discovery window. Note For information about the procedure to configure global and/or job specific credentials in the Discovery window, see the Cisco Application Policy Infrastructure Controller Enterprise Module Configuration Guide. Both CLI and SNMP credentials are required for a successful discovery. The SNMP credentials (either global or job specific) are used for device discovery. The CLI credentials (either global or job specific) are used for capturing or applying device configurations for the controller's inventory. You should enter at least one set of SNMP credentials, either SNMPv2c or SNMPv3, for your device discovery. If you are going to configure SNMPv2 settings in your network, then SNMP Read Only (RO) community string values should be entered in the controller to assure a successful discovery and populated inventory. However, if an SNMP RO community string and SNMP Read Writer (RW) community string is not entered into the controller, as a best effort, discovery will run with the default SNMP RO community string "public." Additionally, if no SNMP RO community string is entered but a SNMP RW community string is entered, then the SNMP RW community string will be used as SNMP RO community string. Note You can enter values for both SNMP versions (SNMPv2c and SNMPv3) for a single discovery. The controller supports multiple SNMP credential configurations. Altogether, you can enter a maximum of 5 global device credentials (SNMP or CLI) using the Discovery Credentials windows as described in this chapter, with an additional credentials set being created in the Discovery window. Therefore, for a single discovery scan request, you can configure a total of 6 credential sets of each type (CLI or SNMP). Global Credentials Global credentials are defined as preexisting credentials that are common to the devices in a network. Global credentials (CLI and SNMP) are configured on the devices using the GUI (Discovery window or Discovery Credentials window) and permit successful login to the devices. Global credentials are used by the Cisco APIC-EM to authenticate and access the devices in a network that share this device credential when performing network discoveries. You can configure the global CLI credentials in the CLI Credentials window. You access this window by clicking either admin or the Settings icon (gear) on the menu bar at the upper right of the screen. You then click the Settings link from the drop-down menu and then click CLI Credentials on the Setting Navigation pane. You can also configure global CLI credentials in the Credentials field in the Discovery window. For information about the procedure to configure global CLI credentials in the Discovery window, see the Cisco Application Policy Infrastructure Controller Enterprise Module Configuration Guide. You configure the global SNMP credentials in the SNMPv2c or SNMPv3 window . You access these windows by clicking either admin or the Settings icon (gear) on the menu bar at the upper right of the screen. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 18 Discovering Devices and Hosts Job Specific Credentials You then click the Settings link from the drop-down menu and then click one of the SNMP window links on the Setting Navigation pane. You can also configure global SNMP credentials in the Credentials field in the Discovery window. For information about the procedure to configure global SNMP credentials in the Discovery window, see the Cisco Application Policy Infrastructure Controller Enterprise Module Configuration Guide. Note Multiple credentials can be configured in the CLI Credentials window. Job Specific Credentials Job specific credentials (request-specific credentials) are defined as preexisting device credentials for a specific network device or set of devices that do not share the global credentials. You configure job specific credentials in the Discovery window prior to performing a discovery that is exclusive for that set of network devices. You access this window by clicking Discovery on the Navigation pane. Discovery Credentials Example Assume a network of 200 devices that form a CDP neighborship (neighboring devices discovered using Cisco Discovery Protocol (CDP)). In this network, 190 devices share a global credential (Credential-0) and the 10 remaining devices each have their own unique or job specific credentials (Credential 1- 5) To properly authenticate and access the devices in this network by the Cisco APIC-EM, you perform the following tasks: 1. Configure the CLI global credentials as Credential-0 for the controller. You can configure the global credentials in the CLI Credentials window. You access this window, by clicking either admin or the Settings icon (gear) on the menu bar at the upper right of the screen. You then click the Settings link from the drop-down menu and then click CLI Credentials on the Setting Navigation pane. 2. Configure the SNMP (v2c or v3) global credentials. You can configure these global credentials in the two SNMP windows. You access these GUI windows by clicking the Settings button at the top right and then clicking SNMPv2c or SNMPv3 on the Setting Navigation pane. 3. Run a CDP discovery using one of the 190 device IP addresses (190 devices that share the global credentials) and selecting the global credentials in the GUI. You run a CDP discovery in the Discovery window. You access this window, by clicking Discovery on the Navigation pane. 4. Run 10 separate Range discoveries for each of the remaining 10 devices using the appropriate job specific credentials and SNMP values (for example, Credential-1, Credential-2-5, etc.). You configure the job specific credentials in the Discovery window. You access this window, by clicking Discovery on the Navigation pane. 5. Review the Device Inventory table in the Device Inventory window to check the discovery results Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 19 Discovering Devices and Hosts Discovery Credentials Rules Discovery Credentials Rules Discovery credentials (global and job specific) operate under the rules as described in the bullet list and table below. Job Specific Credential Rules • Job specific credentials can be provided when creating a new network discovery, but only a single set of job specific credentials is allowed per network discovery. • Job specific credentials take precedence over any configured global credentials. • If the job specific credentials are provided as part of a network discovery and cause an authentication failure, then discovery is attempted a second time with the configured global credentials (if explicitly selected in the Discovery window of the controller's GUI). If discovery fails with the global credentials then the device discovery status will result in an authentication failure. • When using Cisco APIC-EM APIs for a network discovery and the job specific credentials (both CLI and SNMP) are not provided as part of the network discovery, then the global credentials (both CLI and SNMP provided by the user) are used to authenticate devices. Global Credential Rules Table 6: Global Credential Rules Global Credentials Job Specific Credentials Result Not configured Not configured If the network discovery is run from the controller's GUI, then the default SNMP read community string (public) is used for the discovery scan. A discovery failure will not occur in this case. If the network discovery is run using Cisco APIC-EM APIs, then a discovery failure will occur since both CLI and SNMP credentials must be configured for a successful device discovery using the Cisco APIC-EM APIs. Not configured Configured The specified job specific credentials will be used for discovery. Configured Not configured All the configured global credentials will be used. Configured but not selected Configured Only the job specific credentials will be used. Configured and selected Not configured Only selected global credential will be used. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 20 Discovering Devices and Hosts Discovery Credentials Caveats Global Credentials Job Specific Credentials Result Configured and selected Configured Both specified credentials (global and job specific) will be used for discovery. Configured, but wrong global Correct job specific credentials credential IDs are mentioned in the configured discovery POST REST API. Discovery fails. Configured, but wrong global Not configured credential IDs are mentioned in the discovery POST REST API. Discovery fails. Note Note This scenario is only possible by API not from the controller GUI. This scenario is only possible by API not from the controller GUI. Discovery Credentials Caveats The following are caveats for the Cisco APIC-EM discovery credentials: • If a device credential changes in a network device or devices after Cisco APIC-EM discovery is completed for that device or devices, any subsequent polling cycles for that device or devices will fail. To correct this situation, an administrator has following options: • Start a new discovery scan with changed job specific credentials that matches the new device credential. • Edit the existing discovery by updating or modifying the global credentials, and then rerun the discovery scan. • If the ongoing discovery fails due to a device authentication failure (for example, the provided discovery credential is not valid for the devices discovered by current discovery), then the administrator has following options: • Stop or delete the current discovery. Create one or more new network discovery jobs (either a CDP or Range discovery type) with a job specific credential that matches the device credential. • Create a new global credential and execute a new discovery selecting the correct global credential. • Edit an existing global credential and re-run the discovery. • Deleting a global credential does not affect already discovered devices. These already discovered devices will not report an authentication failure. • The Cisco APIC-EM provides a REST API which allows the retrieval of the list of managed network devices in the Cisco APIC-EM inventory. The purpose of this API is to allow an external application to synchronize its own managed device inventory with the devices that have been discovered by the Cisco APIC-EM. For example, for Cisco IWAN scenarios, Prime Infrastructure makes use of this API in order to populate its inventory with the IWAN devices contained in the Cisco APIC-EM inventory in order to provide monitoring of the IWAN solution. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 21 Discovering Devices and Hosts Configuring Global Discovery Credentials Note Only the username is provided in clear text. SNMP community strings and passwords are not provided in cleartext for security reasons. Configuring Global Discovery Credentials Configuring CLI Credentials CLI credentials are defined as preexisting device credentials that are common to most of the devices in a network. CLI credentials are used by the Cisco APIC-EM to authenticate and access the devices in a network that share this CLI credential when performing devices discoveries. You configure the CLI global credentials in the CLI Credentials window or the Discovery window. This procedure describes how to configure CLI global credentials in the CLI Credentials window. Note You can configure up to five CLI credentials. Figure 2: CLI Credentials Window Before you begin You must have successfully deployed the Cisco APIC-EM and it must be operational. You must have administrator (ROLE_ADMIN) permissions and either access to all resources (RBAC scope set to ALL) or an RBAC scope that contains all of the resources that you want to group. For example, to create Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 22 Discovering Devices and Hosts Configuring SNMP a group containing a specific set of resources, you must have access to those resources (custom RBAC scope set to all of the resources that you want to group). For information about user permissions and RBAC scopes required to perform tasks using the Cisco APIC-EM, see the chapter, "Managing Users". Step 1 In the Home window, click either admin or the Settings icon (gear) at the top right corner of the screen. Step 2 Click the Settings link from the drop-down menu. Step 3 In the Settings navigation pane, click CLI Credentials to view the CLI Credentials window. In the CLI Credentials window, enter the appropriate CLI global credentials for the devices within your network or networks. Step 4 Enter the CLI Credentials username in the Username field. Step 5 Enter the CLI Credentials password in the Password field. Step 6 Reenter the CLI Credentials password in the Confirm Password field to confirm the value that you just entered. Step 7 If your network devices have been configured with an enable password, then enter the CLI Credentials for the enable password in the Enable Password field. Note Both the CLI credentials password and enable password are saved in the controller in encrypted form. You cannot view these original passwords after you enter them. Step 8 If you entered an enable password in the Enable Password field, reenter it in the Confirm Enable Password field to confirm the value that you just entered. Step 9 In the CLI Credentials window, click Add to save the credentials to the Cisco APIC-EM database. What to do next Proceed to configure SNMP values for your network device discovery. For a successful device discovery (with all the device information to be collected), CLI credentials (global and/or job specific) should be configured using the controller. The global credentials for CLI and SNMP (v2c or v3) can be configured in the Discovery Credentials windows (as described in this chapter) or the Discovery window, and are used in addition to any job specific credentials (for CLI and SNMP) that are also configured in the Discovery window. Configuring SNMP You configure SNMP for device discovery using the following Discovery Credentials windows in the Cisco APIC-EM GUI: • SNMPv2c • SNMPv3 • SNMP Properties Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 23 Discovering Devices and Hosts Configuring SNMPv2c Note You can also configure SNMP for device discovery in the Discovery window of the controller's GUI. For information about the procedures to configure SNMP for device discovery in the Discovery window, see the Cisco Application Policy Infrastructure Controller Enterprise Module Configuration Guide. Important You can use SNMP and the existing security features in SNMP v3 to secure communications between the controller and the devices in your network. SNMP v3 provides both privacy (encryption) and authentication capabilities for these communications. If possible for your network, we recommend that you use SNMPv3 with both privacy and authentication enabled. Configuring SNMPv2c You configure SNMPv2c for device discovery in the SNMPv2c window in the Cisco APIC-EM GUI. The SNMP values that you configure for SNMPv2c for the controller must match the SNMPv2c values that have been configured for your network devices. Note You can configure up to five read community strings and five write community strings. Figure 3: Configuring SNMPv2c SNMP is an application-layer protocol that provides a message format for communication between SNMP managers and agents. SNMP provides a standardized framework and a common language used for the monitoring and management of devices in a network. The different versions of SNMP are SNMPv1, SNMPv2, SNMPv2c, and SNMPv3. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 24 Discovering Devices and Hosts Configuring SNMPv2c SNMPv2c is the community string-based administrative framework for SNMPv2. Community string is a type of password, which is transmitted in clear text. SNMPv2c does not provide authentication or encryption (noAuthNoPriv level of security). Note In addition to configuring SNMPv2c for device discovery in the controller, a "best effort" Cisco APIC-EM discovery is in place, meaning that devices having SNMP with Read-Only (RO) community string set to "public" will be discovered all the time irrespective of the configured SNMP Read/Write community string. Before you begin You must have successfully deployed the Cisco APIC-EM and it must be operational. You must have your network's SNMP information available for this configuration procedure. You must have administrator (ROLE_ADMIN) permissions and either access to all resources (RBAC scope set to ALL) or an RBAC scope that contains all of the resources that you want to group. For example, to create a group containing a specific set of resources, you must have access to those resources (custom RBAC scope set to all of the resources that you want to group). For information about user permissions and RBAC scopes required to perform tasks using the Cisco APIC-EM, see the chapter, "Managing Users". Step 1 In the Home window, click either admin or the Settings icon (gear) at the top right corner of the screen. Step 2 Click the Settings link from the drop-down menu. Step 3 In the Settings navigation pane, click SNMPv2c to view the SNMPv2c window. Step 4 In the SNMPv2c window, click Read Community. Enter your Read Community values: • Name/Description—Description of the Read-Only (RO) community string value and/or the device or devices that are configured with it. • Read Community—Read-Only community string value configured on devices that you need the controller to connect to and access. This community string value must match the community string value pre-configured on the devices that the controller will connect to and access. • Confirm Read Community—Reenter the Read-Only community string to confirm the value that you just entered. Note Step 5 If you are configuring SNMPv2c for your discovery, then configuring Read Community values is mandatory. Click Save to save your Read Community values. The Read Community values will appear in the table below. Step 6 (Optional) In the SNMPv2c window, click Write Community. Enter your Write Community values: • Name/Description—Description of the Write community string value and/or the device or devices that are configured with it. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 25 Discovering Devices and Hosts Configuring SNMPv3 • Write Community—Write community string value configured on devices that you need the controller to connect to and access. This community string value must match the community string value pre-configured on the devices that the controller will connect to and access. • Confirm Write Community—Reenter the Write community string to confirm the value that you just entered. Step 7 (Optional) Click Save to save your Write Community values. The Write Community values will appear in the table below. What to do next If required for your SNMP configuration, proceed to configure either SNMPv3 or SNMP Properties using the GUI. Configuring SNMPv3 You configure SNMPv3 for device discovery in the SNMPv3 window in the Cisco APIC-EM GUI. The SNMP values that you configure for SNMPv3 for the controller must match the SNMPv3 values that have been configured for your network devices. You can configure up to five SNMPv3 settings. Figure 4: Configuring SNMPv3 SNMP is an application-layer protocol that provides a message format for communication between SNMP managers and agents. SNMP provides a standardized framework and a common language used for the monitoring and management of devices in a network. The different versions of SNMP are SNMPv1, SNMPv2, SNMPv2c, and SNMPv3. SNMPv3 provides secure access to devices by a combination of authenticating and encrypting frames over the network. The following are supported SNMPv3 security models: • Message integrity—Ensures that a packet has not been tampered with in-transit. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 26 Discovering Devices and Hosts Configuring SNMPv3 • Authentication—Determines the message is from a valid source • Encryption—Scrambles the packet contents to prevent it from being seen by unauthorized sources SNMPv3 provides for both security models and security levels. A security model is an authentication strategy that is set up for a user and the role in which the user resides. A security level is the permitted level of security within a security model. A combination of a security model and a security level determines which security mechanism is employed when handling an SNMP packet. The security level determines if an SNMP message needs to be protected from disclosure and if the message needs to be authenticated. The various security levels that exist within a security model are as follows: • noAuthNoPriv—Security level that does not provide authentication or encryption • AuthNoPriv—Security level that provides authentication but does not provide encryption • AuthPriv—Security level that provides both authentication and encryption The following table identifies what the combinations of security models and levels mean: Table 7: SNMP Security Models and Levels Model Level Authentication Encryption What Happens v2c noAuthNoPriv Community String No Uses a community string match for authentication. v3 noAuthNoPriv User Name No Uses a username match for authentication. v3 AuthNoPriv Either: No Provides authentication based on the Hash-Based Message Authentication Code (HMAC) Message Digest 5 (MD5) algorithm or the HMAC Secure Hash algorithm (SHA) • HMAC-MD5 • HMAC-SHA Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 27 Discovering Devices and Hosts Configuring SNMPv3 Model Level Authentication Encryption v3 AuthPriv Either: Either: • HMAC-MD5 • HMAC-SHA What Happens Provides authentication based • CBC-DES on the HMAC-MD5 • CBC-AES-128 or HMAC-SHA algorithms. Provides Data Encryption Standard (DES) 56-bit encryption in addition to authentication based on the Cipher Block Chaining (CBC) DES (DES-56) standard or CBC-mode AES for encryption. Before you begin You must have successfully deployed the Cisco APIC-EM and it must be operational. You must have your network's SNMP information available for this configuration procedure. You must have administrator (ROLE_ADMIN) permissions and either access to all resources (RBAC scope set to ALL) or an RBAC scope that contains all of the resources that you want to group. For example, to create a group containing a specific set of resources, you must have access to those resources (custom RBAC scope set to all of the resources that you want to group). For information about user permissions and RBAC scopes required to perform tasks using the Cisco APIC-EM, see the chapter, "Managing Users". Note With SNMPv3, passwords (or passphrases) must be at least 8 characters in length (minimum). Additionally, for several Cisco Wireless LAN controllers, passwords (or passphrases) must be at least 12 characters in length (minimum). Failure to ensure these required minimum character lengths for the passwords will result in devices not being discovered, monitored, and/or managed by the controller. Step 1 In the Home window, click either admin or the Settings icon (gear) at the top right corner of the screen. Step 2 Click the Settings link from the drop-down menu. Step 3 In the Settings navigation pane, click SNMPv3 to view the SNMPv3 window. If you use SNMPv3 in your network to monitor and manage devices, then configure the SNMPv3 values for discovery for your network. Step 4 In the SNMPv3 window, enter a Username value and choose a Mode from the drop down menu. The following Mode options are available: Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 28 Discovering Devices and Hosts Configuring SNMP Properties • AuthPriv • AuthNoPriv • NoAuthNoPriv Note Step 5 Subsequent SNMPv3 configuration options might or might not be available depending upon your selection for this step. If you selected AuthPriv or AuthNoPriv as a Mode option, then choose an Authentication type from the drop down menu and enter an authentication password. The following Authentication options are available: • SHA—Authentication based on the Hash-Based Message Authentication Code (HMAC), Secure Hash algorithm (SHA) algorithm • MD5—Authentication based on the Hash-Based Message Authentication Code (HMAC), Message Digest 5 (MD5) algorithm Step 6 If you selected AuthPriv as a Mode option, then choose a Privacy type from the drop down menu and enter a SNMPv3 privacy password. The SNMPv3 privacy password is used to generate the secret key used for encryption of messages exchanged with devices that support DES or AES128 encryption. The following Privacy type options are available: • DES—Data Encryption Standard (DES) 56-bit encryption in addition to authentication based on the Cipher Block Chaining (CBC) DES (DES-56) standard. • AES128—Cipher Block Chaining (CBC) mode AES for encryption. Step 7 Click Save to save your SNMPv3 configuration values. The SNMPv3 configured values will appear in the table below. What to do next If required for your SNMP configuration, proceed to configure either SNMPv2c or SNMP Properties using the GUI. Configuring SNMP Properties You configure SNMP properties for device discovery in the SNMP Properties window in the Cisco APIC-EM GUI. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 29 Discovering Devices and Hosts Configuring SNMP Properties Figure 5: Configuring SNMP Properties Before you begin You must have successfully deployed the Cisco APIC-EM and it must be operational. You must have your network's SNMP information available for this configuration procedure. You must have administrator (ROLE_ADMIN) permissions and either access to all resources (RBAC scope set to ALL) or an RBAC scope that contains all of the resources that you want to group. For example, to create a group containing a specific set of resources, you must have access to those resources (custom RBAC scope set to all of the resources that you want to group). For information about user permissions and RBAC scopes required to perform tasks using the Cisco APIC-EM, see the chapter, "Managing Users". Step 1 In the Home window, click either admin or the Settings icon (gear) at the top right corner of the screen. Step 2 Click the Settings link from the drop-down menu. Step 3 In the Settings navigation pane, click SNMP Properties to view the SNMP Properties window. Configure the SNMP property settings for discovery in your network. Step 4 In the SNMP Properties window, enter a value in the Retries field. The value entered in this field is the number of attempts the controller attempts to use SNMP to communicate with your network devices. Step 5 In the SNMP Properties window, enter a value in the Timeout field. The value entered in this field is the length of time in seconds the controller attempts to use SNMP to communicate with your network devices. Step 6 Click Apply to save your SNMP configuration values. You can also click Revert to Defaults to revert to the SNMP property default values. The following are the SNMP property default values: • Retries—3 Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 30 Discovering Devices and Hosts Enabling Device Controllability • Timeout—5 What to do next If required for your SNMP configuration, proceed to configure either SNMPv2c or SNMPv3 using the GUI. Enabling Device Controllability You can enable device controllability in the Device Controllability window of the Cisco APIC-EM GUI. When you enable device controllability, the controller performs two actions during a discovery: • The controller automatically configures (applies) the SNMP credentials that you entered using the controller's GUI on any network devices without SNMP credentials (SNMPv2c and/or SNMPv3). • The controller automatically enables IP device tracking (IPDT) on any network devices where it is supported. Note If you want to discover hosts through a trunk interface, you must manually enable IPDT on the trunk interface. IPDT is enabled only on devices that are identified as Access role in Device Inventory window during the initial inventory collection. The device does not need to be in a Managed state to have IPDT enabled. The IPDT configuration is applied to devices as long as Device Inventory has the device's software version, role, and so on. Note The device controllability functionality depends upon whether the CLI credentials provided by the user permits the controller to log into the device in enable mode (privilege level 15 for Cisco IOS devices). Figure 6: Enabling Device Controllability Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 31 Discovering Devices and Hosts Configuring the Polling Interval Before you begin You must have successfully deployed the Cisco APIC-EM and it must be operational. You must have administrator (ROLE_ADMIN) permissions and either access to all resources (RBAC scope set to ALL) or an RBAC scope that contains all of the resources that you want to group. For example, to create a group containing a specific set of resources, you must have access to those resources (custom RBAC scope set to all of the resources that you want to group). For information about user permissions and RBAC scopes required to perform tasks using the Cisco APIC-EM, see the chapter, "Managing Users". Step 1 In the Home window, click either admin or the Settings icon (gear) at the top right corner of the screen. Step 2 Click the Settings link from the drop-down menu. Step 3 In the Settings navigation pane, click Device Controllability to view the Device Controllability window. Step 4 (Optional) Click Yes for SNMP Autoconfig to automatically to enable this feature. Clicking Yes for SNMP Autoconfig automatically applies the SNMP credentials you configured using the controller's GUI to any devices in your network without an SNMP configuration. Step 5 (Optional) Click Yes for IPDT Autoconfig to enable this feature. Clicking Yes for IPDT Autoconfig automatically enables IP device tracking (IPDT) on any devices in your network where it is supported but not enabled. Step 6 Click Save to save your configuration. What to do next If you have not already done so, configure SNMP in either the Discovery window or the appropriate CLI Credentials window for SNMP in Settings. Configuring the Polling Interval You can configure the polling interval for inventory data collection for devices managed by Cisco APIC-EM. This polling interval configuration will be used for all managed devices, unless the polling interval of a device is updated specifically in the Inventory page. You configure the polling interval in the Polling Interval Settings window of the Cisco APIC-EM GUI. Note The polling interval value that you configure is a global value used for performing periodic inventory data collection, it is not used for discovering the device. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 32 Discovering Devices and Hosts Performing Discovery Figure 7: Polling Interval Window Before you begin You must have successfully deployed the Cisco APIC-EM and it must be operational. You must have administrator (ROLE_ADMIN) permissions and either access to all resources (RBAC scope set to ALL) or an RBAC scope that contains all of the resources that you want to group. For example, to create a group containing a specific set of resources, you must have access to those resources (custom RBAC scope set to all of the resources that you want to group). For information about user permissions and RBAC scopes required to perform tasks using the Cisco APIC-EM, see the chapter, "Managing Users". Step 1 In the Home window, click either admin or the Settings icon (gear) at the top right corner of the screen. Step 2 Click the Settings link from the drop-down menu. Step 3 In the Settings navigation pane, click Polling Interval to view the Polling Interval window. Step 4 Enter a polling interval value in minutes in the Polling Interval field. The default polling interval is 25 minutes for device discovery by the controller. Step 5 Click Save to save your polling interval configuration. Performing Discovery Performing Discovery Using CDP You can discover devices and hosts using CDP. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 33 Discovering Devices and Hosts Performing Discovery Using CDP Figure 8: Discovery Using CDP Figure 9: Discovery Using CDP Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 34 Discovering Devices and Hosts Performing Discovery Using CDP Before you begin You must have administrator (ROLE_ADMIN) permissions and access to all devices (RBAC Scope set to ALL) to perform this procedure. CDP must be enabled on the devices in order for them to be discovered. Note CDP is required for the hostname column to be populated. Your devices must have the required device configurations, as described in Device Configuration Prerequisites, on page 13. Step 1 From the Navigation pane, click Discovery. Step 2 From the Discovery window, click + New Discovery. The New Discovery pane appears. Step 3 In the Discovery Name field, enter a unique name for the discovery job. Step 4 In the IP Ranges area, configure the following settings: a) In the Type field, choose CDP. b) In the IP Address field, enter a seed IP address for the Cisco APIC-EM to use to start the discovery scan. c) (Optional) In the Subnet Filter field, enter the IP address or subnet and click + the plus sign.. You can enter the address as an individual IP address (x.x.x.x) or as a classless inter-domain routing (CIDR) address (x.x.x.x/y) where x.x.x.x refers to the IP address and y refers to the subnet mask. The subnet mask can be a value from 0 to 32. Repeat this step to exclude multiple subnets from the discovery job. d) (Optional) In the CDP Level field, enter the number of hops from the seed device that you want to scan. Valid values are from 1 to 16. The default value is 16. For example, CDP level 3 means that CDP will scan up to three hops from the seed device. Step 5 Open the Credentials area and configure the credentials that you want to use for the discovery job. You can configure credentials to be used for the current discovery job, or you can check the Save as global settings checkbox to save the credentials for future discovery jobs. a) Make sure that any global credentials that you want to use are checked. If you do not want to use a credential, remove it by clicking the check mark. b) To add additional credentials, click + Add Credentials, complete the fields in the following tables for the credentials that you want to use, and click Add. With the SNMP Autoconfig option enabled under Settings > Device Controllability, Cisco APIC-EM configures devices that do not have SNMP credentials with the SNMP credentials set in Global Settings or in the specific discovery job, whichever one takes priority. Discovery requires the correct SNMP Read Only (RO) community string. If an SNMP RO community string is not provided, as a best effort, discovery uses the default SNMP RO community string, "public." Note CLI credentials are not required to discover hosts; hosts are discovered through the devices that they are connected to. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 35 Discovering Devices and Hosts Performing Discovery Using CDP Table 8: CLI Credentials Field Description Username Username that is used to log into the command line interface (CLI) of the devices in your network. Password Password that is used to log into the CLI of the devices in your network. Confirm Password For security reasons, you must enter the password again as confirmation. Passwords are encrypted for security reasons and are not displayed in the configuration. Password used to move to a higher privilege level in the CLI. Enable Password Confirm Enable Password For security reasons, you must enter the enable password again as confirmation. Passwords are encrypted for security reasons and are not displayed in the configuration. Table 9: SNMP v2c Credentials Field Description Read SNMP read-only (RO) community string configuration, which comprises the following fields: • Name/Description—Name or description of the SNMP v2c settings that you are adding. • Read Community and Confirm Read Community—Read-only community string password used only to view SNMP information on the device. Write Note Passwords are encrypted for security reasons and are not displayed in the configuration. Note To enable discovery on the network devices, configure the network device's IP host address as the client address. SNMP read-write (RW) community string configuration, which comprises the following fields: • Name/Description—Name or description of the SNMP v2c settings that you are adding. • Write Community and Confirm Write Community—Read/Write community string password used to view and make changes to SNMP information on the device. Note Passwords are encrypted for security reasons and are not displayed in the configuration. Note To enable discovery on the network devices, configure the network device's host IP address as the client IP address. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 36 Discovering Devices and Hosts Performing Discovery Using CDP Table 10: SNMP v3 Credentials Field Description Username Username associated with the SNMPv3 settings. Mode Specifies the security level that an SNMP message requires and whether the message needs to be authenticated. Choose one of the following modes: • noAuthNoPriv—Security level that does not provide authentication or encryption • AuthNoPriv—Security level that provides authentication but does not provide encryption • AuthPriv—Security level that provides both authentication and encryption Auth Password SNMPv3 password used for gaining access to information from devices that use SNMPv3. Note Auth Type Passwords are encrypted for security reasons and are not displayed in the configuration. Specifies the authentication type to be used. • SHA—Authentication based on the Hash-Based Message Authentication Code (HMAC), Secure Hash algorithm (SHA) algorithm • MD5—Authentication based on the Hash-Based Message Authentication Code (HMAC), Message Digest 5 (MD5) algorithm • None—No authentication Privacy Password SNMPv3 privacy password is used to generate the secret key used for encryption of messages exchanged with devices that support DES or AES128 encryption. Note Privacy Type Passwords are encrypted for security reasons and are not displayed in the configuration. Specifies the privacy type: • DES—Data Encryption Standard (DES) 56-bit encryption in addition to authentication based on the Cipher Block Chaining (CBC) DES (DES-56) standard. • AES128—Cipher Block Chaining (CBC) mode AES for encryption. • None—No privacy Table 11: SNMP Properties Field Description Retries Number of attempts to connect to the device. Valid values are from 0 to 4 attempts. Timeout (in Seconds) Number of seconds the controller waits when trying to establish a connection with a device before timing out. Valid values are from 5 to 120 seconds in intervals of 5 seconds. Step 6 (Optional) To configure the protocols to be used to connect with devices, open the Advanced area and do the following: a) Click the protocols that you want to use. A green checkmark indicates that the protocol is selected. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 37 Discovering Devices and Hosts Performing Discovery Using an IP Address Range Valid protocols are SSH (default) and Telnet. b) Drag and drop the protocols in the order that you want them to be used. Step 7 Click Start Discovery. The Discoveries window displays the results of your scan. The Discovery Details pane shows the status (active or inactive) and the discovery configuration. The Discovery Devices pane displays the host names, IP addresses, and status of the discovered devices for the selected discovery. Performing Discovery Using an IP Address Range You can discover devices using an IP address range. Figure 10: Discovery Using IP Address Range Before you begin You must have administrator (ROLE_ADMIN) permissions and access to all devices (RBAC Scope set to ALL) to perform this procedure. Your devices must have the required device configurations, as described in Device Configuration Prerequisites, on page 13. Step 1 From the Navigation pane, click Discovery. Step 2 From the Discovery window, click + New Discovery. The New Discovery pane appears. Step 3 In the Discovery Name field, enter a unique name for the discovery job. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 38 Discovering Devices and Hosts Performing Discovery Using an IP Address Range Step 4 If the Discovery Details pane does not appear, click Add New. Step 5 In the Discovery Name field, enter a unique name for this discovery. Step 6 In the IP Ranges area, do the following: a) From the Discovery Type field, choose Range for the discovery scan type. b) In the IP Address field, enter the beginning and ending IP addresses (IP range) for the devices being discovered and click + (the plus sign). You can enter a single IP address range or multiple IP addresses for the discovery scan. c) Repeat Step b to enter additional IP address ranges. Step 7 Open the Credentials area and configure the credentials that you want to use for the discovery job. You can configure credentials to be used for the current discovery job, or you can check the Save as global settings checkbox to save the credentials for future discovery jobs. a) Make sure that any global credentials that you want to use are checked. If you do not want to use a credential, remove it by clicking the check mark. b) To add additional credentials, click + Add Credentials, complete the fields in the following tables for the credentials that you want to use, and click Save. With the SNMP Autoconfig option enabled under Settings > Device Controllability, Cisco APIC-EM configures devices that do not have SNMP credentials with the SNMP credentials set in Global Settings or in the specific discovery job, whichever one takes priority. Discovery requires the correct SNMP Read Only (RO) community string. If an SNMP RO community string is not provided, as a best effort, discovery uses the default SNMP RO community string, "public." Note CLI credentials are not required to discover hosts; hosts are discovered through the devices that they are connected to. Table 12: CLI Credentials Field Description Username Username that is used to log into the command line interface (CLI) of the devices in your network. Password Password that is used to log into the CLI of the devices in your network. Confirm Password For security reasons, you must enter the password again as confirmation. Passwords are encrypted for security reasons and are not displayed in the configuration. Enable Password Confirm Enable Password Password used to move to a higher privilege level in the CLI. For security reasons, you must enter the enable password again as confirmation. Passwords are encrypted for security reasons and are not displayed in the configuration. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 39 Discovering Devices and Hosts Performing Discovery Using an IP Address Range Table 13: SNMP v2c Credentials Field Description Read SNMP read-only (RO) community string configuration, which comprises the following fields: • Name/Description—Name or description of the SNMP v2c settings that you are adding. • Read Community and Confirm Read Community—Read-only community string used only to view SNMP information on the device. Note Passwords are encrypted for security reasons and are not displayed in the configuration. Note To enable discovery on the network devices, configure the network device's IP host address as the client address. SNMP read-write (RW) community string configuration, which comprises the following fields: Write • Name/Description—Name or description of the SNMP v2c settings that you are adding. • Write Community and Confirm Write Community—Read/Write community string used to view and make changes to SNMP information on the device. Note Passwords are encrypted for security reasons and are not displayed in the configuration. Note To enable discovery on the network devices, configure the network device's IP host address as the client address. Table 14: SNMP v3 Credentials Field Description Username Username associated with the SNMPv3 settings. Mode Specifies the security level that an SNMP message requires and whether the message needs to be authenticated. Choose one of the following modes: • noAuthNoPriv—Security level that does not provide authentication or encryption • AuthNoPriv—Security level that provides authentication but does not provide encryption • AuthPriv—Security level that provides both authentication and encryption Auth Password SNMPv3 password used for gaining access to information from devices that use SNMPv3. Auth Type Specifies the authentication type to be used. • SHA—Authentication based on the Hash-Based Message Authentication Code (HMAC), Secure Hash algorithm (SHA) algorithm • MD5—Authentication based on the Hash-Based Message Authentication Code (HMAC), Message Digest 5 (MD5) algorithm • None—No authentication Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 40 Discovering Devices and Hosts Copying a Discovery Job Field Description Privacy Password SNMPv3 privacy password is used to generate the secret key used for encryption of messages exchanged with devices that support DES or AES128 encryption. Privacy Type Specifies the privacy type: • DES—Data Encryption Standard (DES) 56-bit encryption in addition to authentication based on the Cipher Block Chaining (CBC) DES (DES-56) standard. • AES128—Cipher Block Chaining (CBC) mode AES for encryption. • None—No privacy Table 15: SNMP Properties Field Description Retries Number of attempts to connect to the device. Valid values are from 0 to 4 attempts. Timeout (in Seconds) Number of seconds the controller waits when trying to establish a connection with a device before timing out. Valid values are from 5 to 120 seconds in intervals of 5 seconds. Step 8 Click Start Discovery. The Discoveries window displays the results of your scan. The Discovery Details pane shows the status (active or inactive) and the discovery configuration. The Discovery Devices pane displays the host names, IP addresses, and status of the discovered devices for the selected discovery. Step 9 (Optional) To configure the protocols to be used to connect with devices, open the Advanced area and do the following: a) Click the protocols that you want to use. A green checkmark indicates that the protocol is selected. Valid protocols are SSH (default) and Telnet. b) Drag and drop the protocols in the order that you want them to be used. Copying a Discovery Job You can copy a discovery job and retain all of the information defined for the job, except the SNMP and CLI credentials. The SNMP and CLI credentials are included in the copy only if you used global credentials (saved in Settings) for the original job. If you defined specific (one-time only) SNMP and CLI credentials for the original job, the credentials are not copied. Before you begin You have created at least one discovery scan. Step 1 From the Navigation pane, click Discovery. Step 2 From the Discoveries pane, select the discovery job. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 41 Discovering Devices and Hosts Stopping and Starting a Discovery Job Step 3 From the Discovery Details pane, click Copy. The discovery job is copied, and the new job is named Copy of Discovery_Job. Step 4 (Optional) Change the name of the discovery job. Step 5 Define or update the SNMP and CLI credentials and any other parameters for the discovery job. Stopping and Starting a Discovery Job You can stop a discovery job that is in progress, and restart it. Before you begin You must have administrator (ROLE_ADMIN) permissions and access to all devices (RBAC Scope set to ALL) to perform this procedure. Step 1 From the Navigation pane, click Discovery. Step 2 To stop an active discovery job, do the following: a) From the Discoveries pane, select the discovery job. b) From the Discovery Details pane, click Stop. c) Click OK to confirm that you want to stop the discovery job. Step 3 To restart an inactive discovery, do the following: a) From the Discoveries pane, select the discovery job. b) From the Discovery Details pane, click Start. Deleting a Discovery Job You can delete a discovery job whether it is active or inactive. Before you begin You must have administrator (ROLE_ADMIN) permissions and access to all devices (RBAC Scope set to ALL) to perform this procedure. Step 1 From the Navigation pane, click Discovery. Step 2 From the Discoveries pane, select the discovery job that you want to delete. Step 3 From the Discovery Details pane, click Delete. Step 4 Click OK to confirm that you want to delete the discovery. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 42 Discovering Devices and Hosts Understanding the Discovery Results Understanding the Discovery Results The Discovery Results pane provides information about the selected scan. To access the Discovery Results pane, do the following: 1. From the Navigation pane, click Discovery. 2. From the Discoveries pane, select the discovery job that you want to display. The Discovery Results pane appears. See the following figures and table for information. Figure 11: Discovery Results Window—List Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 43 Discovering Devices and Hosts Understanding the Discovery Results Figure 12: Discovery Results Window—Chart Table 16: Discovery Pane Name Description Discovery Identification Displays the following information: and Action Area • Name of the discovery job. • Status of the discovery job. • Number of devices discovered. From this area, you can delete, clone, edit, or start a discovery job. Discovery Details area Open this area to display detailed information about the parameters that were used to perform the discovery, including the CDP level (if used), protocol order, retry count, timeout value, IP address (seed) or range of IP addresses used, and IP address filter list. Credentials area Open this area to display the credentials used in the discovery job and identifies them as either global or job-specific. Last Runs area Open this area to display a table showing information about each iteration of the discovery job, including the job number, its status, an option to view the devices discovered, and the duration of the job. Clicking the View link in the Devices column opens the Devices pane. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 44 Discovering Devices and Hosts Understanding the Discovery Results Name Description Devices pane (Shown when you open the Last Runs area and click the View link in the Devices column.) The devices pane displays the results of the device discovery in two forms: • List—For each device, provides the following information: • IP address—IP addresses of the devices that Cisco APIC-EM discovered or attempted to discover. • Device name—Name of the device, if available. • Status—Status of the discovery for the device. Possible states are success, unreachable, failure, not tried, or unavailable. • Internet Control Message Protocol (ICMP)—Status of the ICMP for the device. • SNMP—Status of theCisco APIC-EM's use of the SNMP settings to gather SNMP information from the device. • CLI—Status of theCisco APIC-EM's use of the CLI username and passwords to gather information from the device. • Chart—Displays a circle graph showing the proportional representation of successful versus failed discovered devices. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 45 Discovering Devices and Hosts Understanding the Discovery Results Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 46 CHAPTER 5 Managing Devices and Hosts • Managing Your Device Inventory, on page 47 • Managing Your Host Inventory, on page 73 Managing Your Device Inventory The Device Inventory window displays the results of the discovery scan. To access the Discovery window, from the Navigation pane, click Device Inventory. Figure 13: Device Inventory Window Note The information that is displayed depends on the Layout that you selected. After the initial discovery, network devices are polled every 30 minutes. Polling occurs for each device, link, host, and interface. Only devices that have been active for less than a day are displayed. This prevents any stale device data from being displayed. On average, polling 500 devices takes approximately 20 minutes. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 47 Managing Devices and Hosts Device Inventory Information For information about the actions that you can perform from the Device Inventory window, see Device Inventory Tasks, on page 54. The following table describes the main elements in the Device Inventory table. Window Element Description Device Selection check Allows you to select devices to perform tasks. boxes When you select a device, the action buttons appear above the Device Inventory table. For information about these buttons and the actions that you can perform with them, see Device Inventory Tasks, on page 54. Filters Allows you to refine the list of devices that are displayed in the table by name, location tag, and IP address. To remove filters, click Clear Filters. Layout Allows you to choose from three predefined layouts or a customized layout: • Status—Layout shows the device name, IP address, state of the device, how long it has been up, and the last time it was updated. • Hardware—Layout shows the device name, IP address, device family, platform, serial number, MAC address, and role, along with its IOS/firmware version and a link to its configuration file. • Tagging—Layout shows the device name, IP address, MAC address, device role, location, and tags. • Customize—Layout shows the information in the columns that you have selected to display. For descriptions of the columns of information that you can display, see the Device Inventory Information table below. Below the Device Inventory table, you can adjust the number of devices displayed in the table (10, 25, 50, 100), and you can click First, Previous, Next, Last, or the page number to navigate through the table. Device Inventory Information The Device Inventory table displays the following information for each discovered device. All of the columns, except the Config column, support sorting. Clicking on the column header sorts the rows in an ascending order. Clicking on the column header again sorts the rows in descending order. For more information, see the Cisco Application Policy Infrastructure Controller Enterprise Module Configuration Guide. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 48 Managing Devices and Hosts Device Inventory Information Table 17: Device Inventory Information Column Name Description Device Status State of the device. • Connecting—Controller is connecting to the device. • Reachable: • Discovered—Controller has connected to the device and is able to execute Cisco commands using the CLI . • Failure—Controller has connected to the device, but is unable to execute Cisco commands using the CLI. This status usually indicates that the device is not a Cisco device. • Authentication Failed—Controller has connected to the device but is unable to determine what type of device it is. This device status also usually indicates that the device is not a Cisco device. • Unreachable—Controller is unable to connect to the device. Note If credentials are not provided at the time a discovery request is made or earlier, then the device status could be displayed as "Not reachable." You need to perform a new discovery with the correct credentials. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 49 Managing Devices and Hosts Device Inventory Information Column Name Description Device Name Name of the device. Click the device name to display the Device Overview dialog box with the following information: • Device serial number • Device IP address • MAC address • Cisco OS version • Up time • Product ID • Vendor • Memory size Note The device name appears red for any device whose inventory has not been updated for more than 30 minutes. The Device Overview dialog box also includes an Interfaces tab with the following interface data: • Status—Up or down • Interface name—Name of the interface. • MAC address—MAC address of the interface. MAC Address MAC address of the device. IP Address IP address of the device. IOS/Firmware Cisco IOS software currently running on the device. Platform Cisco product part number. Serial Number Cisco device serial number. Up Time Period of time that the device has been up and running. Config Click View to display detailed configuration information similar to the CLI show running-config command output. Note Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 50 This feature is not supported for access points and wireless LAN controllers, therefore configuration data is not returned for these device types. Managing Devices and Hosts Device Inventory Information Column Name Description Device Role Role assigned to each discovered device during the scan process. The device role is used to identify and group devices according to their responsibilities and placement within the network. If the controller is unable to determine a device role, it sets the device role as unknown. Note The controller can change the device role as the network topology changes, but if you manually change the device role, then the role will not change as the network topology changes. If desired, you can use the drop-down list in this column to change the assigned device role. The following device roles are available: • Unknown • Access • Core • Distribution • Border Router Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 51 Managing Devices and Hosts Device Inventory Information Column Name Description Location Tag that you can apply to a device to denote its geographic location. By applying the same tag to several devices, you can group them based on a common attribute. The Device Inventory window and Topology window support location tags. Use the following guidelines when creating location tags: • Location tag information is maintained on the controller only and not deployed to or dirived from the device itself. • A location defined on the controller is not the "civic-location" property that some devices support. • You cannot create, use, or search for location tags in the Topology window. • Location tags cannot be attached to hosts. • You can apply only one location tag to a device. However, you can use both a location tag and a device tag together. For information about adding location tags, see Adding or Removing Location Tags, on page 64. Along with the location tag, you can add a geographical marker on a world map to a device. For information, see Adding or Changing a Location Marker, on page 66. Device Tag Tag assigned to devices to identify them by a common attribute. For example, you can create a tag and use it to group devices based on a platform ID or Cisco IOS release. A number in the Tag column indicates how many tags have been applied to that device. Note You are permitted to use both a location tag and a device tag together. For information about adding or removing device tags, see Adding or Removing a Device Tag in Device Inventory, on page 62. For information about deleting a tag from the controller database, see Deleting a Tag, on page 67. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 52 Managing Devices and Hosts Device Inventory Information Column Name Description Policy Tag Tag applied to a group of devices that will share the same policy. After applying a policy tag, you need to configure the policies that will be applied to the devices with the same policy tag. For information about configuring QoS policies, see the Cisco EasyQoS Application for APIC-EM User Guide. Last Updated Time Date and time that the device was last scanned and the controller database was updated. Device Family Group of related devices, as follows: • Cisco Interfaces and Modules • Routers • Switches and Hubs • Third Party Device • Unsupported Cisco Device • Wireless Controller Device Series Series number of the device, for example, Cisco Catalyst 4500 Series Switches. Last Inventory Collection Status Status of the last discovery scan for the device: • Managed—Device is in a fully managed state. • Partial Collection Failure—Device is in a partial collected state and not all the inventory information has been collected. Move the cursor over the Information (i) icon to display additional information about the failure. • Unreachable—Due to device connectivity issues, the device could not be reached and no inventory information was collected. This condition can occur when periodic collection happens. • Wrong Credentials—If the device credentials are changed after adding the device to the inventory, this condition is noted. • In Progress—Inventory collection is occurring. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 53 Managing Devices and Hosts Device Inventory Tasks Device Inventory Tasks The actions that you can perform from the Device Inventory window depend on the layout that you choose. When you select one or more devices, you can click any of the following buttons to perform the corresponding action. Table 18: Device Inventory Buttons Button Action Add Device Allows you to discover a specific device and add it to your inventory. If authentication of the device fails due to invalid credentials, the device enters the collection failure state. For information, see Adding a Device Manually, on page 55. Set Location Sets the location of the devices associated with a location tag on a geographical map. For information, see Adding or Changing a Location Marker, on page 66. Set Device Tags Groups devices according to common attributes. For information, see Adding or Removing a Device Tag in Device Inventory, on page 62. Set Policy Tag Groups devices so that you can deploy the same QoS policy to those devices at the same time. For information, see Adding or Removing a Policy Tag in Device Inventory, on page 63. Delete Deletes the selected devices from inventory. For information, see Deleting a Device, on page 57. Update Credentials Changes the credentials of the selected devices. In future discoveries, these credentials are used for the selected devices instead of the global or discovery job-specific credentials. For information, see Updating Device Credentials, on page 68 Update Polling Interval You can update the polling interval of selected devices. These device-specific settings override the global and job-specific settings for the selected devices. For information, see Updating a Device's Polling Interval, on page 72. Resync (Resynchronize Devices) Immediately polls the selected device for updated device information and status. For information, see Resynchronizing Device Information, on page 71. Command Runner Sends CLI commands to the selected devices using API commands. Currently, show and other read-only commands are permitted. For information, see Running Commands on Devices, on page 71. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 54 Managing Devices and Hosts Adding a Device Manually Adding a Device Manually You can manually add a device to your inventory. Figure 14: Add Device Dialog box Before you begin You must have administrator (ROLE_ADMIN) permissions and access to all devices (RBAC Scope set to ALL) to perform this procedure. Make sure that you have devices in your inventory. If not, discover devices using the Discovery function. Step 1 From the Navigation pane, click Device Inventory. Step 2 Click Add Device. Step 3 From the Add Device dialog box, enter the device's IP address in the Device IP field. Step 4 In the Version field, choose the SNMP version from the drop-down list: V2C or V3 and complete the corresponding fields: Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 55 Managing Devices and Hosts Adding a Device Manually Table 19: SNMP V2C Fields Field Description Read Community Read-Only community string value configured on devices that allows the controller to connect to and access the devices. This community string value must match the community string value that was pre-configured on the devices. Write Community Write community string value configured on devices that allows the controller to connect to, access, and change the devices. This community string value must match the community string value pre-configured on the devices. Table 20: SNMP V3 Fields Field Description Mode Authentication mode to be used. Valid modes are Authentication and Privacy, Authentication, No Privacy, No Authentication, No Privacy. Auth. Type Valid only if you chose Authentication and Privacy or Authentication, No Privacy. Two authentication types are available: • SHA—Authentication based on the Secure Hash algorithm (SHA). SHA is a hash algorithm that is used to authenticate packet data. • MD5—Authentication based on the Message Digest 5 (MD5) algorithm. MD5 is a hash algorithm that is used to authenticate packet data. Username Valid only if you chose SHA or MD5. Text string associated with the SNMP user and the chosen authentication type (SHA or MD5). Auth. Password Valid only if you chose SHA or MD5. Encrypted text string stored as the SNMP user password and associated with the authentication type (SHA or MD5). Privacy Type Valid only if you chose Authentication and Privacy mode. Two privacy types are available: • DES—Data Encryption Standard (DES) 56-bit encryption in addition to authentication based on the Cipher Block Chaining (CBC) DES (DES-56) standard. • AES128—Cipher Block Chaining (CBC) mode AES for encryption. Privacy Password SNMPv3 privacy password associated with the chosen privacy type (DES or AES128) and used to generate the secret key to encrypt messages that are exchanged with devices. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 56 Managing Devices and Hosts Deleting a Device Step 5 Expand the SNMP RETRIES AND TIMEOUT area, if it is not already expanded, and complete the following fields: Table 21: SNMP Retries and Timeout Fields Step 6 Field Description Retries Number of attempts the controller makes to communicate with the devices using SNMP. The default is 3 tries. Timeout Number of seconds the controller waits while attempting to communicate with the devices using SNMP before the attempt fails. The default is 5 seconds. Expand the CLI area, if it is not already expanded, and complete the following fields: Table 22: CLI Fields Step 7 Field Description Protocol Protocol used from a remote management station to connect device CLI. Valid options are Telnet (Telnet TCP/IP) or SSH2 (Secure Shell 2.0). Username Identification used to log into a device's CLI. Password Password used to log into a device's CLI. Enable Password After successful login to the CLI, password used to access Privileged EXEC mode. Click Add. Deleting a Device You can delete devices from the Cisco APIC-EM database. Before you begin You must have administrator (ROLE_ADMIN) permissions and access to all devices (RBAC Scope set to ALL) to perform this procedure. Make sure that you have devices in your inventory. If not, discover devices using the Discovery function. Step 1 From the Navigation pane, click Device Inventory. Step 2 Click the check box next to the device that you want to delete. A toolbar opens. Note Even after the toolbar opens, you can select multiple devices by clicking additional check boxes, or you can select all devices by clicking the checkbox at the top of the list. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 57 Managing Devices and Hosts Filtering Devices in the Device Inventory Window Step 3 From the open toolbar, click Delete. Filtering Devices in the Device Inventory Window You can filter the devices displayed in the Devices Inventory window by device name, location, IP address and VRF instance. Note To remove the filters, click Clear Filters. Figure 15: Device Inventory Window Showing Filters Before you begin Make sure that you have devices in your inventory. If not, discover devices using the Discovery function. Step 1 From the Device Inventory toolbar, click Filters. The following filters display: • Device Name • Device Location • Device IP Address • Device VRF Step 2 Enter the appropriate value in the selected filter field. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 58 Managing Devices and Hosts Changing the Devices Layout View For example, for the Device Name filter, enter the name of a device. The controller presents you with auto-complete values as you enter values in the other fields. Choose one of the suggested values or finish entering the desired value. Note Step 3 You can also use a wildcard (asterisk) with these filters. You can enter values with the asterisk at the beginning, end, or in the middle of the string value. Click the plus (+) icon to perform the filter. The data displayed in the Devices table automatically updates according to your filter selection. Step 4 (Optional) If needed, add more filters following the above steps. Note Step 5 You can filter on more than one value per filter or across several different filter types. To remove the filter, click the x icon next to the filter value. What to do next Review the updated information displayed in the Device Inventory window. If required for your network configuration, make changes to the displayed columns within the Devices table view. Changing the Devices Layout View You can change the information that is displayed in the Devices table by selecting different layout views or by customizing a layout view for the devices in your network. Figure 16: Device Inventory Window Showing Layout Options Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 59 Managing Devices and Hosts Changing the Device Role Before you begin Make sure that you have devices in your inventory. If not, discover devices using the Discovery function. Step 1 From the Device Inventory toolbar, click the Layout field and choose one of the following layout options from the drop-down list: • Status—Displays general device status information, including up time, update frequency, and number of updates. • Hardware—Displays hardware information, including IOS/firmware, serial number, and device role. • Tagging—Displays tagging information, including device role, location, and tag. • Customize—Displays a list of options to choose from to create your own layout. APIC-EM displays the information for the chosen layout. Step 2 To customize a specific layout, choose Customize and select the desired display options. Display options toggle on and off. Blue options with checkmarks indicate that the option is on and is displayed in the table. What to do next Review the updated information displayed in the Device Inventory window. If required for your network configuration, make any adjustments. Changing the Device Role During the scan process, the controller assigns a role to each discovered device. The device role is used to identify and group devices according to their responsibilities and placement in the network. A device can have one of the following roles: • Unknown—Device role is unknown. • Access—Device is located in and performs tasks required of the access layer or first tier/edge of the network. • Border Router—Device performs tasks required of a border router. • Distribution—Device is located in and performs tasks required of the distribution layer of the network. • Core—Device is located in and performs tasks required of the core of the network. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 60 Managing Devices and Hosts Changing the Device Role Figure 17: Device Roles and Network Locations You can change the device role in the Device Inventory window. Note You can also change the device role from the Topology window. See Changing a Device's Role From the Topology Window, on page 92. Before you begin Make sure that you have devices in your inventory. If not, discover devices using the Discovery function. You must have either administrator (ROLE_ADMIN) or policy administrator (ROLE_POLICY_ADMIN) permissions and the appropriate RBAC scope to perform this procedure. Step 1 From the Navigation pane, click Device Inventory. The Devices Inventory window appears. Step 2 From the Device Inventory toolbar, choose one of the options from the Layout drop-down list. Valid options are Hardware, Tagging, or Customize > Device Role. The table refreshes and includes a column for the Device Role. Step 3 Locate the device you want to change and choose a new role from the drop-down list in the Device Role column. Valid choices are Unknown, Access, Core, Distribution, or Border Router. What to do next If required, change the role of other devices in the Device Inventory window. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 61 Managing Devices and Hosts Adding or Removing a Device Tag in Device Inventory Adding or Removing a Device Tag in Device Inventory You can group devices according to common attributes by applying device tags. For example, you may want to apply device tags to group devices by their platform ID or Cisco IOS release. A single device can have multiple device tags; similarly, a single device tag can be applied to multiple devices. Note For information about Policy tags and Location tags, see Adding or Removing a Policy Tag in Device Inventory, on page 63 and Adding or Removing Location Tags, on page 64. Figure 18: Device Tags Dialog Box Before you begin You must have administrator (ROLE_ADMIN) permissions and access to all devices (RBAC Scope set to ALL) to perform this procedure. Make sure that you have devices in your inventory. If not, discover devices using the Discovery function. Step 1 From the Navigation pane, click Device Inventory. Step 2 From the Device Inventory toolbar, choose Layout > Tagging from the drop-down list. The table refreshes and displays a Device Tag column in addition to other columns. Step 3 Select the check box to the left of the desired devices and click Set Device Tags. Note Step 4 For a single device, you can also click the number displayed in the Device Tag column. Do one of the following: • To apply a device tag, from the Available Tags list, click the tags that you want to apply to the selected devices. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 62 Managing Devices and Hosts Adding or Removing a Policy Tag in Device Inventory Note If the desired tag is not in the list, enter a name for the tag and click +New Tag. • To remove a device tag, from the Applied Tags list, click the Trash can icon next to the tag that you want to remove from the selected devices. Note Step 5 The Applied Tags list is populated only if at least one of the selected devices has a tag applied to it. Click x to close the dialog box. What to do next If required for your network configuration, add location or policy tags to your devices. Adding or Removing a Policy Tag in Device Inventory You can apply a policy tag applied to a group of devices so that you can deploy the same QoS policy to those devices at the same time. Figure 19: Policy Tag Dialog Box Before you begin Make sure that you have devices in your inventory. If not, discover devices using the Discovery function. SUMMARY STEPS 1. 2. 3. 4. From the Navigation pane, click Device Inventory. From the Device Inventory toolbar, choose Layout > Tagging from the drop-down list. Select the check box to the left of the desired devices and click Set Policy Tag. Do one of the following: Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 63 Managing Devices and Hosts Adding or Removing Location Tags 5. Click x to close the dialog box. DETAILED STEPS Step 1 From the Navigation pane, click Device Inventory. Step 2 From the Device Inventory toolbar, choose Layout > Tagging from the drop-down list. The table refreshes and displays a Policy Tag column in addition to other columns. Step 3 Select the check box to the left of the desired devices and click Set Policy Tag. Note Step 4 For a single device, you can also click Add displayed in the Policy Tag column. Do one of the following: • To apply a policy tag, from the Available Tags list, click the tag that you want to apply to the selected devices. Note If the desired tag is not in the list, enter a name for the tag and click +New Tag. • To remove a policy tag, from the Applied Tags list, click the Trash can icon next to the tag that you want to remove from the selected devices. Note Step 5 The Applied Tags list is populated only if at least one of the selected devices has a tag applied to it. Click x to close the dialog box. What to do next If you added a policy tag to devices and now want to configure QoS policies, see the Cisco EasyQoS Application for APIC-EM User Guide. Adding or Removing Location Tags You can apply a location tag to a device to name a device's geographic location. By applying the same tag to several devices, you can group them based on their common location. You can create a location tag and, optionally, place a corresponding location marker on a geographical map. For information, see Adding or Changing a Location Marker, on page 66. Use the following guidelines when adding location tags: • Location tag information is maintained on the controller only and not deployed to or dirived from the device itself. • When location tags and markers are used, the Topology window displays them on a geographical map. • A location defined on the controller is not the "civic-location" property that some devices support. • Location tags cannot be attached to hosts. • You can apply only one location tag to a device. However, you can use both a location tag and a device tag together. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 64 Managing Devices and Hosts Adding or Removing Location Tags Figure 20: Set Location Tag Dialog Box Before you begin You must have administrator (ROLE_ADMIN) permissions and access to all devices (RBAC Scope set to ALL) to perform this procedure. Step 1 From the Navigation pane, click Device Inventory. Step 2 From the Device Inventory toolbar, choose Layout > Tagging from the drop-down list. The table refreshes and displays a Location column in addition to other columns. Step 3 Select the check box to the left of the desired devices (or select the check box at the top of the list to select all devices) and click Set Location. Note Step 4 For a single device, you can also click the Add link displayed in the Location column for that device. Do one of the following: • To apply a location tag, from the Available Tags list, click the tag that you want to apply to the selected devices. If the desired tag is not in the list, click the plus icon (+), enter a name for the tag, and click the check mark icon. • To remove a location tag assignment from the devices, in the Edit Location field, click the x icon . The devices now have no location tag assignment. • To change the current location tag to another one, click the new location tag that you want to assign. • To delete the location tag, first make sure that it is not in use (either change device assignments to other location tags or remove the tag assignment altogether). Then, click the trash can icon next to the location tag that you want to delete. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 65 Managing Devices and Hosts Adding or Changing a Location Marker Step 5 When you are done, click x to close the dialog box. What to do next If required for your network configuration, add or remove other location tags to other devices or add location markers. Related Topics Adding or Changing a Location Marker, on page 66 Adding or Changing a Location Marker A location marker is an icon used to indicate the location of the devices associated with a location tag on a geographical map. You can add a location marker to devices in the Device Inventory window. Before you begin You must have administrator (ROLE_ADMIN) permissions and access to all devices (RBAC Scope set to ALL) to perform this procedure. Make sure that you have devices in your inventory. If not, discover devices using the Discovery function. You have already added location tags to your devices. Step 1 From the Navigation pane, click Device Inventory. Step 2 From the Device Inventory toolbar, choose Layout > Tagging from the drop-down list. The table refreshes and displays a Location column in addition to other columns. Step 3 (Optional) To display devices with a specific location tag, from the Device Inventory toolbar, click Filters, enter a location tag in the Device Location field, and click the + icon. Step 4 Select the desired location tag from the Locations column. Note Step 5 Because you are not assigning a location tag, it is not important which device you choose. When you add or remove a location marker, the change is applied to the location tag, and all devices that have the location tag will be updated. To add or change a location marker, select the location tag from the Available Locations pane and do one of the following: • In the Address of Location field on the right side of the geographical map, enter the address where you want to place the location marker. You can enter a complete address or part of an address, for example, a city name or zip code. Cisco APIC-EM displays the location on the map. Click the map where you want the marker to be placed and confirm the action in the confirmation dialog box that appears. • Position the map as close to the desired location as possible using your mouse to drag and drop, zoom in, and zoom out on the map, then click the map. Note If you need to reposition the marker, click the map again where you want the marker to be placed. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 66 Managing Devices and Hosts Deleting a Tag Figure 21: Edit Location Dialog Box Showing Location Marker Step 6 (Optional) To add additional location markers, click another location tag and repeat Step 5. Step 7 When you are done, click x to close the dialog box. Deleting a Tag When a device tag, policy tag, or location tag is no longer needed, you can delete it, and it is removed permanently from the controller. You can delete device tags using the Device Inventory window or the Topology window. Policy tags and location tags can be deleted only from the Device Inventory window. This procedure shows you how to delete tags from the Device Inventory window. Before you begin You must have administrator (ROLE_ADMIN) permissions and access to all devices (RBAC Scope set to ALL) to perform this procedure. Make sure that you have devices in your inventory. If not, discover devices using the Discovery function. Before you can delete a tag, you need to remove it from all devices that have been assigned the tag. Step 1 From the Navigation pane, click Device Inventory. Step 2 From the Device Inventory toolbar, choose Layout > Tagging from the drop-down list. Step 3 Do one of the following: • To delete a device tag, click any number in the Device Tag column. From the Available Tags list, click the Trash can icon next to the tag or tags that you want to delete. • To delete a policy tag, click Add or the name of a policy tag in the Policy Tag column. From the Available Tags list, click the Trash can icon next to the tag or tags that you want to delete. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 67 Managing Devices and Hosts Updating Device Credentials • To delete a location tag, click Add or the name of a location tag in the Location column. From the Available Locations list, click the Trash can icon next to the tag or tags that you want to delete. Step 4 Click OK to confirm the deletion. The tag is removed permanently from the controller. If the deletion fails, the tag might still be assigned to devices. Remove the tag from these devices and try to delete the tag again. Step 5 Click x to close the dialog box. Updating Device Credentials You can update the discovery credentials of selected devices. The updated settings override the global and job-specific settings for the selected devices. Figure 22: Update Device Credentials Dialog Box Before you begin Make sure that you have devices in your inventory. If not, discover devices using the Discovery function. You must have either administrator (ROLE_ADMIN) or policy administrator (ROLE_POLICY_ADMIN) permissions and the appropriate RBAC scope to perform this procedure. Step 1 From the Navigation pane, click Device Inventory. Step 2 Select the devices that you want to update. Step 3 Click Update Credentials. Step 4 Click OK to confirm this action. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 68 Managing Devices and Hosts Updating Device Credentials Step 5 From the Update Credentials dialog box, expand the SNMP area, if it is not already expanded. Step 6 In the Version field, choose the SNMP version from the drop-down list: V2C or V3 and complete the corresponding fields: Note Both the SNMP and CLI credentials are updated together, so you need to provide both credentials. If you provide only SNMP credentials, Cisco APIC-EM saves only the SNMP credentials. The CLI credentials are not updated. Table 23: SNMP V2C Fields Field Description Read Community Read-Only community string value configured on devices that allows the controller to connect to and access the devices. This community string value must match the community string value that was pre-configured on the devices. Write Community Write community string value configured on devices that allows the controller to connect to, access, and change the devices. This community string value must match the community string value pre-configured on the devices. Table 24: SNMP V3 Fields Field Description Mode Authentication mode to be used. Valid modes are Authentication and Privacy, Authentication, No Privacy, No Authentication, No Privacy. Auth. Type Valid only if you chose Authentication and Privacy or Authentication, No Privacy. Two authentication types are available: • SHA—Authentication based on the Secure Hash algorithm (SHA). SHA is a hash algorithm that is used to authenticate packet data. • MD5—Authentication based on the Message Digest 5 (MD5) algorithm. MD5 is a hash algorithm that is used to authenticate packet data. Username Valid only if you chose SHA or MD5. Text string associated with the SNMP user and the chosen authentication type (SHA or MD5). Auth. Password Valid only if you chose SHA or MD5. Encrypted text string stored as the SNMP user password and associated with the authentication type (SHA or MD5). Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 69 Managing Devices and Hosts Updating Device Credentials Field Description Privacy Type Valid only if you chose Authentication and Privacy mode. Two privacy types are available: • DES—Data Encryption Standard (DES) 56-bit encryption in addition to authentication based on the Cipher Block Chaining (CBC) DES (DES-56) standard. • AES128—Cipher Block Chaining (CBC) mode AES for encryption. Privacy Password Step 7 SNMPv3 privacy password associated with the chosen privacy type (DES or AES128) and used to generate the secret key to encrypt messages that are exchanged with devices. Expand the SNMP RETRIES AND TIMEOUT area, if it is not already expanded, and complete the following fields: Table 25: SNMP Retries and Timeout Fields Step 8 Field Description Retries Number of attempts the controller makes to communicate with the devices using SNMP. The default is 3 tries. Timeout Number of seconds the controller waits while attempting to communicate with the devices using SNMP before the attempt fails. The default is 5 seconds. Expand the CLI area, if it is not already expanded, and complete the following fields: Both the SNMP and CLI credentials are updated together, so you need to provide both credentials. If you provide only SNMP credentials, Cisco APIC-EM saves only the SNMP credentials. The CLI credentials are not updated. Note Table 26: CLI Fields Step 9 Field Description Protocol Protocol used from a remote management station to connect device CLI. Valid options are Telnet (Telnet TCP/IP) or SSH2 (Secure Shell 2.0). Username Identification used to log into a device's CLI. Password Password used to log into a device's CLI. Enable Password After successful login to the CLI, password used to access Privileged EXEC mode. Click Update. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 70 Managing Devices and Hosts Resynchronizing Device Information Resynchronizing Device Information You can select devices to be polled immediately for updated device and status information, regardless of the polling interval that is set. A maximum of 40 devices can be resynchronized at the same time. Figure 23: Device Inventory Window Showing Resync in Progress Step 1 From the Navigation pane, click Device Inventory. Step 2 Select the device or devices on which you want to gather information about. Step 3 Click Resync. Step 4 Confirm the resynchronization by clicking OK. Running Commands on Devices You can run show commands and other read-only commands on selected devices and display the output in Cisco APIC-EM. To determine the allowed command keywords, from the global toolbar, click API > Network Poller > network-device-poller > /network-device-poller/cli/legit-reads > Try it out! From the GUI, you can run a maximum of 5 commands per device, with a maximum of 20 devices per request. When a device is part of another request that has not completed yet, no other commands are executed on it. Access points are not supported. If you choose access points, they are omitted from executing commands. Commands are only run on the other selected devices. Before you begin The command runner application is not installed on Cisco APIC-EM by default. To use the command running application, you need to download the image from Cisco.com, install it, and enable the Command Runner Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 71 Managing Devices and Hosts Updating a Device's Polling Interval application. For information, see the Cisco Application Policy Infrastructure Controller Enterprise Module Administrator Guide. You must have either administrator (ROLE_ADMIN) or policy administrator (ROLE_POLICY_ADMIN) permissions and the appropriate RBAC scope to perform this procedure. Make sure that you have devices in your inventory. If not, discover devices using the Discovery function. Step 1 From the Navigation pane, click Device Inventory. Step 2 Select the device on which you want to run commands. Step 3 Click Command Runner. Step 4 In the Command field, enter the command that you want to run and click the plus sign (+) icon to add the command to the list of commands to be run. You can add only one command at a time and up to 5 commands total. Step 5 When you have defined all of the commands that you want to run, click Run. Cisco APIC-EM runs the commands on the selected devices and displays the command output. Note Command Runner does not maintain any cache or history of the command results. If you run commands and then close or navigate to a different window, all actions performed in command runner and their results are lost. Updating a Device's Polling Interval You can update the polling interval at the global level for all devices on the Settings > Polling Interval page or at the device level for a specific device in the Device Inventory window. When you set the polling interval at the device level, that value takes precedence over the global polling interval value. For information about setting the polling interval at the global level, see the Cisco Application Policy Infrastructure Controller Enterprise Module Administrator Guide. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 72 Managing Devices and Hosts Managing Your Host Inventory Figure 24: Update Polling Interval Dialog Box Before you begin Make sure that you have devices in your inventory. If not, discover devices using the Discovery function. You must have either administrator (ROLE_ADMIN) or policy administrator (ROLE_POLICY_ADMIN) permissions and the appropriate RBAC scope to perform this procedure. Step 1 From the Navigation pane, click Device Inventory. Step 2 Select the devices that you want to update. Step 3 Click Update Polling Interval. Step 4 Click OK to confirm this action. Step 5 From the Update Polling Interval dialog box, in the Status field, click Enabled to turn on polling or click Disabled to turn off polling. Step 6 In the Polling Time field, enter the time interval (in minutes) between successive polling cycles. Valid values are from 25 to 1440 minutes (24-hours). Note Step 7 The device-specific polling time supersedes the global polling time. If you set the device-specific polling time and then change the global polling time, Cisco APIC-EM continues to use the device-specific polling time. Click Update. Managing Your Host Inventory Cisco APIC-EM displays information about the discovered hosts in the Host Inventory window. The following table describes the information that is displayed about the hosts in your inventory. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 73 Managing Devices and Hosts Filtering Hosts in the Host Inventory Window Note Use the filters located below the Host Inventory table to limit the number of hosts displayed in the table (10, 25, 50, 100) or to view groups of hosts at a time (First, Previous, Next, Last, or 1-3). Figure 25: Host Inventory Window The following table describes the information that is displayed about the hosts in your inventory. Table 27: Host Inventory Host Inventory Description Host Name Name of the host. Host MAC address MAC address of the host. Host IP address IP address of the host. Host type Type of host (wired or wireless). Connected Network Device IP Address IP address of the device that is connected to the host. Note Connected Interface Name IP addresses of only wired devices are shown. Name of the interface that the device is connected to. For example, GigabitEthernet1/0/24. Filtering Hosts in the Host Inventory Window You can filter the hosts displayed in the Host Inventory window by host MAC address, host IP address, host name, host type, connected network device IP address, or connected interface name. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 74 Managing Devices and Hosts Filtering Hosts in the Host Inventory Window Figure 26: Host Inventory Window Showing Filters Pane Before you begin Make sure that you have hosts in your inventory. If not, discover them using the Discovery function. Step 1 From the Host Inventory toolbar, click Filters. You can choose from the following filter options: • Host MAC Address • Host IP Address • Host Name • Host Type • Connected Network Device IP Address • Connected Interface Name Step 2 Enter the appropriate value in the selected filter field. For example, for the Host Name filter, enter the name of the host. The controller presents you with auto-complete values as you enter values in the other fields. Choose one of the suggested values or finish entering the value. Note Step 3 You can also use a wildcard (asterisk) with these filters. You can enter values with the asterisk at the beginning, end, or in the middle of the string value. Click the plus (+) icon to perform the filter. The data displayed in the Devices table automatically updates according to your filter selection. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 75 Managing Devices and Hosts Filtering Hosts in the Host Inventory Window Step 4 (Optional) If needed, add more filters following the above steps. Note Step 5 You can filter on more than one value per filter or across several different filter types. To remove the filter, click the x icon next to the filter value. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 76 CHAPTER 6 Using the Topology Map • About Topology, on page 77 • Displaying Device Data, on page 83 • Aggregating Devices, on page 84 • Configuring the Topology Structure, on page 88 • Saving a Topology Layout, on page 90 • Opening a Saved Topology Layout, on page 91 • Changing a Device's Role From the Topology Window, on page 92 • Searching for Devices and Hosts, on page 93 • Adding or Removing a Device Tag in Topology , on page 95 • Adding or Removing a Policy Tag in Topology, on page 96 • Displaying Devices with Tags, on page 97 About Topology The Topology window displays a graphical view of your network. Using the discovery settings that you have configured, the Cisco APIC-EM discovers and maps devices to a physical topology with detailed device-level data. Note The entire network topology is displayed. However, you will only have access to device information and functions if the device is listed in the device scope in your user profile. If the device is not in your device scope, then you will not be able to view additional information about the device, or, in the case of a user profile with ROLE_ADMIN or ROLE_POLICY_ADMIN, tag devices or change device roles. To access the Topology window, from the Navigation pane, click Topology. The Topology window appears and displays a topology map of your network. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 77 Using the Topology Map Topology Toolbar Figure 27: Topology Window The topology map includes the following key features: • Auto-visualization of Layer 2 and 3 topologies on top of the physical topology for a granular view for design planning and simplified troubleshooting. • For a Layer 2 topology, display of configured VLANs within your network. For a Layer 3 topology, display of OSPF, IS-IS, and so on, depending on what is currently configured and in use in your network. • Device information. • Display of a path trace in the topology map. For additional information about performing a path trace, see the Cisco Path Trace Application for APIC-EM User Guide. Note Individual device configurations are retrieved and stored in a network information database (NIDB). Topology Toolbar The Topology toolbar is located at the top of the Topology window. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 78 Using the Topology Map Topology Toolbar Figure 28: Topology Window Icon Name Description Toggle Aggregation Enables or disables device aggregation. Aggregating devices means grouping devices together. You can group devices in any way that makes sense to you. You can save the layout for future reference by clicking the Save icon. This grouping does not effect the physical configuration on the devices. Aggregation is enabled by default. Toggle Multiselect Allows you to select multiple devices by dragging the mouse over the desired devices or shift-clicking on devices. You can also select multiple groups of devices by clicking shift and dragging the mouse over a group of devices. After selecting the group of devices, you can aggregate or tag them. If you aggregate devices of different product families, the Cisco APIC-EM shows them as generic devices (without a device type) and the number of devices. Multiselect is off by default. Search Topology Searches for a host or device by host name, device name, device type, or IP address. As you enter information into this field, the Cisco APIC-EM displays matches. Select the host or device from the results that appear. The selected host or device appears in the Topology window. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 79 Using the Topology Map Topology Toolbar Icon Name Description Filters Allows you to choose a filter that you can apply to the topology map. For each filter, you can make additional adjustments using the Advanced options. For information, see Configuring the Topology Structure, on page 88. • Enterprise (Default)—Displays your network topology, separating your devices on connection branches. For example, if a group of devices are connected to Router A, and another group of devices are connected to Router B, the topology would show this division and would separate the devices. • Connections—Displays the devices according to their number of connections. Starting from the left, the devices with no connections are displayed, then devices with one connection, then devices with two connections, and so on. • Type and Role—Displays the devices according to their role in the network: access router, distribution switch, core switch and hub, and boarder router. • Advanced—Provides options for you to refine the topology display. Adjusts the Topology window's view. Click the - (minus) icon to minimize the view of the network hosts and devices. Zoom out Note Zoom in Adjusts the Topology window's view. Click the + (plus) icon on the menu bar to maximize the view of the network hosts and devices. Toggle Color Code Toggles between displaying the device icons in different colors or in a single color. Color coding is enabled by default. Device Tags Displays the available device tags. Clicking on an individual tag highlights the device or devices in the Topology window that have this tag. You can also apply tags to devices by selecting the device, clicking Device Tagging in the Device Information dialog box, and then creating and applying the tags. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 80 Using the Topology Map Topology Toolbar Icon Name Description Policy Tags Displays the available policy tags. Clicking on an individual tag adds the device to the policy scope. You can also applypolicy tags to devices in the EasyQoS > Policy Scopes. Layers Displays devices with the following attributes on the topology map: • Layer 2—Displays devices based on the selected VLAN or Layer 2 protocol. Select either a VLAN from the drop-down menu or one of the Layer 2 protocols. Note You can also access a management network view by choosing a management selection from the drop-down menu. • Layer 3—Displays devices based on the selected Layer 3 protocol. The following Layer 3 protocols are available: • Intermediate System-to-Intermediate System (IS-IS) • Open Shortest Path First (OSPF) • Enhanced Interior Gateway Routing Protocol (EIGRP) • Static-Route Note The default Layer 3 topology has all Layer 3 protocols. • VRF—Displays devices that have Virtual Routing and Forwarding (VRF) tables. Save and Load Options Displays the following options: • Save Current Layout—Saves the current layout, device aggregations, and labels. • Load Saved Layout—Loads the previously saved layout, device aggregations, and labels) options. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 81 Using the Topology Map Topology Icons Icon Name Description Map view Displays the Topology map view. Click this icon to view the network topology in a graphical representation of your network's physical location. This icon is displayed only if you have added location markers for your devices from the Device Inventory window. Note Topology Icons The following icons appear in the Topology window: Icon Network Element Description Cloud Representation of the external network. Router Displays the device name. Switch Displays the device name. Access Point Displays the device name. Wireless LAN Controller Displays the device name. Aggregated Devices Displays the number of aggregated devices and the device type. Note Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 82 If different devices types are aggregated, only the number of aggregated devices is displayed. Using the Topology Map Displaying Device Data Icon Network Element Description Location Marker Displays the device name. The device icon is displayed with a location marker as a background. If you add location markers to your devices (from the Device Inventory window) and then click Topology in the navigation pane or click the Map button on the Topology toolbar, the Topology map view appears. The map view shows where you have placed your location markers (for example, San Jose and London). Click a location marker on the map to display the topology for that location (for example, San Jose). Devices that use a different location marker (for example, London) are shown with a location marker as a background. Links Lines between devices. Click on a link to display information about the connected devices. Note Some of the links may be hidden due to device aggregations. Displaying Device Data You can display data for a specific device in the Topology window. Displaying device data is helpful when troubleshooting network connectivity issues between devices. Note The device data that is accessible in the Topology window is also accessible in the Device Inventory window. The following device data is available: • Location (Location information is displayed if the selected device icon has a location marker background. Click the Location link to display the topology for devices that share that location marker.) • Type • Device role (For information about changing the device role, see Changing the Device Role, on page 60. • IP address • MAC address • OS (operating system) • Software version • Ports Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 83 Using the Topology Map Aggregating Devices • Gigabit Ethernet ports • 10-Gigabit Ethernet ports • Management ports • VLAN (if exists) • Number of connections • List of connected devices (Each connected device shows its device type (icon) and the number of connections. Clicking on a connected device displays the details for that device.) • Tags Step 1 From the Navigation pane, click Topology. The Topology window appears. Note If you have added location markers for your devices from the Device Inventory window, the Topology map view appears. Click a location marker to display the Topology for that location. Step 2 To display data for a specific device, click that device in the Topology window. Step 3 To display a list of aggregated devices, do the following: a) In the Topology window, click an aggregated devices icon. b) In the Device Details pane, click the Details link for each device to view the device data. c) Click the Aggregated Results link to return to the list of aggregated devices. What to do next Select and review data from other devices within your network, or perform other tasks including the following: • Aggregate or disaggregate selected groups • Search for device using device names and IP addresses • Apply tags to devices within your network • Change the device role Aggregating Devices You use the Cisco APIC-EM device aggregation feature to adjust how devices are displayed in the Topology window. This feature enhances network navigation and manageability. Aggregating Devices in the Topology Window You can aggregate and disaggreate devices into and out of groups in the Topology window. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 84 Using the Topology Map Aggregating Devices in the Topology Window Before you begin Scan your network using the discovery functionality of the Cisco APIC-EM to populate device and host inventory for the database. Determine how the devices within your network configuration are to be visually grouped and organized. Step 1 Click Topology in the navigation pane. The Topology window appears. Note Step 2 Click the Toggle Aggregation icon to enable device aggregation. Note Step 3 If you have added location markers for your devices from the Device Inventory window, the Topology map view appears. Click a location marker to display the Topology for that location. Device aggregation is enabled by default. Drag and drop a device icon onto another device icon. The device icon changes to an aggregated devices icon. For more information about the aggregated devices icon, see Topology Icons, on page 82. Note You can also select multiple devices by clicking the Multiselect icon, dragging the mouse over the desired devices, and clicking the Aggregate Selected link. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 85 Using the Topology Map Disaggregating Devices in the Topology Window Disaggregating Devices in the Topology Window You can ungroup devices by disaggregating them in the Topology window. Figure 29: Topology Window Showing Disaggregate Option in Devices List Before you begin Scan your network using the discovery functionality of the Cisco APIC-EM to populate device inventory for the database. Determine how the devices within your network configuration are to be visually grouped and organized. Step 1 From the Navigation pane, click Topology. The Topology window appears. Note Step 2 If you have added location markers for your devices from the Device Inventory window, the Topology map view appears. Click a location marker to display the Topology for that location. Click on an aggregated devices icon. A list of the aggregated devices appears. Step 3 From the list, click the Disaggregate link for each device that you want to remove from the aggregated devices. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 86 Using the Topology Map Changing the Aggregated Devices Label The device is removed from the list and from the aggregated devices icon. The aggregated device label and the aggregated devices icon are updated to reflect the number of devices. Changing the Aggregated Devices Label The default label for aggregated devices is the number of devices and the device type (# devicetype Devices). However, you can change the default label to one that is meaningful in the context of your network topology. Before you begin Scan your network using the discovery functionality of the Cisco APIC-EM to populate device inventory for the database. Determine how the devices within your network configuration are to be visually grouped and organized. Step 1 From the Navigation pane, click Topology. The Topology window appears. Note Step 2 If you have added location markers for your devices from the Device Inventory window, the Topology map view appears. Click a location marker to display the Topology for that location. Click an aggregated devices icon. A list of the aggregated devices appears. At the top of the list is the aggregated devices label. Step 3 Click the aggregated devices label to open an edit field where you can change the label. Step 4 Change the label, then click outside of the edit field to save your changes. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 87 Using the Topology Map Configuring the Topology Structure Configuring the Topology Structure You can choose from three default topology layouts. You can also use advanced settings to modify these layouts, such as the overall size of the topology graph, the spacing that separates individual elements, and more. Figure 30: Topology Window Showing Filters Drop-Down List Before you begin Scan your network using the discovery functionality of the Cisco APIC-EM to populate device inventory for the database. Step 1 From the Navigation pane, click Topology. The Topology window appears. Note If you have added location markers for your devices from the Device Inventory window, the Topology map view appears. Click a location marker to display the Topology for that location. Step 2 From the Topology toolbar, click the Filters icon. Step 3 Select a filter from the drop down list. Available options are Enterprise Collapsed, Enterprise Expanded, or Device Type & Role. Step 4 Click the Advanced View button to configure how each filter is displayed. Click the Basic View button to return to the basic view. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 88 Using the Topology Map Configuring the Topology Structure Filter Basic View Advanced View Enterprise Arranges the device icons into a Device type—Use the slider to adjust the amount of structured connection hierarchical view, space between device icons based on their device types. from top to bottom. cloud-centralizeX— When checked (default), the device icons are centered along the X axis. When unchecked, the device icons are aligned to the X axis. Device role—Use the slider to adjust the amount of space between device icons based on their device roles. Branch— Use the slider to adjust the amount of space between branches. Node overlap—Use the slider to adjust the amount of space between nodes. Note Connections Arranges the device icons from left to Connections—Use the slider to adjust the amount of right based on the number of connections, space between connections. from least to most. Node overlap—Use the slider to adjust the amount of Note Aggregated devices are space between nodes. disaggregated in this view. centralizeY—When checked, the device icons are centered along the Y axis. When unchecked, the device icons are aligned to the Y axis. Note Type and Role Select x or y from the drop down next to each slider to change how the device icons are displayed, horizontally or vertically. Arranges the device icons from top to bottom based on device type (cloud, router, WLC, switch, access point, wired, wireless) and role (border router, core, distribution, and access) Note Aggregated devices are disaggregated in this view. Select x or y from the drop down next to each slider to change how the device icons are displayed, horizontally or vertically. Device type—Use the slider to adjust the amount of space between device icons based on their device types. Device role—Use the slider to adjust the amount of space between device icons based on their device roles. Node overlap—Use the slider to adjust the amount of space between nodes. centralizeX—When checked, the device icons are centered along the X axis. When unchecked, the device icons are aligned to the X axis. Note Select x or y from the drop down next to each slider to change how the device icons are displayed, horizontally or vertically. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 89 Using the Topology Map Saving a Topology Layout What to do next Save the current layout or load a previously saved layout. For information, see Saving a Topology Layout, on page 90 and Opening a Saved Topology Layout, on page 91. Saving a Topology Layout You can save a topology layout so that you can open and view it later. Figure 31: Topology Window Showing Save Dialog Box Before you begin You must have administrator role permissions. You must have administrator (ROLE_ADMIN) permissions and access to all devices (RBAC Scope set to ALL) to perform this procedure. Make sure that you have devices in your inventory. If not, discover devices using the Discovery function. Step 1 From the Navigation pane, click Topology. The Topology window appears. Step 2 From the Topology toolbar, click the Save icon. Step 3 In the Topology Title field, enter a name for the topology and click Save as New. Step 4 Click OK to confirm the save. The topology is saved and the name appears at the top of the dialog box. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 90 Using the Topology Map Opening a Saved Topology Layout Opening a Saved Topology Layout You can open a topology layout that you have previously saved. Figure 32: Topology Window Showing Previously Saved Topology Layouts in Save Dialog Box Before you begin You must have administrator (ROLE_ADMIN) permissions and access to all devices (RBAC Scope set to ALL) to perform this procedure. Make sure that you have devices in your inventory. If not, discover devices using the Discovery function. Step 1 From the Navigation pane, click Topology. The Topology window appears. Step 2 From the Topology toolbar, click the Save icon. A dialog box appears listing the saved topology layouts. Step 3 For the topology layout that you want to open, click the Folder icon.. Step 4 Click OK to confirm. The topology layout opens in the Topology window. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 91 Using the Topology Map Changing a Device's Role From the Topology Window Changing a Device's Role From the Topology Window During the scan process, a device role is automatically assigned to each discovered device. The device role is used for identifying and grouping devices according to their responsibilities and placement within the network. A device can have one of the following roles within the Cisco APIC-EM: • Unknown—Device role is unknown. • Access—Device is located within and performs tasks required for the access layer or first tier/edge. • Border Router—Device performs the tasks required for a border router. • Distribution—Device is located within and performs tasks required for the distribution layer. • Core—Device is located within and performs tasks required for the core. You can change the device role when you select a device and display the device data. Note You can also change the device role from the Device Inventory window. Figure 33: Topology Window Showing Role Drop-Down List Before you begin Scan your network using the discovery functionality of the Cisco APIC-EM to populate device inventory for the database. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 92 Using the Topology Map Searching for Devices and Hosts Step 1 From the Navigation pane, click Topology. The Topology window appears. Note If you have added location markers for your devices from the Device Inventory window, the Topology map view appears. Click a location marker on the map to display the Topology for that location. Step 2 Click a specific device in the Topology window to select it. Step 3 Choose a role from the Role drop-down list: Access, Core, Distribution, or Border Router. Step 4 (Optional) Select additional devices and change device roles. Step 5 Click the Filters icon on the Topology toolbar. Step 6 (Optional) Select a filter from the drop down list. Available options are Branch, Connections, or Device and Role. Step 7 Click the refresh button to the right of the filter type to update all of the device roles. The Topology structure refreshes showing the changed device roles. Searching for Devices and Hosts You use the Cisco APIC-EM search function to locate specific devices or hosts within your network. This function allows you to search the network using any string value. To locate a specific device or host quickly, use any of the following values in the search field: • Device or host name • Aggregation label • IP address • Device role • Device type Note The search function supports fragmented results. For example, if you enter 12 in the search field, you will get results for devices with IP addresses or device names that contain 1 and 2 (.12, .120, .102, 10.20, 1-switch2, etc). Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 93 Using the Topology Map Searching for Devices and Hosts Figure 34: Topology Window Showing Device Search List Before you begin Scan your network using the discovery functionality of the Cisco APIC-EM to populate device and host inventory for the database. Determine the string value to be used within your network for your search. Step 1 Click Topology in the navigation pane. The Topology window appears. Note Step 2 If you have added location markers for your devices from the Device Inventory window, the Topology map view appears. Click a location marker on the map to display the Topology for that location. From the Topology toolbar, enter a keyword in the Search Topology field. As you begin typing, the controller displays a list of possible matches to your entry. Note You can click the x in the search field to clear the search keyword field and the results. Step 3 Click on a device from the search results to highlight that device and its links in the Topology window. Click on the device again to display detailed data for that device. Step 4 Proceed with any provisioning or troubleshooting tasks on the located devices or hosts. What to do next Search using other string values for other devices or hosts within your network, or perform other tasks including the following: Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 94 Using the Topology Map Adding or Removing a Device Tag in Topology • Viewing the data for specific devices • Applying tags to devices within your network • Host a meeting using the topology co-editor to collaborate with other users in real-time on the network Adding or Removing a Device Tag in Topology In the Topology window, you can add device tags to associate devices that share a common attribute. For example, you can create a tag and use it to group devices based upon a platform ID, Cisco IOS releases, or location. Similarly, you can remove tags from devices. You can also add or remove device tags from the Device Inventory window or from the EasyQoS window. For information, see Adding or Removing a Device Tag in Device Inventory, on page 62 or the Cisco EasyQoS Application for APIC-EM User Guide. Note Applying a tag to a host is not supported. Figure 35: Device Tag Dialog Box Before you begin • Make sure that you have devices in your inventory. If not, discover devices using the Discovery function. Step 1 From the Navigation pane, click Topology. Step 2 Click the device or devices you want to tag. To select more than one device, click the Multiselect icon. For information about how to use the multiselect function, see Topology Icons, on page 82. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 95 Using the Topology Map Adding or Removing a Policy Tag in Topology Note To deselect devices in your selection, click outside of the selected device. The Device Information dialog box appears. Step 3 Click Device Tagging. The Device Tagging dialog box appears. Step 4 From the Available Tags column, click a tag to apply it to the selected device or devices. If the tag you want does not exist, you can create it by entering the name of the tag in the Device Tag Title field and clicking +Create Tag. Step 5 When you are done, click x to close the dialog box. Adding or Removing a Policy Tag in Topology Before you can create a QoS policy, you need to identify the policy scope, that is, the devices that will be configured with QoS policies. You identify the devices by tagging them with a policy tag. You can also add or remove policy tags from the Device Inventory window or the EasyQoS window. For information, see Adding or Removing a Device Tag in Device Inventory, on page 62 or the Cisco EasyQoS Application for APIC-EM User Guide. Figure 36: Policy Tag Dialog Box Before you begin • Make sure that you have devices in your inventory. If not, discover devices using the Discovery function. From the Topology or Device Inventory window, verify that the device roles assigned to devices during discovery are appropriate for your network design. If necessary, change any of the device roles that are not appropriate. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 96 Using the Topology Map Displaying Devices with Tags Step 1 From the Navigation pane, click Topology. Step 2 Click the device or devices you want to tag. To select more than one device, click the Multiselect icon. For information about how to use the multiselect function, see Topology Icons, on page 82. Note To deselect devices in your selection, click outside of the selected device. The Device Information dialog box appears. Step 3 Click Policy Tagging. The Multiple Policy Tagging dialog box appears. Step 4 From the Available Policy Tags column, click a tag to apply it to the selected device or devices. If the tag you want does not exist, you can create it by entering the name of the tag in the Policy Tag Title field and clicking +Create Tag. Step 5 When you are done, click x to close the dialog box. Displaying Devices with Tags To display tagged devices from the Topology window, perform the following steps. Figure 37: Topology Window Showing Devices with Tags Before you begin You should have performed the following tasks: • Discovered the devices on your network to populate the device inventory database. • Created tags and applied them either through the Device Inventory or Topology window. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 97 Using the Topology Map Displaying Devices with Tags Step 1 From the Navigation pane, click Topology. The Topology window appears. Step 2 From the Topology toolbar, click the Tags. A tag selection box appears. Step 3 To identify the devices associated with a tag, click the tag. To return the devices to their normal display, click the tag again. Tags are color-coded, so when you click a tag, a circle of the same color is drawn around its associated devices. Note You can click more than one tag at a time. The tag that you chose to display first is the innermost circle around the device, followed by the next tag as the next circle, and so on. Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x 98 INDEX A F API 7 audience vii feedback 7 C change password 7 Cisco APIC-EM 3 overview 3 Cisco Network Plug and Play 7 CLI global credentials 18, 22 D device controllability 31 device inventory 7, 47 Average Update Frequency 47 Configuration 47 Device Family 47 Device Name 47 Device role 47 device status 47 Device Tag 47 IOS 47 IP Address 47 Last Updated Time 47 Location 47 MAC Address 47 Platform 47 Policy Tag 47 Serial number 47 Up Time 47 window 47 device role 60, 92 devices table 47, 58, 59 changing view 59 filtering 58 discovery 7, 33, 38 using CDP 33 using IP address range 38 discovery credentials caveats 21 discovery credentials example 19 discovery results 43 G GUI overview 7 H host inventory 7, 73 window 73 Hosts table 73 filters 73 I inventory 47, 73 device 47 host 73 IS-IS 78 topology 78 IWAN 7 L location marker 66 adding 66 location tag 64 logging into controller 6 N notifications 7 Notifications 7 system 7 O OSPF 78 P plug and play 7 Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x IN-1 INDEX polling interval 32 T R tag 62, 67 adding 62 deleting 67 removing 62 topology 7, 78, 82, 84, 86, 88, 92, 93, 97 aggregate 84 configuring structure 88 device role 92 disaggregate 84, 86 icons 82 L2 78 L3 78 searches 93 tags 97 toolbar 78 VRF 78 Topology 90 saving 90 related documentation viii S Settings 7 sign out 7 SNMP 23, 24, 26, 29 properties 29 SNMPv2c 24 SNMPv3 26 Static-Route 78 Cisco Network Visibility Application on APIC-EM User Guide, Release 1.6.0.x IN-2
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Related manuals
Download PDF
advertisement