Cisco DNA Center Installation Guide

Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 First Published: 2020-01-17 Last Modified: 2020-02-05 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental. All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current online version for the latest version. Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at www.cisco.com/go/offices. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: https://www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1721R) © 2020 Cisco Systems, Inc. All rights reserved. CONTENTS CHAPTER 1 Review the Cisco DNA Center Appliance Features 1 Appliance Hardware Specifications 1 Front and Rear Panels 2 Physical Specifications 8 Environmental Specifications 9 Power Specifications 10 CHAPTER 2 Plan the Deployment 11 Planning Workflow 11 Cisco DNA Center and Cisco Software-Defined Access 12 Interface Cable Connections 12 Required IP Addresses and Subnets 15 Interface Names and Wizard Configuration Order 18 Required Internet URLs and Fully Qualified Domain Names 19 Provide Secure Access to the Internet 21 Required Network Ports 21 Required Ports and Protocols for Cisco Software-Defined Access 23 Required Configuration Information 31 Required First-Time Setup Information 32 CHAPTER 3 Install the Appliance 35 Appliance Installation Workflow 35 Unpack and Inspect the Appliance 35 Review the Installation Warnings and Guidelines 36 Review the Rack Requirements 37 Connect and Power On the Appliance 37 Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 iii Contents Check the LEDs 37 CHAPTER 4 Prepare the Appliance for Configuration 41 Preparation for Appliance Configuration Overview 41 Enable Browser Access to Cisco Integrated Management Controller 41 Execute Preconfiguration Checks 46 Reimage the Appliance 53 Verify the Cisco DNA Center ISO Image 53 Create a Bootable USB Drive 54 Using Etcher 54 Using the Linux CLI 55 Using the Mac CLI 55 Install the Cisco DNA Center ISO Image 56 CHAPTER 5 Configure the Appliance 59 Appliance Configuration Overview 59 Configure the Primary Node 59 Configure Add-On Nodes 73 Upgrade to the Latest Cisco DNA Center Release 88 CHAPTER 6 Complete First-Time Setup 89 First-Time Setup Workflow 89 Compatible Browsers 89 Log In for the First Time 89 Integrate Cisco ISE with Cisco DNA Center 92 Group-Based Access Control: Policy Data Migration and Synchronization 95 Configure Authentication and Policy Servers 97 Configure SNMP Properties 99 CHAPTER 7 Troubleshoot the Deployment 101 Troubleshooting Tasks 101 Log Out 101 Reconfigure the Appliance Using the Configuration Wizard 102 Power-Cycle the Appliance 103 Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 iv Contents Using the Cisco IMC GUI 104 Using SSH 104 APPENDIX A Review High Availability Cluster Deployment Scenarios 107 New HA Deployment 107 Existing HA Deployment of the Primary Node with Standard Interface Configurations 108 Existing HA Deployment of Primary Node with Nonstandard Interface Configurations 108 Redistribute Services 109 Additional HA Deployment Considerations 109 Telemetry 109 Wireless Controller 110 Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 v Contents Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 vi CHAPTER 1 Review the Cisco DNA Center Appliance Features • Appliance Hardware Specifications, on page 1 • Front and Rear Panels, on page 2 • Physical Specifications, on page 8 • Environmental Specifications, on page 9 • Power Specifications, on page 10 Appliance Hardware Specifications Cisco supplies Cisco Digital Network Architecture (DNA) Center in the form of a rack-mountable, physical appliance. The first generation Cisco DNA Center appliance (Cisco part number DN1-HW-APL) consists of a Cisco Unified Computing System (UCS) C220 M4 small form factor (SFF) chassis, with the addition of a Virtual Interface Card (VIC) 1227 in the mLOM slot. The Cisco DNA Center software image is preinstalled on the appliance, but must be configured for use. The following table summarizes the appliance's hardware specifications. Feature Description Chassis One rack-unit (1RU) chassis Processors Two 22-core Intel Xeon E5-2699 v4 2.20 GHz processors Memory Eight 32-GB DDR4 2400 MHz registered DIMMs (RDIMMs) Storage • Six 1.9-TB, 2.5-inch Enterprise Value 6G SATA solid state drives (SSDs) • Two 480-GB, 2.5-inch Enterprise Value 12G SATA SSDs Disk Management (RAID) • RAID 1 on slots 1 through 4 • RAID 10 on slots 5 through 8 Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 1 Review the Cisco DNA Center Appliance Features Front and Rear Panels Feature Description Network and Management I/O Supported connectors: • Two 10-Gbps Ethernet ports on the Cisco UCS VIC 1227 • One 1-Gbps Ethernet dedicated management port • Two 1-Gbps BASE-T Ethernet LAN ports The following connectors are available but not typically used in the day-to-day operation of Cisco DNA Center: • One RS-232 serial port (RJ-45 connector) • One 15-pin VGA2 connector • Two USB 3.0 connectors • One front-panel KVM connector that is used with the KVM cable, which provides two USB 2.0, one VGA, and one serial (DB-9) connector Power • Two 770-W AC power supplies • Redundant as 1+1 Cooling Six hot-swappable fan modules for front-to-rear cooling Video Video Graphics Array (VGA) video resolution up to 1920 x 1200, 16 bpp at 60 Hz, and up to 256 MB of video memory Front and Rear Panels The following figures and tables describe the front and rear panels of the 44 core Cisco DNA Center appliance. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 2 Review the Cisco DNA Center Appliance Features Front and Rear Panels Figure 1: Appliance Front Panel Component Description 1 A total of eight drives are available on the appliance: • Six 1.9 TB SATA SSD • Two 480 GB SAS SSD Each installed drive bay has a fault LED and an activity LED. When the drive fault LED is: • Off: The drive is operating properly. • Amber: The drive has failed. • Amber, blinking: The drive is rebuilding. When the drive activity LED is: • Off: There is no drive in the sled (no access, no fault). • Green: The drive is ready. • Green, blinking: The drive is reading or writing data. 2 Pull-out asset tag 3 Operations sub-panel buttons and LEDs. LED states for these buttons and the conditions they indicate are described in the following entries. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 3 Review the Cisco DNA Center Appliance Features Front and Rear Panels Component Description 4 Power button/power status LED. When the LED is: • Off: There is no AC power to the appliance. • Amber: The appliance is in standby power mode. Power is supplied only to the Cisco Integrated Management Controller (CIMC) and some motherboard functions. • Green: The appliance is in main power mode. Power is supplied to all the server components. 5 Unit identification button and LED. When the LED is: • Blue: Unit identification is active. • Off: Unit identification is inactive. 6 System status LED. When the LED is: • Green: The appliance is running in a normal operating condition. • Green, blinking: The appliance is performing system initialization and memory checks. • Amber, steady: The appliance is in a degraded operational state, which may be due to one or more of the following causes: • Power supply redundancy is lost. • CPUs are mismatched. • At least one CPU is faulty. • At least one DIMM is faulty. • At least one drive in a RAID configuration failed. • Amber, blinking: The appliance is in a critical fault state, which may be due to one or more of the following: • Boot failed. • Fatal CPU and/or bus error was detected. • Server is in an over-temperature condition. 7 Fan status LED. When the LED is: • Green: All fan modules are operating properly. • Amber, steady: One fan module has failed. • Amber, blinking: Critical fault, two or more fan modules have failed. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 4 Review the Cisco DNA Center Appliance Features Front and Rear Panels Component Description 8 Temperature status LED. When the LED is: • Green: The appliance is operating at normal temperature. • Amber, steady: One or more temperature sensors have exceeded a warning threshold. • Amber, blinking: One or more temperature sensors have exceeded a critical threshold. 9 Power supply status LED. When the LED is: • Green: All power supplies are operating normally. • Amber, steady: One or more power supplies are in a degraded operational state. • Amber, blinking: One or more power supplies are in a critical fault state. 10 Network link activity LED. When the LED is: • Green, blinking: One or more Ethernet LOM ports are link-active, with activity. • Green: One or more Ethernet LOM ports are link-active, but there is no activity. • Off: The Ethernet link is idle. 11 KVM connector. Used with a KVM cable that provides two USB 2.0, one VGA, and one serial connector. Figure 2: Appliance Rear Panel Component Description 1 Grounding-lug hole (for DC power supplies) 2 PCIe riser 1/slot 1 3 PCIe riser 2/slot 2 Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 5 Review the Cisco DNA Center Appliance Features Front and Rear Panels Component Description 4 Power supplies (up to two: redundant as 1+1). Each power supply has a power supply fault LED and an AC power LED. When the fault LED is: • Off: The power supply is operating normally. • Amber, blinking: An event warning threshold has been reached, but the power supply continues to operate. • Amber, solid: A critical fault threshold has been reached, causing the power supply to shut down (for example, a fan failure or an over-temperature condition). When the AC Power LED is: • Green, solid: AC power is OK, DC output is OK. • Green, blinking: AC power is OK, DC output is not enabled. • Off: There is no AC power to the power supply. For more details, see Power Specifications. 5 10-Gbps Cluster Port (Port 2, enp10s0, Network Adapter 1): This is the second 10-Gbps port on the Cisco Virtual Interface Card (VIC) 1227 in the appliance mLOM slot. The rear panel labels it Port 2 and the Maglev Configuration wizard identifies it as enp10s0 and Network Adapter 1. Connect this port to a switch with connections to the other nodes in the Cisco DNA Center cluster. This port has a link status (ACT) LED and a link speed (LINK) LED. When the link status LED is: • Green, blinking: Traffic is present on the active link. • Green: Link is active, but there is no traffic present. • Off: No link is present. When the link speed LED is: • Green: Link speed is 10 Gbps. • Amber: Link speed is 1 Gbps. • Off: Link speed is 100 Mbps or less. Note The enterprise and cluster ports must operate at 10 Gbps only. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 6 Review the Cisco DNA Center Appliance Features Front and Rear Panels Component Description 6 10-Gbps Enterprise Port (Port 1, enp9s0, Network Adapter 4): This is the first 10-Gbps port on the Cisco Virtual Interface Card (VIC) 1227 in the appliance mLOM slot. The rear panel labels it Port 1 and the Maglev Configuration wizard identifies it as enp9s0 and Network Adapter 4. Connect this port to a switch with IP reachability to the networking equipment that Cisco DNA Center will manage. This port has a link status (ACT) LED and a link speed (LINK) LED. When the link status LED is: • Green, blinking: Traffic is present on the active link. • Green: Link is active, but there is no traffic present. • Off: No link is present. When the speed LED is: • Green: Link speed is 10 Gbps. • Amber: Link speed is 1 Gbps. • Off: Link speed is 100 Mbps or less. Note The Cisco DNA Center appliance enterprise and cluster ports must operate at 10 Gbps only. 7 Two USB 3.0 ports 8 1-Gbps CIMC Port (M): This is the embedded port to the right of the two USB ports and to the left of the RJ45 serial port. The back panel labels it M and you assign an IP address to it when you enable browser access to the appliance's CIMC GUI (see Enable Browser Access to Cisco Integrated Management Controller). This port is reserved for out-of-band (OOB) management of the Cisco DNA Center appliance chassis and software. Connect this port to a switch that provides access to your dedicated OOB enterprise management network. This port has a link status LED and a link speed LED. When the link status LED is: • Green, blinking: Traffic is present on the active link. • Green: Link is active, but there is no traffic present. • Off: No link is present. When the speed LED is: • Green: Link speed is 1 Gbps. • Amber: Link speed is 100 Mbps. • Off: Link speed is 10 Mbps or less. 9 Serial port (RJ-45 connector) Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 7 Review the Cisco DNA Center Appliance Features Physical Specifications Component Description 10 1-Gbps Cisco DNA Center GUI Port (1, enp1s0f0, Network Adapter 2): This is the first Intel i350 1Gb Ethernet controller port. It is embedded on the appliance motherboard. The rear panel labels it 1 and the Maglev Configuration wizard identifies it as enp1s0f0 and Network Adapter 2. Connect this port to a switch that provides access to your dedicated enterprise management network. This port has a link status LED and a link speed LED. When the status LED is: • Green, blinking: Traffic is present on the active link. • Green: Link is active, but there is no traffic present. • Off: No link is present. When the speed LED is: • Green: Link speed is 1 Gbps. • Amber: Link speed is 100 Mbps. • Off: Link speed is 10 Mbps or less. 11 1-Gbps Cloud Port (2, enp1s0f1, Network Adapter 3): This is the second embedded 1Gbps Ethernet controller port. The rear panel labels it 2 and the Maglev Configuration wizard identifies it as enp1s0f1 and Network Adapter 3. This port is optional. It is used for connecting to the Internet when it is not possible to do so via the 10-Gbps enterprise port (Port 1, enp9s0, Network Adapter 4). This port has a link status LED and a link speed LED. When the link status LED is: • Green, blinking: Traffic is present on the active link. • Green: Link is active, but there is no traffic. • Off: No link is present. When the speed LED is: • Green: Link speed is 1 Gbps. • Amber: Link speed is 100 Mbps. • Off: Link speed is 10 Mbps or less. 12 VGA video port (DB-15). This panel area around this port is blue. 13 Blue LED locator button Physical Specifications The following table lists the physical specifications for the appliance. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 8 Review the Cisco DNA Center Appliance Features Environmental Specifications Table 1: Physical Specifications Description Specification Height 1.7 in. (4.32 cm) Width 16.89 in. (43.0 cm) Including handles: 18.98 in. (48.2 cm) Depth (length) 29.8 in. (75.6 cm) Including handles: 30.98 in. (78.7 cm) Front Clearance 3 in. (76 mm) Side Clearance 1 in. (25 mm) Rear Clearance 6 in. (152 mm) Maximum weight (fully loaded chassis) 37.9 lb. (17.2 kg) Environmental Specifications The following table lists the environmental specifications for the Cisco DNA Center appliance. Table 2: Environmental Specifications Description Specification Temperature, operating 41 to 95°F (5 to 35°C) Derate the maximum temperature by 1°C for every 1000 ft. (305 meters) of altitude above sea level. Temperature, nonoperating (when the appliance is stored or transported) –40 to 149°F (–40 to 65°C) Humidity (RH), operating 10 to 90%, noncondensing at 82°F (28°C) Humidity, nonoperating 5 to 93% at 82°F (28°C) Altitude, operating 0 to 10,000 ft. (0 to 3,000 m) Altitude, nonoperating (when the appliance is stored 0 to 40,000 ft. (0 to 12,192 m) or transported) Sound power level, measure A-weighted per ISO7779 5.4 LwAd (Bels), operation at 73°F (23°C) Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 9 Review the Cisco DNA Center Appliance Features Power Specifications Description Specification Sound pressure level, measure A-weighted per ISO7779 LpAm (dBA), Operation at 73°F (23°C) 37 Power Specifications The specifications for the two 770 W AC power supplies (Cisco part number UCSC-PSU1-770W) provided with the Cisco DNA Center appliance are listed in the table below. Table 3: AC Power Supply Specifications Description Specification AC input voltage Nominal range: 100–120 VAC, 200–240 VAC Range: 90–132 VAC, 180–264 VAC AC input frequency Nominal range: 50 to 60 Hz (Range: 47–63 Hz) Maximum AC input current 9.5 A at 100 VAC 4.5 A at 208 VAC Note Maximum input volt-amperes 950 VA at 100 VAC Maximum output power per PSU 770 W at 100–120 VAC Maximum inrush current 15 A at 35° C Maximum hold-up time 12 ms at 770 W Power supply output voltage 12 VDC Power supply standby voltage 12 VDC Efficiency rating Climate Savers Platinum Efficiency (80Plus Platinum certified) Form factor RSP2 Input connector IEC320 C14 You can get more specific power information for the exact configuration of your appliance by using the Cisco UCS Power Calculator: http://ucspowercalc.cisco.com Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 10 CHAPTER 2 Plan the Deployment • Planning Workflow, on page 11 • Cisco DNA Center and Cisco Software-Defined Access, on page 12 • Interface Cable Connections, on page 12 • Required IP Addresses and Subnets, on page 15 • Required Internet URLs and Fully Qualified Domain Names, on page 19 • Provide Secure Access to the Internet, on page 21 • Required Network Ports, on page 21 • Required Ports and Protocols for Cisco Software-Defined Access, on page 23 • Required Configuration Information, on page 31 • Required First-Time Setup Information, on page 32 Planning Workflow You must perform the following planning and information-gathering tasks before attempting to install, configure, and set up your Cisco DNA Center appliance. After you complete these tasks, you can continue by physically installing your appliance in the data center. 1. Review the recommended cabling and switching requirements for standalone and cluster installations. For more information, see Interface Cable Connections. 2. Gather the IP addressing, subnetting, and other IP traffic information that you will apply during appliance configuration. For more information, see Required IP Addresses and Subnets. 3. Prepare a solution for the required access to web-based resources. For more information, see Required Internet URLs and Fully Qualified Domain Names and Provide Secure Access to the Internet. 4. Reconfigure your firewalls and security policies for Cisco DNA Center traffic. For more information, see Required Network Ports. If you are using Cisco DNA Center to manage a Cisco Software-Defined Access (SD-Access) network, also see Required Ports and Protocols for Cisco Software-Defined Access. 5. Gather the additional information used during appliance configuration and first-time setup. For more information, see Required Configuration Information and Required First-Time Setup Information. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 11 Plan the Deployment Cisco DNA Center and Cisco Software-Defined Access Cisco DNA Center and Cisco Software-Defined Access You can use Cisco DNA Center to manage any type of network, including networks that employ the Cisco SD-Access fabric architecture. Cisco SD-Access transforms conventional networks into intent-based networks, where business logic becomes a physical part of the network, making it easy to automate day-to-day tasks such as configuration, provisioning, and troubleshooting. The Cisco SD-Access solution reduces the time taken to adapt the network to business needs, improves issue resolutions, and reduces security-breach impacts. A complete discussion of the Cisco SD-Access solution is outside the scope of this guide. Network architects and administrators planning to implement a Cisco SD-Access fabric architecture for use with Cisco DNA Center can find additional information and guidance from the following resources: • For more information on how Cisco DNA Center leverages Cisco SD-Access to automate solutions that are not possible with normal networking approaches and techniques, see Software Defined Access: Enabling Intent-Based Networking. • For guidance in using Cisco SD-Access access segmentation to enhance network security, see the Software-Defined Access Segmentation Design Guide. • For guidance on deploying SDA with Cisco DNA Center, see the Software-Defined Access Deployment Guide. • For more information on the digital network architecture that is the foundation of Cisco DNA Center and the Cisco SD-Access solution, and the roles that other Cisco and third-party products and solutions play in this innovative architecture, see the Cisco DNA Design Zone. Interface Cable Connections Connect the ports on the appliance to switches providing the following types of network access. At a minimum, you must configure the Enterprise and Cluster port interfaces, as they are required for Cisco DNA Center functionality. • (Required) 10-Gbps Cluster Port (Port 2, enp10so, Network Adapter 1): This is the left-hand port on the VIC 1227 card in the appliance mLOM slot. Its purpose is to enable communications among the primary and add-on nodes in a Cisco DNA Center cluster. Connect this port to a switch with connections to the other nodes in the cluster and configure one IP address with subnet mask for the port. During configuration, the Maglev Configuration wizard does not let you proceed until you assign the Cluster Link option to an interface. We recommend that you designate port enp10so as the cluster link. Be aware, however, that the interface marked as the cluster link cannot be changed after configuration completes. Later, if you must change the interface marked as the cluster link, you are required to reimage the appliance. With this in mind, we recommend that you set up the cluster port with an IP address, so as to allow for expansion to a three-node cluster in the future. Also, make sure that the cluster link interface is connected to a switch port and is in the UP state. Note For a description of the tasks you need to complete in order to reimage your Cisco DNA Center appliance, see Reimage the Appliance. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 12 Plan the Deployment Interface Cable Connections • (Optional) 1-Gbps Cisco DNA Center GUI Port (1, enp1s0f0, Network Adapter 2): This port provides access to the Cisco DNA Center GUI. Its purpose is to enable users to use the software on the appliance. Connect this port to a switch with connections to your enterprise management network, and configure one IP address with a subnet mask for the port. • (Optional) 1-Gbps Cloud Port (2, enp1s0f1, Network Adapter 3): This port is optional. Use it only if you cannot connect the appliance to the Internet (including to your Internet proxy server) using the 10-Gbps enterprise port (Port 1, enp9s0, Network Adapter 4). If you need to use the cloud port, connect it to a switch with connections to your Internet proxy server and configure an IP address with a subnet mask for the port. • (Required) 10-Gbps Enterprise Port (Port 1, enp9s0, Network Adapter 4): This is the right-hand port on the VIC 1227 card in the appliance mLOM slot. Its purpose is to enable Cisco DNA Center to communicate with and manage your network. Connect this port to a switch with connections to the enterprise network and configure one IP address with subnet mask for the port. • (Optional, but strongly recommended) 1-Gbps CIMC Port (M): This port provides browser access to the Cisco Integrated Management Controller (CIMC) out-of-band appliance management interface and its GUI. Its purpose is to allow you to manage the appliance and its hardware. Connect this port to a switch with connections to your enterprise management network and configure an IP address with subnet mask for the port. The following figure shows the recommended connections for a single-node Cisco DNA Center cluster: Figure 3: Recommended Cabling for Single-Node Cluster The following figure shows the recommended connections for a three-node Cisco DNA Center cluster. All but one of the connections for each node in the three-node cluster are the same as those for the single-node cluster, and use the same ports. The exception is the Cluster Port (Port 2, enp10so, Network Adapter 1), which is required so that each host in the three-node cluster can communicate with the other hosts. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 13 Plan the Deployment Interface Cable Connections Figure 4: Recommended Cabling for Three-Node Cluster For a short video presentation about the rear-panel ports and how they are used, see the first five minutes of Unboxing Cisco DNA Center Appliance for Assurance and SD-Access (under the section "Get Started"). For more details on each of the ports, see the rear panel diagram and accompanying descriptions for your appliance in Front and Rear Panels. Note Multinode cluster deployments require all the member nodes to be in the same network and at the same site. The appliance does not support distribution of nodes across multiple networks or sites. When cabling the 10-Gbps enterprise and cluster ports, please note that both ports support only the following media types: • SFP-10G-SR (Short range, MMF) • SFP-10G-LR (Long range, SMF) • SFP-H10GB-CU1M (Twinax cable, passive, 1 Meter) • SFP-H10GB-CU3M (Twinax cable, passive, 3 Meters) • SFP-H10GB-CU5M (Twinax cable, passive, 5 Meters) • SFP-H10GB-ACU7M (Twinax cable, active, 7 Meters) Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 14 Plan the Deployment Required IP Addresses and Subnets Required IP Addresses and Subnets Before beginning the installation, you must ensure that your network has sufficient IP addresses available to assign to each of the appliance ports that you plan on using. Depending on whether you are installing the appliance as a single-node cluster or as a primary or add-on node in a three-node cluster, you will need the following appliance port (NIC) addresses: • Enterprise Port Address (Required): One IP address with subnet mask. • Cluster Port Address (Required): One IP address with subnet mask. • Management Port Address (Optional): One IP address with subnet mask. • Cloud Port Address (Optional): One IP address with subnet mask. This is an optional port, used only when you cannot connect to the cloud using the Enterprise port. You do not need an IP address for the Cloud port unless you must use it for this purpose. • CIMC Port Address (Optional, but strongly recommended): One IP address with subnet mask. Note All of the IP addresses called for in these requirements must be valid IPv4 addresses with valid IPv4 netmasks. Ensure that the addresses and their corresponding subnets do not overlap. Service communication issues can result if they do. You will also need the following additional IP addresses and dedicated IP subnets, which are prompted for and applied during configuration of the appliance: 1. Cluster Virtual IP Addresses: One virtual IP (VIP) address per configured network interface per cluster. This requirement applies to three-node clusters and single-node clusters that are likely to be converted into a three-node cluster in the future. You must supply a VIP for each network interface you configure. Each VIP should be from the same subnet as the IP address of the corresponding configured interface. There are four interfaces on each appliance: Enterprise, Cluster, Management, and Cloud. At a minimum, you must configure the Enterprise and Cluster port interfaces, as they are required for Cisco DNA Center functionality. An interface is considered configured if you supply an IP for that interface, along with a subnet mask and one or more associated gateways or static routes. If you skip an interface entirely during configuration, that interface is considered as not configured. Note the following: • If you have a single-node setup and do not plan to convert it into a three-node cluster in the future, you are not required to specify a virtual IP address. However, if you decide to do so, you must specify a virtual IP address for every configured network interface (just as you would for a three-node cluster). • If the intracluster link for a single-node cluster goes down, the VIP addresses associated with the Management and Enterprise interfaces also go down. When this happens, Cisco DNA Center is unusable until the intracluster link is restored (because the Software Image Management [SWIM] and Cisco Identity Services Engine [ISE] integration is not operational and Cisco DNA Assurance data is not displayed because information cannot be gathered from Network Data Platform [NDP] collectors). • You cannot use a link-local IP address for a host interface. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 15 Plan the Deployment Required IP Addresses and Subnets 2. Default Gateway IP Address: The IP address for your network's preferred default gateway. If no other routes match the traffic, traffic will be routed through this IP address. Typically, you should assign the default gateway to the interface in your network configuration that accesses the internet. For information on security considerations to keep in mind when deploying Cisco DNA Center, see the Cisco Digital Network Architecture Center Security Best Practices Guide. 3. DNS Server IP Addresses: The IP address for one or more of your network's preferred DNS servers. During configuration, you can specify multiple DNS server IP addresses and netmasks by entering them as a space-separated list. 4. (Optional) Static Route Addresses: The IP addresses, subnet masks, and gateways for one or more static routes. During configuration, you can specify multiple static-route IP addresses, netmasks, and gateways by entering them as a space-separated list. You can set one or more static routes for any interface on the appliance. You should supply static routes when you want to route traffic in a specific direction other than the default gateway. Each of the interfaces with static routes will be set as the device the traffic will be routed through in the IP route command table. For this reason, it is important to match the static route directions with the interface though which the traffic will be sent. Static routes are not recommended in network device routing tables such as those used by switches and routers. Dynamic routing protocols are better for this. However, you should add them where needed to allow the appliance access to particular parts of the network that can be reached no other way. 5. NTP Server IP Addresses: The DNS-resolvable hostname, or IP address, for at least one Network Time Protocol (NTP) server. During configuration, you can specify multiple NTP server IPs/masks or hostnames by entering them as a space-separated list. For a production deployment, we recommend that you configure a minimum of three NTP servers. You will specify these servers during pre-flight hardware synchronization and again during configuration of the software on each appliance in the cluster. Time synchronization is critical to the accuracy of data and coordination of processing across a multi-host cluster. Before deploying the appliance in production, make sure that the time on the appliance system clock is current and that the Network Time Protocol (NTP) servers you specified are keeping accurate time. If you are planning to integrate the appliance with Cisco Identity Services Engine (ISE), you should also ensure that ISE is synchronizing with the same NTP servers as the appliance. 6. Services Subnet: Identifies one dedicated IP subnet for the appliance to use in managing and getting IPs for communications among its internal application services, such as Assurance, inventory collection, and so on. The dedicated IPv4 Services Subnet must not conflict with or overlap any other subnet used by Cisco DNA Center's internal network or any external network. The minimum size of the subnet is 21 bits. The IPv4 Services subnet must conform with the IETF RFC 1918 and RFC 6598 specifications for private networks, which support the following address ranges: • 10.0.0.0/8 • 172.16.0.0/12 • 192.168.0.0/16 • 100.64.0.0/10 For details, see RFC 1918, Address Allocation for Private Internets, and RFC 6598, IANA-Reserved IPv4 Prefix for Shared Address Space. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 16 Plan the Deployment Required IP Addresses and Subnets Important • Ensure that you specify a valid CIDR subnet. Otherwise, incorrect bits will be present in the 172.17.1.0/20 and 172.17.61.0/20 subnets. • After configuration of your Cisco DNA Center appliance is completed, you cannot assign a different subnet without first reimaging the appliance (see the "Reimage the Appliance" topic in the "Configure the Appliance" chapter for more information). 7. Cluster Services Subnet: Identifies one dedicated IP subnet for the appliance to use in managing and getting IPs for communications among its infrastructure services, such as database access, the message bus, and so on. The dedicated IPv4 Cluster Services subnet must not conflict with or overlap any other subnet used by Cisco DNA Center's internal network or any external network. The minimum size of the subnet is 21 bits. The IPv4 Cluster Services subnet must conform with the IETF RFC 1918 and RFC 6598 specifications for private networks, which support the following address ranges: • 10.0.0.0/8 • 172.16.0.0/12 • 192.168.0.0/16 • 100.64.0.0/10 For details, see RFC 1918, Address Allocation for Private Internets, and RFC 6598, IANA-Reserved IPv4 Prefix for Shared Address Space. If you were to specify 10.10.10.0/21 as your Services subnet, you could also specify a Cluster Services subnet of 10.0.8.0/21 since these two subnets do not overlap. Also note that the configuration wizard detects overlaps (if any) between these subnets and prompts you to correct the overlap. Important • Ensure that you specify a valid CIDR subnet. Otherwise, incorrect bits will be present in the 172.17.1.0/20 and 172.17.61.0/20 subnets. • After configuration of your Cisco DNA Center appliance is completed, you cannot assign a different subnet without first reimaging the appliance (see the "Reimage the Appliance" topic in the "Configure the Appliance" chapter for more information). The recommended total IP address space for the two Services and Cluster Services subnets contains 4,096 addresses, broken down into two /21 subnets of 2,048 addresses each. The two /21 subnets must not overlap. Cisco DNA Center's internal services require a dedicated set of IP addresses to operate (a requirement of the Cisco DNA Center microservice architecture. To accommodate this requirement, you must allocate two dedicated subnets per Cisco DNA Center system. One reason the appliance requires this amount of address space is to maintain system performance. Because it uses internal routing and tunneling technologies for east-west (inter-node) communications, using overlapping address spaces would force the appliance to run Virtual Routing and Forwarding FIBs internally. This would lead to multiple encaps/decaps for packets going from one service to another, causing high internal latency at a very low level, with cascading impacts at higher layers. Another reason is the Cisco DNA Center Kubernetes-based service containerization architecture. Each appliance uses the IP addresses in this space per Kubernetes K8 node. Multiple nodes can make up a single service. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 17 Plan the Deployment Interface Names and Wizard Configuration Order Currently, Cisco DNA Center supports more than 100 services, each requiring several IP addresses, and new features and corresponding services are added all the time. The address space requirement is purposely kept large at the start to ensure that Cisco can add new services and features without either running out of IPs or requiring customers to reallocate contiguous address spaces simply to upgrade their systems. The services supported over these subnets are also enabled at Layer 3. The Cluster Services space, in particular, carries data between application and infrastructure services, and is heavily used. The RFC 1918 and RFC 6598 requirement is because of the requirement by Cisco DNA Center to download packages and updates from the cloud. If the selected IP ranges do not conform with RFC 1918 and RFC 6598, this can quickly lead to problems with public IP overlaps. Interface Names and Wizard Configuration Order Interface names and the order in which these interfaces are configured in the Maglev Configuration wizard differ between the first and second generation Cisco DNA Center appliance, as illustrated in the following table. Refer to these Cisco part numbers to determine whether you have a first or second generation appliance: • First generation 44 core appliance: DN1-HW-APL • Second generation: • 44 core appliance: DN2-HW-APL • 44 core upgrade appliance: DN2-HW-APL-U • 56 core appliance: DN2-HW-APL-L • 56 core upgrade appliance: DN2-HW-APL-L-U • 112 core appliance: DN2-HW-APL-XL • 112 core upgrade appliance: DN2-HW-APL-XL-U Table 4: Interface Names and Wizard Configuration Order Function Cisco DNA Center Appliance Type Cluster: Links the First generation appliance to your cluster Second generation nodes. Interface Name Configuration Order in the Maglev Configuration Wizard enp10s0 Network Adapter #1 • 44 and 56 core Network Adapter #4 appliance: enp94s0f1 • 112 core appliance: enp69s0f1 Management: Allows you to access the Cisco DNA Center GUI from your management network. First generation Second generation enp1s0f0 • 44 and 56 core appliance: eno1 • 112 core appliance: enp53s0f0 Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 18 Network Adapter #2 Network Adapter #1 Plan the Deployment Required Internet URLs and Fully Qualified Domain Names Function Cisco DNA Center Appliance Type Cloud: Provides internet First generation access when another interface is not available Second generation for this purpose. Interface Name Configuration Order in the Maglev Configuration Wizard enp1s0f1 Network Adapter #3 • 44 and 56 core appliance: eno2 Network Adapter #2 • 112 core appliance: enp53s0f1 Enterprise: Links the appliance to your enterprise network. First generation Second generation enp9s0 Network Adapter #4 • 44 and 56 core Network Adapter #3 appliance: enp94s0f0 • 112 core appliance: enp69s0f0 Required Internet URLs and Fully Qualified Domain Names The appliance requires secure access to the following table of URLs and Fully Qualified Domain Names (FQDNs). The table describes the features that make use of each URL and FQDN. You must configure either your network firewall or a proxy server so that IP traffic can travel to and from the appliance and these resources. If you cannot provide this access for any listed URL and FQDN, the associated features will be impaired or inoperable. For more on requirements for proxy access to the internet, see Provide Secure Access to the Internet. Table 5: Required URLs and FQDN Access In order to... ...Cisco DNA Center must access these URLs and FQDNs Download updates to the system and application Recommended: *.ciscoconnectdna.com:4431 package software, submit user feedback to the Customers who want to avoid wildcards can specify these product team. URLs instead: • https://www.ciscoconnectdna.com • https://cdn.ciscoconnectdna.com • https://registry.ciscoconnectdna.com • https://registry-cdn.ciscoconnectdna.com Cisco DNA Center update package https://*.ciscoconnectdna.com/* Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 19 Plan the Deployment Required Internet URLs and Fully Qualified Domain Names In order to... ...Cisco DNA Center must access these URLs and FQDNs Smart Account and SWIM software downloads https://apx.cisco.com https://cloudsso.cisco.com/as/token.oauth2 https://*.cisco.com/* Authenticate with the cloud domain. https://dnaservices.cisco.com User feedback https://dnacenter.uservoice.com Integrate with Cisco Meraki. Recommended: *.meraki.com:443 Customers who want to avoid wildcards can specify these URLs instead: • dashboard.meraki.com:443 • api.meraki.com:443 • n63.meraki.com:443 Integrate with Cisco.com and Cisco Smart Licensing. *.cisco.com:443 Customers who want to avoid wildcards can specify these URLs instead: • software.cisco.com • cloudsso.cisco.com • cloudsso1.cisco.com • cloudsso2.cisco.com • apiconsole.cisco.com • api.cisco.com • apx.cisco.com • sso.cisco.com • apmx-prod1-vip.cisco.com • apmx-prod2-vip.cisco.com • tools.cisco.com Render accurate information in site and location maps. • www.mapbox.com • *.tiles.mapbox.com/* :443. For a proxy, the destination is *.tiles.mapbox.com/* Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 20 Plan the Deployment Provide Secure Access to the Internet In order to... ...Cisco DNA Center must access these URLs and FQDNs For Cisco AI Network Analytics data collection, configure your network or HTTP proxy to allow outbound HTTPS (TCP 443) access to the cloud hosts. 1 • https://api.use1.prd.kairos.ciscolabs.com (US East Region) • https://api.euc1.prd.kairos.ciscolabs.com (EU Central Region) Cisco owns and maintains ciscoconnectdna.com and its subdomains. The Cisco Connect DNA infrastructure meets Cisco Security and Trust guidelines and undergoes continuous security testing. This infrastructure is robust, with built-in load balancing and automation capabilities, and is monitored and maintained by a cloud operations team to ensure 24x7x365 availability. Provide Secure Access to the Internet By default, the appliance is configured to access the internet in order to download software updates, licenses, and device software, as well as provide up-to-date map information, user feedback, and so on. Providing internet connections for these purposes is a mandatory requirement. Using an HTTPS proxy server is a reliable way to access remote URLs securely. We recommend that you use an HTTPS proxy server to provide the appliance with the access it needs to the URLs listed in Required Internet URLs and Fully Qualified Domain Names. During appliance installation, you are prompted to enter the URL and port number of the proxy server you want to use for this purpose, along with the proxy's login credentials (if the proxy requires them). As of this release, the appliance supports communication with proxy servers over HTTP only. You can place the HTTPS proxy server anywhere within your network. The proxy server communicates with the internet using HTTPS, while the appliance communicates with the proxy server via HTTP. Therefore, we recommend that you specify the proxy's HTTP port when configuring the proxy during appliance configuration. If you need to change the proxy setting after configuration, you can do so using the GUI. Required Network Ports The following tables list the well-known network service ports that the appliance uses. You must ensure that these ports are open for traffic flows to and from the appliance, whether you open them using firewall settings or a proxy gateway. Additional ports, protocols, and types of traffic must be accommodated if you are deploying the appliance in a network that employs SDA infrastructure. For details, see Required Ports and Protocols for Cisco Software-Defined Access. Note For information on security considerations when deploying Cisco DNA Center, see the Cisco Digital Network Architecture Center Security Best Practices Guide. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 21 Plan the Deployment Required Network Ports Table 6: Ports: Incoming Traffic Port Number Permitted Traffic Protocol (TCP or UDP) 22 SSH TCP 67 BOOTP UDP 80 HTTP TCP 111 NFS (used for Assurance backups) TCP and UDP 123 NTP UDP 162 SNMP UDP 443 HTTPS TCP 2049 NFS (used for Assurance backups) TCP and UDP 2222 SSH TCP 9991 Multicast Domain Name System (mDNS) TCP 20048 NFS (used for Assurance backups) TCP and UDP 32767 NFS (used for Assurance backups) TCP and UDP Table 7: Ports: Outgoing Traffic Port Number Permitted Traffic Protocol (TCP or UDP) 22 SSH (to network devices and Cisco ISE) TCP 23 Telnet (to network devices) TCP 53 DNS UDP 80 Port 80 can be used for an outgoing proxy configuration. TCP Other common ports (such as 8080) can also be used when a proxy is configured using the Configuration wizard (if a proxy is already in use for your network). To access Cisco-supported certificates and trust pools, configure your network to allow outgoing IP traffic from the appliance to the Cisco addresses listed at: https://www.cisco.com/security/pki/ 123 NTP UDP 161 SNMP agent UDP 443 HTTPS TCP Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 22 Plan the Deployment Required Ports and Protocols for Cisco Software-Defined Access Note Port Number Permitted Traffic Protocol (TCP or UDP) 5222, 8910 Cisco ISE XMP for PxGrid TCP 9060 Cisco ISE ERS API traffic TCP Additionally, you can configure your network to allow outgoing IP traffic from the appliance to the Cisco addresses at: https://www.cisco.com/security/pki/. The appliance uses the IP addresses listed at the above URL to access Cisco-supported certificates and trust pools. Required Ports and Protocols for Cisco Software-Defined Access This topic details the ports, protocols, and types of traffic native to a typical Cisco SD-Access fabric deployment that is similar to the one shown in the following figure. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 23 Plan the Deployment Required Ports and Protocols for Cisco Software-Defined Access Figure 5: Cisco SD-Access Fabric Infrastructure If you have implemented Cisco SD-Access in your network, use the information in the following tables to plan firewall and security policies that secure your Cisco SD-Access infrastructure properly while providing Cisco DNA Center with the access it requires to automate your network management. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 24 Plan the Deployment Required Ports and Protocols for Cisco Software-Defined Access Table 8: Cisco DNA Center Traffic Source Port2 Source Destination Port Destination Description Any Cisco DNA Center UDP 53 DNS Server From Cisco DNA Center to DNS server Any Cisco DNA Center TCP 22 Fabric underlay From Cisco DNA Center to fabric switches' loopbacks for SSH Any Cisco DNA Center TCP 23 Fabric underlay From Cisco DNA Center to fabric switches' loopbacks for TELNET Any Cisco DNA Center UDP 161 Fabric underlay From Cisco DNA Center to fabric switches' loopbacks for SNMP device discovery ICMP Cisco DNA Center ICMP Fabric underlay From Cisco DNA Center to fabric switches' loopbacks for SNMP device discovery Any Cisco DNA Center TCP 443 Fabric underlay From Cisco DNA Center to fabric switches for software upgrades (also to the internet if there is no proxy) Any Cisco DNA Center UDP 6007 Switches and routers From Cisco DNA Center to switches and routers for NetFlow Any Cisco DNA Center TCP 80 Fabric underlay From Cisco DNA Center to fabric switches for Plug and Play (PnP) (also to the internet if there is no proxy) Any Cisco DNA Center TCP 830 Fabric underlay From Cisco DNA Center to fabric switches for Netconf (Cisco SD-Access embedded wireless) UDP 123 Cisco DNA Center UDP 123 Fabric underlay From Cisco DNA Center to fabric switches for the initial period during LAN automation Any Cisco DNA Center UDP 123 NTP Server From Cisco DNA Center to NTP server Any Cisco DNA Center TCP 22, UDP Cisco Wireless 161 Controller From Cisco DNA Center to Cisco Wireless Controller ICMP Cisco DNA Center ICMP Cisco Wireless Controller From Cisco DNA Center to Cisco Wireless Controller Any Cisco DNA Center TCP 80, TCP 443 AP From Cisco DNA Center to an AP as a sensor and active sensor (Cisco Aironet 1800S) Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 25 Plan the Deployment Required Ports and Protocols for Cisco Software-Defined Access Any 2 AP TCP 32626 Cisco DNA Center Used for receiving traffic statistics and packet capture data used by the Cisco DNA Assurance Intelligent Capture (gRPC) feature. Cluster, PKI, SFTP server, and proxy port traffic are not included in this table. Table 9: Internet Connectivity Traffic Source Port Source Destination Destination Port Any Cisco DNA Center TCP 443 registry.ciscoconnectdna.com Download Cisco DNA Center package updates Any Cisco DNA Center TCP 443 www.ciscoconnectdna.com Download Cisco DNA Center package updates Any Cisco DNA Center TCP 443 registry-cdn.ciscoconnectdna.com Download Cisco DNA Center package updates Any Cisco DNA Center TCP 443 cdn.ciscoconnectdna.com Download Cisco DNA Center package updates Any Cisco DNA Center TCP 443 software.cisco.com Download device software Any Cisco DNA Center TCP 443 cloudsso.cisco.com Validate Cisco.com and Smart Account credentials Any Cisco DNA Center TCP 443 cloudsso1.cisco.com Validate Cisco.com and Smart Account credentials Any Cisco DNA Center TCP 443 cloudsso2.cisco.com Validate Cisco.com and Smart Account credentials Any Cisco DNA Center TCP 443 apiconsole.cisco.com CSSM Smart Licensing API Any Cisco DNA Center TCP 443 sso.cisco.com CCO and Smart Licensing Any Cisco DNA Center TCP 443 api.cisco.com CCO and Smart Licensing Any Cisco DNA Center TCP 443 apx.cisco.com CCO and Smart Licensing Any Cisco DNA Center TCP 443 dashboard.meraki.com Meraki integration Any Cisco DNA Center TCP 443 api.meraki.com Meraki integration Any Cisco DNA Center TCP 443 n63.meraki.com Meraki integration Any Cisco DNA Center TCP 443 dnacenter.uservoice.com User feedback submission Any Cisco DNA Center TCP 443 Admin Client *.tiles.mapbox.com Render maps in the browser (for access through proxy; the destination is *.tiles.mapbox.com/*) Any Cisco DNA Center TCP 443 www.mapbox.com Maps and Cisco Wireless Controller country code identification Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 26 Description Plan the Deployment Required Ports and Protocols for Cisco Software-Defined Access Table 10: Cisco Software-Defined Access Fabric Underlay Traffic Source Port3 Source Destination Port Destination Description UDP 68 Fabric underlay UDP 67 DHCP server From fabric switches and routers to the DHCP server for DHCP Relay packets initiated by the fabric edge nodes. Any Fabric underlay TCP 80 Cisco DNA Center From fabric switch and router loopback IPs to Cisco DNA Center for PnP Any Fabric underlay TCP 443 Cisco DNA Center From fabric switch and router loopback IPs to Cisco DNA Center for image upgrade Any Fabric underlay UDP 162 Cisco DNA Center From fabric switch and router loopback IPs to Cisco DNA Center for SNMP Traps Any Fabric underlay UDP 514 Cisco DNA Center From fabric switches and routers to Cisco DNA Assurance Any Fabric underlay UDP 6007 Cisco DNA Center From fabric switches and routers to Cisco DNA Center for NetFlow Any Fabric underlay UDP 123 Cisco DNA Center From fabric switches to Cisco DNA Center; used when doing LAN automation ICMP Fabric underlay ICMP Cisco DNA Center From fabric switch and router loopbacks to Cisco DNA Center for SNMP: device discovery UDP 161 Fabric underlay Any Cisco DNA Center From fabric switch and router loopbacks to Cisco DNA Center for SNMP: Device Discovery Any Fabric underlay UDP 53 DNS Server From fabric switches and routers to DNS server for name resolution TCP and Fabric UDP 4342 underlay TCP and UDP 4342 Fabric Routers and Switches LISP-encapsulated control messages TCP and Fabric UDP 4342 underlay Any Fabric Routers and Switches LISP control-plane communications Any Fabric underlay UDP 4789 Fabric Routers and Switches Fabric-encapsulated data packets (VXLAN-GPO) Any Fabric underlay UDP ISE 1645/1646/1812/1813 From fabric switch and router loopback IPs to ISE for RADIUS ICMP Fabric underlay ICMP From fabric switches and routers to ISE for troubleshooting ISE Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 27 Plan the Deployment Required Ports and Protocols for Cisco Software-Defined Access UDP Fabric 1700/3799 underlay Any ISE From fabric switches to ISE for care-of address (CoA) Any Fabric underlay UDP 123 NTP Server From fabric switch and router loopback IPs to the NTP server Any control-plane UDP and TCP 4342/4343 Cisco Wireless Controller From control-plane loopback IP to Cisco Wireless Controller for Fabric-enabled wireless 3 Border routing protocol, SPAN, profiling, and telemetry traffic are not included in this table. Table 11: Cisco Wireless Controller Traffic Source Port Source Destination Port Destination Description UDP Cisco Wireless 5246/5247/5248 Controller Any AP IP Pool From Cisco Wireless Controller to an AP subnet for CAPWAP ICMP Cisco Wireless Controller ICMP AP IP Pool From Cisco Wireless Controller to APs allowing ping for troubleshooting Any Cisco Wireless Controller TCP 25103 Cisco DNA Center From Cisco Wireless Controller to Cisco DNA Center for Assurance Any Cisco Wireless Controller UDP AP IP Pool 69/5246/5247 TCP 22 From Cisco Wireless Controller to an AP subnet for CAPWAP Any Cisco Wireless Controller UDP and TCP Control plane 4342/4343 From Cisco Wireless Controller to control-plane loopback IP Any Cisco Wireless Controller TCP 22 Cisco DNA Center From Cisco Wireless Controller to Cisco DNA Center for device discovery UDP 161 Cisco Wireless Controller Any Cisco DNA Center From Cisco Wireless Controller to Cisco DNA Center for SNMP Any Cisco Wireless Controller UDP 162 Cisco DNA Center From Cisco Wireless Controller to Cisco DNA Center for SNMP traps Any Cisco Wireless Controller TCP 16113 Cisco Mobility From Cisco Wireless Controller Services Engine to Cisco MSE and Spectrum (MSE) and Cisco Expert for NMSP Spectrum Expert ICMP Cisco Wireless Controller ICMP Cisco DNA Center From Cisco Wireless Controller to allow ping for troubleshooting Any HA server TCP 1315 Cisco DNA Center Database server HA (QoS) Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 28 Plan the Deployment Required Ports and Protocols for Cisco Software-Defined Access Any HA server TCP 1316–1320 Cisco DNA Center HA database ports Any HA web server TCP 8082 Cisco DNA Center HA web server's health monitor port Any Cisco Wireless UDP 514 Controller and various syslog servers Cisco Wireless Controller Syslog (optional) Any Cisco Wireless Controller UDP 53 DNS Server From Cisco Wireless Controller to DNS server Any Cisco Wireless Controller TCP 443 ISE From Cisco Wireless Controller to ISE for Guest SSID web authorization Any Cisco Wireless Controller UDP 1645,1812 ISE From Cisco Wireless Controller to ISE for RADIUS authentication Any Cisco Wireless Controller UDP 1646, 1813 ISE From Cisco Wireless Controller to ISE for RADIUS accounting Any Cisco Wireless Controller UDP 1700, 3799 ISE From Cisco Wireless Controller to ISE for RADIUS CoA ICMP Cisco Wireless Controller ICMP ISE From Cisco Wireless Controller to ISE ICMP for troubleshooting Any Cisco Wireless Controller UDP 123 NTP server From Cisco Wireless Controller to NTP server Table 12: Fabric-Enabled Wireless AP IP Pool Traffic Source Port Source Destination Port Destination Description UDP 68 AP IP Pool UDP 67 DHCP server From an AP IP pool to DHCP server. ICMP AP IP Pool ICMP DHCP server From an AP IP pool to ICMP for troubleshooting. Any AP IP Pool 514 Various Syslog—Destination configurable. Default is 255.255.255.255. Any AP IP Pool UDP Cisco Wireless 69/5246/5247/5248 Controller From an AP IP pool to Cisco Wireless Controller for CAPWAP. ICMP AP IP Pool ICMP From an AP IP pool to Cisco Wireless Controller, allowing ping for troubleshooting. Cisco Wireless Controller Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 29 Plan the Deployment Required Ports and Protocols for Cisco Software-Defined Access Table 13: ISE Traffic Source Port4 Source Destination Port Destination Description Any ISE TCP 64999 Border From ISE to border node for SGT Exchange Protocol (SXP) Any ISE UDP 514 Cisco DNA Center From ISE to syslog server (Cisco DNA Center) UDP ISE 1645/1646/1812/1813 Any Fabric underlay From ISE to fabric switches and routers for RADIUS and authorization Any ISE UDP 1700/3799 Fabric underlay From ISE to fabric switch and router loopback IPs for CoA ICMP ISE ICMP Fabric underlay From ISE to fabric switches for troubleshooting Any ISE UDP 123 NTP Server From ISE to NTP server UDP ISE 1812/1645/1813/1646 Any Cisco Wireless Controller From ISE to Cisco Wireless Controller for RADIUS ICMP ICMP Cisco Wireless Controller From ISE to Cisco Wireless Controller for troubleshooting 4 ISE Note: High availability and profiling traffic are not included in this table. Table 14: DHCP Server Traffic Source Port Source Destination Port Destination Description UDP 67 DHCP server UDP 68 AP IP Pool From DHCP server to fabric APs ICMP DHCP server ICMP AP IP Pool ICMP for troubleshooting: Fabric to DHCP UDP 67 DHCP server UDP 68 Fabric underlay From DHCP to fabric switches and routers ICMP DHCP server ICMP Fabric underlay ICMP for troubleshooting: Fabric to DHCP UDP 67 DHCP server UDP 68 User IP Pool From DHCP server to fabric switches and routers ICMP DHCP server ICMP User IP Pool ICMP for troubleshooting: User to DHCP Table 15: NTP Server Traffic Source Port Source Destination Port Destination Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 30 Description Plan the Deployment Required Configuration Information UDP 123 NTP Server Any ISE From NTP server to ISE UDP 123 NTP Server Any Cisco DNA Center From NTP server to Cisco DNA Center UDP 123 NTP Server Any Fabric underlay From NTP server to fabric switch and router loopback UDP 123 NTP Server Any Cisco Wireless Controller From NTP server to Cisco Wireless Controller Table 16: DNS Traffic Source Port Source Destination Port Destination Description UDP 53 DNS Server Any Fabric underlay From DNS server to fabric switches UDP 53 DNS Server Any Cisco Wireless Controller From DNS server to Cisco Wireless Controller Required Configuration Information During appliance configuration, you will be prompted for the following information, in addition to the Required IP Addresses and Subnets: • Linux User Name: This is maglev. This user name is the same on all the appliances in a cluster, including the primary node and add-on nodes, and cannot be changed. • Linux Password: Identifies the password for the Linux user name maglev. This password ensures secure access to each appliance using the Linux command line. If required, you can assign a different Linux password for each maglev Linux user name on each appliance in a cluster. You must create the Linux password because there is no default. The password must meet the following requirements: • Minimum length of eight characters. • Should not contain a tab or a line break. • Contains characters from at least three of the following categories: • Upper case alphabets • Lower case alphabets • Numerals • Special characters (for example, ! or #) The Linux password is encrypted and hashed in the Cisco DNA Center database. If you are deploying a multinode cluster, you will also be prompted to enter the primary node's Linux password on each of the add-on nodes. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 31 Plan the Deployment Required First-Time Setup Information • Password Generation Seed (Optional): Instead of creating a Linux password, you can enter a seed phrase and click Generate Password. The Maglev Configuration wizard generates a random and secure password using this seed phrase. You can further edit the generated password by using the Auto Generated Password field. • Administrator Passphrase: Identifies the password used for web access to Cisco DNA Center in a cluster. This is the password for the superuser account admin, which you use to log in to Cisco DNA Center for the first time (see Log In for the First Time). You are prompted to change this password when you log in for the first time. You must create this password because there is no default. The Administrator Passphrase must meet the same requirements as the Linux password, described earlier. • CIMC User Password: Identifies the password used for access to the CIMC GUI. The factory default is password, but you are prompted to change it when you first set up CIMC for access using a web browser (see Enable Browser Access to Cisco Integrated Management Controller). The CIMC user password must meet the same requirements as the Linux password described earlier. It can be changed back to password only by a reset to factory defaults. • Primary Node IP Address: Required only when you are installing add-on nodes in a cluster. This is the IP address of the cluster port on the primary node (see Interface Cable Connections). Required First-Time Setup Information After you have configured your appliances, log in to Cisco DNA Center and complete the essential setup tasks. During this first-time setup, you should have the following information: • New Admin Superuser Password: You will be prompted to enter a new password for the Cisco DNA Center admin super user. Resetting the super user password enhances operational security. This is especially important if, for example, the enterprise staff who installed and configured the Cisco DNA Center appliance is not a Cisco DNA Center user or administrator. • Cisco.com Credentials: The Cisco.com user ID and password that your organization uses to register software downloads and receive system communications through email. • Cisco Smart Account Credentials: The Cisco.com Smart Account user ID and password your organization uses for managing your device and software licenses. • IP Address Manager URL and Credentials: The host name, URL, admin user name, and admin password of the third-party IP address manager (IPAM) server you plan to use with Cisco DNA Center. This release supports InfoBlox and Bluecat. • Proxy URL, Port, and Credentials: The URL (host name or IP address), port number, user name, and user password of the proxy server you plan to use with Cisco DNA Center in order to get updates to the Cisco DNA Center software, manage device licenses, and retrieve other downloadable content. • Cisco DNA Center Users: User names, passwords, and privilege settings for the new Cisco DNA Center users you will be creating. We recommend that you always use one of these new user accounts for all your normal Cisco DNA Center operations. Avoid using the admin super user account for activities, except reconfiguring Cisco DNA Center and operations where super user privileges are explicitly required. For details about how to launch and respond to the first-time setup wizard that prompts you for this information, see Log In for the First Time. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 32 Plan the Deployment Required First-Time Setup Information You will also need the following information to complete the remaining setup tasks, which can be done after your first login: • ISE Server IP and Credentials: You will need the Cisco ISE server IP address, administrative user name, and password. These are needed to log in to and configure your organization's ISE server to share data with Cisco DNA Center, as explained in Integrate Cisco ISE with Cisco DNA Center. Installation of or upgrade to Cisco DNA Center 1.3.3.0 checks to see if Cisco ISE is configured as an authentication and policy (AAA) server. If the correct version of Cisco ISE is already configured, you can start migration of group policy data from Cisco ISE to Cisco DNA Center. If Cisco ISE is not configured, or if the required version of Cisco ISE is not present, Cisco DNA Center installs, but Group Based Policy is disabled. You must install or upgrade Cisco ISE and connect it to Cisco DNA Center. You can then start the data migration. Cisco DNA Center data present in the previous version is preserved when you upgrade. The data migration operation merges data from Cisco DNA Center and Cisco ISE. If the migration encounters a conflict, preference is given to data from Cisco ISE. If Cisco DNA Center becomes unavailable, and it is imperative to manage policies before Cisco DNA Center becomes available once more, there is an option in Cisco ISE to override the Read-Only setting. This allows you to make policy changes directly in Cisco ISE. After Cisco DNA Center is available again, you must disable the Read-Only override on Cisco ISE, and re-synchronize the policy data on Cisco DNA Center Group Based Access Control Settings page. Only use this option when absolutely necessary, since changes made directly in Cisco ISE are not propagated to Cisco DNA Center. • Authorization and Policy Server Information: If you are using Cisco ISE as your authentication and policy server, you will need the same information listed in the previous bullet, plus the ISE CLI user name, CLI password, server FQDN, a subscriber name (such as cdnac), the ISE SSH key (optional), the protocol choice (RADIUS or TACACS), the authentication port, the accounting port, and retry and timeout settings. If you are using an authorization and policy server that is not Cisco ISE, you will need the server's IP address, protocol choice (RADIUS or TACACS), authentication port, accounting port, and retry and timeout settings. This information is required to integrate Cisco DNA Center with your chosen authentication and policy server, as explained in Configure Authentication and Policy Servers. • SNMP Retry and Timeout Values: This is required to set up device polling and monitoring, as explained in Configure SNMP Properties. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 33 Plan the Deployment Required First-Time Setup Information Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 34 CHAPTER 3 Install the Appliance • Appliance Installation Workflow, on page 35 • Unpack and Inspect the Appliance, on page 35 • Review the Installation Warnings and Guidelines, on page 36 • Review the Rack Requirements, on page 37 • Connect and Power On the Appliance, on page 37 • Check the LEDs, on page 37 Appliance Installation Workflow Complete the tasks described in this chapter to physically install your Cisco DNA Center appliance. Complete these tasks for each appliance you want to install, and be sure to install all of the appliances before configuring the primary node. Unpack and Inspect the Appliance Caution When handling internal appliance components, wear an ESD strap and handle modules by the carrier edges only. Step 1 Remove the appliance from its cardboard container and save all the packaging material (in case the appliance requires shipping in the future). Step 2 Compare the shipment with the equipment list provided by your customer service representative. Verify that you have all the items. Check for damage and report discrepancies or damage, if any, to your customer service representative immediately. Have the following information ready: Step 3 • Invoice number of the shipper (see the packing slip) • Model and serial number of the damaged unit • Description of damage Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 35 Install the Appliance Review the Installation Warnings and Guidelines • Effect of damage on the installation Review the Installation Warnings and Guidelines Warning To prevent the system from overheating, do not operate it in an area that exceeds the maximum recommended ambient temperature of: 95°F (35°C). Statement 1047 Warning The plug-socket combination must be accessible at all times, because it serves as the main disconnecting device. Statement 1019 Warning This product relies on the building’s installation for short-circuit (overcurrent) protection. Ensure that the protective device is rated not greater than: 250 V, 15 A. Statement 1005 Warning Installation of the equipment must comply with local and national electrical codes. Statement 1074 Caution To ensure proper airflow, it is necessary to rack the appliances using rail kits. Physically placing the units on top of one another or stacking without the rail kits blocks the air vents on top of the appliances, which could result in overheating, higher fan speeds, and higher power consumption. We recommend that you mount your appliances on rail kits when you are installing them into the rack because these rails provide the minimal spacing required between the appliances. No additional spacing between the appliances is required when you mount the units using rail kits. Caution Avoid UPS models that use ferroresonant technology. These UPS models can become unstable with systems such as the Cisco UCS, which can have substantial current-draw fluctuations because of fluctuating data traffic patterns. When you install an appliance, follow these guidelines: • Plan your site configuration and prepare the site before installing the appliance. See the Cisco UCS Site Preparation Guide for help with the recommended site planning and preparation tasks. • Ensure that there is adequate space around the appliance to enable servicing, and for adequate airflow. The airflow in this appliance is from front to back. • Ensure that the site's air-conditioning meets the thermal requirements listed in Environmental Specifications. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 36 Install the Appliance Review the Rack Requirements • Ensure that the cabinet or rack meets the requirements listed in Review the Rack Requirements. • Ensure that the site's power meets the requirements listed in Power Specifications. If available, use a UPS to protect against power failures. Review the Rack Requirements For proper operation, the rack in which you install the appliance must meet the following requirements: • A standard 19-in. (48.3-cm) wide, four-post EIA rack, with mounting posts that conform to English universal hole spacing, per section 1 of ANSI/EIA-310-D-1992. • The rack post holes can be square 0.38-in. (9.6 mm), round 0.28-in. (7.1 mm), #12-24 UNC, or #10-32 UNC when you use the supplied slide rails. • The minimum vertical rack space per server must be one RU, equal to 1.75 in. (44.45 mm). Connect and Power On the Appliance This section describes how to power on the appliance and check that it is functional. Step 1 Attach the supplied power cord to each power supply in the appliance and then attach the power cords to a grounded AC power outlet. See Power Specifications for details. Wait for approximately two minutes to let the appliance boot into standby power mode during the first boot up. The Power Status LED indicates the appliance's power status: • Off: There is no AC power present in the appliance. • Amber: The appliance is in standby power mode. Power is supplied only to the CIMC and some motherboard functions. • Green: The appliance is in main power mode. Power is supplied to all the appliance components. For more information on these and other appliance LEDs, see Front and Rear Panels. Step 2 Connect a USB keyboard and VGA monitor to the server, using the supplied KVM cable connected to the KVM connector on the front panel. Alternatively, you can use the VGA and USB ports on the rear panel. You can only connect to one VGA interface at a time. Check the LEDs After you have powered up the Cisco DNA Center appliance, check the state of the front-panel and rear-panel LEDs and buttons to ensure it is functioning. The following illustrations show the LEDs for a functional appliance after physical installation and first power-up and before configuration. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 37 Install the Appliance Check the LEDs Figure 6: Front Panel LEDs LED Desired Status Indicator 1 Drive Fault LEDs: Off. Drive Activity LEDs: Green 2 Power Status: Green 3 System Status: Green 4 Fan Status: Green 5 Temperature Status: Green 6 Power Supply Status: Green 7 Network Link Activity: Off Figure 7: Rear Panel LEDs Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 38 Install the Appliance Check the LEDs LED Desired Status Indicator 1 After initial power-up, all the ports should have their Link Status and Link Speed LEDs showing as off, and their Power Status LED should be green. After network settings are configured and tested using the Maglev Configuration Wizard (see Configure the Primary Node and Configure Add-On Nodes), the Link Status, Link Speed and Power Status LEDs for all cabled ports should be green. All uncabled port LEDs should be unchanged. 2 Power Supply Fault LEDs: Off. AC Power LEDs: Green If you see LEDs with colors other than those shown above, you may have a problem condition. See Front and Rear Panels for details on the likely causes of the status. Be sure to correct any problem conditions before proceeding to configure the appliance. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 39 Install the Appliance Check the LEDs Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 40 CHAPTER 4 Prepare the Appliance for Configuration • Preparation for Appliance Configuration Overview, on page 41 • Enable Browser Access to Cisco Integrated Management Controller, on page 41 • Execute Preconfiguration Checks, on page 46 • Reimage the Appliance, on page 53 Preparation for Appliance Configuration Overview Before you can successfully configure your Cisco DNA Center appliance, first complete the following tasks: 1. Enable browser access to the appliance's Cisco IMC (see Enable Browser Access to Cisco Integrated Management Controller). 2. Use Cisco IMC to check and adjust important hardware and switch settings (see Execute Preconfiguration Checks). 3. Cisco DNA Center software is preinstalled on your appliance, but you may need to reinstall the software in certain situations (such as before you change the current cluster link configuration). If this is the case, you must also complete the tasks described in Reimage the Appliance. Note If you do not need to reimage your appliance, proceed to Appliance Configuration Overview. Enable Browser Access to Cisco Integrated Management Controller After installing the appliance, as described in Appliance Installation Workflow, use the Cisco IMC configuration utility to assign an IP address and gateway to the appliance's CIMC port. This gives you access to the Cisco IMC GUI, which you should use to configure the appliance. After you complete the Cisco IMC setup, log in to Cisco IMC and run the tasks listed in Execute Preconfiguration Checks to ensure correct configuration. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 41 Prepare the Appliance for Configuration Enable Browser Access to Cisco Integrated Management Controller Tip To help ensure the security of your deployment, Cisco IMC prompts you to change the Cisco IMC user's default password when you boot the appliance for the first time. To change the Cisco IMC user password later, use the Cisco IMC GUI, as follows: 1. From the top-left corner of the GUI, click the Toggle Navigation icon ( User Management. ) and then choose Admin > The Local User Management tab should already be selected. 2. Check the check box for user 1, and then click Modify User. The Modify User Details dialog box opens. 3. Check the Change Password check box. 4. Enter and confirm the new password, and then click Save. Step 1 Access the appliance console by attaching either of the following: • A KVM cable to the KVM connector on the appliance's front panel (component 12 on the front panel illustrated in Front and Rear Panels) • A keyboard and monitor to the USB and VGA ports on the appliance's rear panel (components 7 and 12, respectively, on the rear panel illustrated in Front and Rear Panels). Step 2 Make sure that the appliance's power cord is plugged in and the power is on. Step 3 Press the Power button on the front panel to boot the appliance. The Cisco IMC configuration utility boot screen should be displayed, as shown below. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 42 Prepare the Appliance for Configuration Enable Browser Access to Cisco Integrated Management Controller Step 4 As soon as the boot screen is displayed, press F8 to perform Cisco IMC configuration. The CIMC configuration utility displays the CIMC User Details screen, as shown below. Step 5 Enter the default CIMC user password (the default on a new appliance is password) in the Enter current CIMC Password field. Step 6 Enter and confirm the new CIMC user password in the Enter new CIMC password and Re-Enter new CIMC password fields. When you press Enter after entering the new password in the Re-Enter new CIMC password field, the Cisco IMC configuration utility displays the NIC Properties screen, as shown below. Step 7 Perform the following actions: • NIC mode: Select Dedicated. • IP (Basic): Select IPV4. • CIMC IP: Enter the IP address of the CIMC port. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 43 Prepare the Appliance for Configuration Enable Browser Access to Cisco Integrated Management Controller • Prefix/Subnet: Enter the subnet mask for the CIMC port IP address. • Gateway: Enter the IP address of your preferred default gateway. • Pref DNS Server: Enter the IP address of your preferred DNS server. • NIC Redundancy: Select None. Step 8 Press F1 to specify Additional settings. The Cisco IMC configuration utility displays the Common Properties screen, as shown below. Step 9 Perform the following actions: • Hostname: Enter a hostname for CIMC on this appliance. • Dynamic DNS: Uncheck the check box to disable this feature. • Factory Defaults: Uncheck the check box to disable this feature. • Default User (Basic): Leave these fields blank. • Port Properties: Enter new settings or accept the defaults shown in these fields. • Port Profiles: Uncheck the check box to disable this feature. Step 10 Press F10 to save the settings. Step 11 Press Escape to exit and reboot the appliance. Step 12 After the settings are saved and the appliance finishes rebooting, open a compatible browser on a client machine with access to the subnet on which the appliance is installed, and enter the following URL: Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 44 Prepare the Appliance for Configuration Enable Browser Access to Cisco Integrated Management Controller https://CIMC_ip_address, where CIMC_ip_address is the Cisco IMC port IP address that you entered in Step 7. Your browser displays a main Cisco IMC GUI login window similar to the one shown below. Step 13 Log in using the Cisco IMC user ID and password you set in Step 5. If the login is successful, your browser displays a Cisco Integrated Management Controller Chassis Summary window similar to the one shown below. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 45 Prepare the Appliance for Configuration Execute Preconfiguration Checks Execute Preconfiguration Checks After installing the appliance (as described in Appliance Installation Workflow) and setting up access to the Cisco IMC GUI (as described in Enable Browser Access to Cisco Integrated Management Controller), use Cisco IMC to perform the following preconfiguration tasks, which help ensure correct configuration and deployment: 1. Synchronize the appliance hardware with the Network Time Protocol (NTP) servers you use to manage your network. These must be the same NTP servers whose hostnames or IPs you gathered for use when planning your implementation, as explained in Required IP Addresses and Subnets. This is a critical task that ensures that your Cisco DNA Center data is synchronized properly across the network. 2. Check that the appliance's 10-Gbps ports are enabled and properly configured for high throughput. 3. Reconfigure the switches connected to the 10-Gbps appliance ports to support higher throughput settings. 4. Reconfigure the switches connected to the 10-Gbps appliance ports to support oversize 802.1p frames. Step 1 Log in to the appliance's Cisco IMC using the Cisco IMC IP address, user ID, and password you set in Enable Browser Access to Cisco Integrated Management Controller. If the login is successful, your browser displays the Cisco Integrated Management Controller Chassis Summary window, as shown below. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 46 Prepare the Appliance for Configuration Execute Preconfiguration Checks Step 2 Synchronize the appliance's hardware with the Network Time Protocol (NTP) servers you use to manage your network, as follows: a) From the top-left corner of the Cisco IMC GUI, click the Toggle Navigation icon ( ). b) From the Cisco IMC menu, select Admin > Networking, and then choose the NTP Setting tab. c) Make sure that the NTP Enabled check box is checked and enter up to four NTP server host names or addresses in the numbered Server fields, as shown in the example below. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 47 Prepare the Appliance for Configuration Execute Preconfiguration Checks d) Click Save Changes. Cisco IMC validates your entries and then begins to synchronize the time on the appliance's hardware with the time on the NTP servers. Step 3 Next, check that the appliance NICs are configured to support high throughput, as follows: a) If needed, click the icon to display the Cisco IMC menu. b) From the Cisco IMC menu, select Chassis > Inventory > Cisco VIC Adapters. Verify that the Product ID "UCSC-MLOM-CSC-02" is listed for the MLOM slot, as shown below: c) Select > Compute > BIOS > Configure BIOS > Advanced. Verify that the Reboot Host Immediately checkbox is unchecked and note the location of the LOM and PCIe Slots Configuration dropdown. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 48 Prepare the Appliance for Configuration Execute Preconfiguration Checks d) Select LOM and PCIe Slots Configuration. Then, using the dropdown selectors, set PCIe Slot: MLOM OptionROM to Enabled and PCIe Slot: MLOM Link Speed to Auto. e) Click Save. You will be prompted to reboot the host. Click OK to continue instead of rebooting. f) Select > Networking > Adapter Card MLOM > General. Take note of the MAC addresses for Port-0 and Port-1 (shown in the External Ethernet Interfaces section at the bottom of the page). In the Adapter Card Properties section, use the dropdown selectors next to Port-0 and Port-1 to set the speed of both these ports to Auto, as shown below. Then click Save Changes. g) Click the vNICs tab and select eth0 from the vNICs dropdown. Use the selectors and fields to set these values for eth0: Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 49 Prepare the Appliance for Configuration Execute Preconfiguration Checks • VLAN Mode: Trunk • MTU: 1500 • Default VLAN: 99 (Please note that "99" is only an example. You should enter the default VLAN value you want your appliances and their connected uplink switch to use.) Tip 1500 is the minimum maximum transmission unit (MTU) size. You can improve throughput on the 10Gbps ports by entering any higher value, up to a maximum of 9000. h) Click Save Changes. You will be prompted to reboot the host again. Click Cancel to continue instead of rebooting. i) Select eth1 from the vNICS dropdown and set the values that you want your appliances and their connected uplink switch to use. j) When you are finished, click Save Changes. You will be prompted to reboot the host. This time, click OK to reboot the appliance. k) When the appliance is finished rebooting, log in to the Cisco IMC GUI again. Select > Networking > Adapter Card MLOM > General > vNICs. Verify the accuracy of the vNIC MAC addresses and the MTU, VLAN and VLAN Mode parameters you set earlier. l) When you are finished: Click the Host Power menu at top right and select Power Cycle. Then click OK. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 50 Prepare the Appliance for Configuration Execute Preconfiguration Checks Step 4 Reconfigure your switches to match the high-throughput settings on the appliance, as follows: a) Using a Secure Shell (SSH) client, log in to the switch to be configured and enter EXEC mode at the switch prompt. b) Configure the switch port. On a Cisco Catalyst switch, enter the following commands. For example: MySwitch#Config terminal MySwitch(config)#interface tengigabitethernet 1/1/3 MySwitch(config-if)#switchport MySwitch(config-if)#switchport mode trunk MySwitch(config-if)#switchport trunk allowed vlan 99 MySwitch(config-if)#switchport voice vlan dot1p MySwitch(config-if)#speed auto MySwitch(config-if)#duplex full MySwitch(config-if)#mtu 1500 MySwitch(config-if)#no shut MySwitch(config-if)#end MySwitch(config)#do copy running-config startup-config On a Cisco Nexus switch, enter the following commands to disable Link Layer Discovery Protocol (LLDP) and priority flow control (PFC). For example: N7K2# configure terminal N7K2(config)# interface eth 3/4 N7K2(config-if)# no priority-flow-control mode auto N7K2(config-if)# no lldp transmit N7K2(config-if)# no lldp receive Note that these commands are examples only. When configuring your appliance's NICs, use the same VLAN ID and MTU values you entered in Step 3 of this procedure. The values displayed for the link speed, duplex, and MTU parameters are the defaults for your switch. Enter new values for these parameters only if you have changed the defaults. You may, as with the appliance NICs, also set the MTU up to a maximum of 9000 for better throughput. c) Run the show interface tengigabitethernet portID command and verify that the port is connected, running, and has the correct MTU, duplex, and link-type settings in the command output. For example: MySwitch#show interface tengigabitethernet 1/1/3 TenGigabitEthernet1/1/3 is up, line protocol is up (connected) Hardware is Ten Gigabit Ethernet, address is XXXe.310.8000 (bia XXX.310.8000) MTU 1500 bytes, BW 10000000 Kbit/sec, DLY 10 usec, reliability 255/255, txload 1/255, rxload 1/255 Encapsulation ARPA, loopback not set Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 51 Prepare the Appliance for Configuration Execute Preconfiguration Checks Keepalive not set Full-duplex, 10GB/s, link type is auto, media type is SFP-10Gbase-SR d) Run the show run interface tengigabitethernet portID command to configure the switch ports where the cables from the VIC 1227 ports are connected. For example: MySwitch#show run interface tengigabitethernet 1/1/3 Building configuration... Current configuration : 129 bytes ! interface TenGigabitEthernet1/1/3 switchport trunk allowed vlan 99 switchport mode trunk end MySwitch# e) Run the show run interface tengigabitethernet portID command and verify from the command output that the port has the correct voice vlan dot1p setting. For example: MySwitch#show run interface tengigabitEthernet 1/1/3 Building configuration... Current configuration : 129 bytes ! interface TenGigabitEthernet1/1/3 switchport trunk allowed vlan 99 switchport mode trunk switchport voice vlan dot1p end MySwitch# f) Run the show mac address-table interface from the command output. For example: tengigabitethernet portID command and verify the MAC address MySwitch#show mac address-table interface tengigabitethernet 1/1/3 Mac Address Table ––––––––––––––––––––––––––––––––––––––––––-Vlan Mac Address Type Ports ––-––––––––––––––––-99 XXXe.3161.1000 DYNAMIC Te1/1/3 Total Mac Addresses for this criterion: 1 MySwitch# What to do next When this task is complete, do one of the following: • If you need to reinstall Cisco DNA Center software before you configure your appliance, see Reimage the Appliance. • If you are ready to configure your appliance, proceed to Appliance Configuration Overview. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 52 Prepare the Appliance for Configuration Reimage the Appliance Reimage the Appliance Situations that require you to reimage your Cisco DNA Center appliance, such as recovering from a backup or changing your cluster link configuration, might arise. To do so, complete the following procedure. Step 1 Download the Cisco DNA Center ISO image and verify that it is a genuine Cisco image. See Verify the Cisco DNA Center ISO Image. Step 2 Create a bootable USB drive that contains the Cisco DNA Center ISO image. See Create a Bootable USB Drive. Step 3 Reinstall Cisco DNA Center onto your appliance. See Install the Cisco DNA Center ISO Image. Verify the Cisco DNA Center ISO Image Prior to deploying Cisco DNA Center, we strongly recommend that you to verify that the ISO image you downloaded is a genuine Cisco image. Before you begin Obtain the location of the Cisco DNA Center ISO image (through email or by contacting the Cisco support team). Step 1 Download the Cisco DNA Center ISO image (.iso) from the location specified by Cisco. Step 2 Download the Cisco public key (cisco_image_verification_key.pub) for signature verification from the location specified by Cisco. Step 3 Download the secure hash algorithm (SHA512) checksum file for the ISO image from the location specified by Cisco. Step 4 Obtain the ISO image's signature file (.sig) from Cisco support through email or by download from the secure Cisco website (if available). Step 5 (Optional) Perform an SHA verification to determine whether the ISO image is corrupted due to a partial download. Run one of the following commands (depending upon your operating system): • On a Linux system: sha512sum ISO-image-filename • On a Mac system: shasum -a 512 ISO-image-filename Microsoft Windows does not include a built-in checksum utility, but you can use the certutil tool: certutil -hashfile <filename> sha256 | md5 For example: certutil -hashfile D:\Customers\FINALIZE.BIN sha256 On Windows, you can also use the Windows PowerShell to generate the digest. For example: Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 53 Prepare the Appliance for Configuration Create a Bootable USB Drive PS C:\Users\Administrator> Get-FileHash -Path D:\Customers\FINALIZE.BIN Algorithm Hash Path SHA256 B84B6FFD898A370A605476AC7EC94429B445312A5EEDB96166370E99F2838CB5 D:\Customers\FINALIZE.BIN Compare the output of the command you run to the SHA512 checksum file that you downloaded. If the command output does not match, download the ISO image again and run the appropriate command a second time. If the output still does not match, contact Cisco support. Step 6 Verify that the ISO image is genuine and from Cisco by verifying its signature: openssl dgst -sha512 -verify cisco_image_verification_key.pub -signature signature-filename ISO-image-filename Note This command works in both MAC and Linux environments. For Windows, you need to download and install OpenSSL (available here) if you have not already done so. If the ISO image is genuine, running this command should display a Verified do not install the ISO image and contact Cisco support. Step 7 OK message. If this message fails to appear, After confirming that you have downloaded a Cisco ISO image, create a bootable USB drive that contains the Cisco DNA Center ISO image. See Create a Bootable USB Drive. Create a Bootable USB Drive Complete one of the following procedures to create a bootable USB drive from which you can install the Cisco DNA Center ISO image. Before you begin: • Download and verify your copy of the Cisco DNA Center ISO image. See Verify the Cisco DNA Center ISO Image. • Confirm that the USB flash drive you are using has a capacity of at least 32 GB. Using Etcher Step 1 Download and install Etcher (Version 1.3.1 or later), an open-source freeware utility that allows you to create a bootable USB drive on your laptop or desktop. Linux, macOS, and Windows versions of Etcher are currently available. You can download a copy at https://www.balena.io/etcher/. Note Use only the Windows version of Etcher on machines running Windows 10, as there are known compatibility issues with older versions of Windows. Step 2 From the machine on which you installed Etcher, connect a USB drive and then start Etcher. Step 3 In the top-right corner of the window, click and verify that the following Etcher settings are set: • Auto-unmount on success • Validate write on success Step 4 Click Back to return to the main Etcher window. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 54 Prepare the Appliance for Configuration Using the Linux CLI Step 5 Click Select Image. Step 6 Navigate to the Cisco DNA Center ISO image you downloaded previously, select it, and then click Open. The name of the USB drive you connected should be listed under the drive icon ( ). If it is not: a. Click Select drive. b. Click the radio button for the correct USB drive, and then click Continue. Step 7 Click Flash! to copy the ISO image to the USB drive. Etcher configures the USB drive as a bootable drive with the Cisco DNA Center ISO image installed. Using the Linux CLI Step 1 Verify that your USB flash drive is recognized by your machine: a) Insert a flash drive into your machine's USB port. b) Open a Linux shell and run the following command: lsblk The command lists the disk partitions that are currently configured on your machine, as illustrated in the following example: $ lsblk NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINT sda 8:0 0 446.1G 0 disk ├─sda1 8:1 0 1M 0 part ├─sda2 8:2 0 28.6G 0 part / ├─sda3 8:3 0 28.6G 0 part /install2 ├─sda4 8:4 0 9.5G 0 part /var ├─sda5 8:5 0 30.5G 0 part [SWAP] └─sda6 8:6 0 348.8G 0 part /data sdb 8:16 0 1.8T 0 disk ├─sdb1 8:17 0 426.1G 0 part /data/maglev/srv/fusion └─sdb2 8:18 0 1.3T 0 part /data/maglev/srv/maglev-system sdc 8:32 0 3.5T 0 disk └─sdc1 8:33 0 3.5T 0 part /data/maglev/srv/ndp sdd 8:48 1 28.7G 0 disk └─sdd1 8:49 1 12G 0 part c) Confirm that an sdd partition (which indicates the presence of a USB flash drive) is listed. Step 2 Burn the Cisco DNA Center ISO image you downloaded previously onto your USB flash drive: time sudo dd if=/data/tmp/ISO-image-filename of=/dev/flash-drive-partition bs=4M && sync For example, to create a bootable USB drive using an ISO image named CDNAC-SW-1.330.iso, you would run the following command: time sudo dd if=/data/tmp/CDNAC-SW-1.330.iso of=/dev/sdd bs=4M && sync Using the Mac CLI Step 1 Determine the disk partition associated with your USB flash drive: Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 55 Prepare the Appliance for Configuration Install the Cisco DNA Center ISO Image a) Open a Terminal window and run the following command: diskutil list The command lists the disk partitions that are currently configured on your machine. b) Insert a flash drive into your machine's USB port and run the diskutil list command a second time. The partition that was not listed the first time you ran this command corresponds to your flash drive. For example, let's assume that your flash drive's partition is /dev/disk2. Step 2 Unmount the flash drive's partition: diskutil unmountDisk flash-drive-partition Continuing our example, you would enter diskutil unmountDisk /dev/disk2 Step 3 Using the Cisco DNA Center ISO image you downloaded previously, create a disk image: hdiutil convert -format UDRW -o Cisco-DNA-Center-version ISO-image-filename Continuing our example, let's assume that you are working with a Cisco DNA Center ISO image named CDNAC-SW-1.330.iso. You would run the following command, which creates a macOS disk image named CDNAC-1.330.dmg: hdiutil convert -format UDRW -o CDNAC-1.330 CDNAC-SW-1.330.iso Important Ensure that the ISO image does not reside on a Box partition. Step 4 Create a bootable USB drive: sudo dd if=macOS-disk-image-filename of=flash-drive-partition bs=1m Continuing our example, you would run the following command: sudo dd if=CDNAC-1.330.dmg of=/dev/disk2 bs=1m The ISO image is about 18 GB in size, so this can take around an hour to complete. Install the Cisco DNA Center ISO Image Complete the following procedure to install the Cisco DNA Center ISO image onto your appliance. Before you begin Create the bootable USB drive from which you will install the Cisco DNA Center ISO image. See Create a Bootable USB Drive. Step 1 Connect the bootable USB drive with the Cisco DNA Center ISO image to the appliance. Step 2 Log in to Cisco IMC and start a KVM session. Step 3 Power on or power cycle the appliance: • Choose Power > Power On System if the appliance is not currently running. • Choose Power > Power Cycle System (cold boot) if the appliance is already running. Step 4 In the resulting pop-up window, click Yes to acknowledge that you are about to execute a server control action. Step 5 When the Cisco logo appears, either press the F6 key or choose Macros > User Defined Macros > F6 from the KVM menu. The boot device selection menu appears. Step 6 Select your USB drive and then press Enter. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 56 Prepare the Appliance for Configuration Install the Cisco DNA Center ISO Image Step 7 In the GNU GRUB bootloader window, select Manufacture Cisco DNA appliance and then press Enter. Note The bootloader automatically boots the Maglev Installer instead if you do not make a selection within 30 seconds. After installation of the Cisco DNA Center ISO image is completed, the installer reboots and opens the Maglev Configuration wizard's welcome screen. Depending on whether you are going to configure a primary or secondary cluster node, proceed to Step 4 in either Configure the Primary Node or Configure Add-On Nodes. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 57 Prepare the Appliance for Configuration Install the Cisco DNA Center ISO Image Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 58 CHAPTER 5 Configure the Appliance • Appliance Configuration Overview, on page 59 • Configure the Primary Node, on page 59 • Configure Add-On Nodes, on page 73 • Upgrade to the Latest Cisco DNA Center Release, on page 88 Appliance Configuration Overview You can deploy the appliance in your network in one of the following two modes: • Standalone: As a single node offering all the functions. This option is usually preferred for initial or test deployments and in smaller network environments. • Cluster: As a node that belongs to a three-node cluster. In this mode, all the services and data are shared among the hosts. This is the preferred option for large deployments. If you choose the Standalone mode for your initial deployment, you can add more appliances later to form a cluster. When configuring the standalone host, ensure that it is set it up as the first, or primary, node in the cluster. If you choose the Cluster mode for your initial deployment, be sure to finish configuring the primary node before configuring the add-on nodes. To proceed, complete the following tasks: 1. Launch the Maglev Configuration wizard from Cisco IMC and configure the primary node in your cluster. See Configure the Primary Node. 2. If you have installed three appliances and want to add the second and third nodes to your cluster, see Configure Add-On Nodes. Configure the Primary Node Perform the steps in this procedure to configure the first installed appliance as the primary node. You must always configure the first appliance as the primary node, whether it will operate standalone or as part of a cluster. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 59 Configure the Appliance Configure the Primary Node If you are configuring the installed appliance as an add-on node for an existing cluster that already has a primary node, follow the steps described in Configure Add-On Nodes instead. Note Ensure that all of the IP addresses you enter while completing this procedure are valid IPv4 addresses with valid IPv4 netmasks. Also make sure that the addresses and their corresponding subnets do not overlap. Service communication issues can result if they do. Before you begin Ensure that you: • Collected all of the information specified in Required IP Addresses and Subnets and Required Configuration Information. • Installed the first appliance, as described in Appliance Installation Workflow. • Configured Cisco IMC browser access on the primary node, as described in Enable Browser Access to Cisco Integrated Management Controller. • Checked that the primary node appliance's ports, and the switches they use, are properly configured, as described in Execute Preconfiguration Checks. • Confirmed that you are using a compatible browser. For a list of compatible browsers, see the Release Notes document for the version of Cisco DNA Center you are installing. • Enabled ICMP on the firewall between Cisco DNA Center and the DNS server you specify in Step 8 of the following procedure. The Maglev Configuration wizard uses ping to verify the DNS server you specify. This ping might get blocked if there is a firewall between Cisco DNA Center and the DNS server, and ICMP is not enabled on that firewall. When this happens, you will not be able to complete the wizard. Step 1 Point your browser to the Cisco IMC IP address you set during the Cisco IMC GUI configuration you performed, and log in to the Cisco IMC GUI as the Cisco IMC user (see Enable Browser Access to Cisco Integrated Management Controller). After successful login, the appliance displays the Cisco Integrated Management Controller Chassis Summary window, with a hyperlinked menu at the top of the window, as shown below. Step 2 From the hyperlinked menu, choose Launch KVM and then select either Java based KVM or HTML based KVM. If you select Java-based KVM, you will need to launch the Java startup file from your browser or file manager in Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 60 Configure the Appliance Configure the Primary Node order to view the KVM console in its own window. If you select HMTL-based KVM, it launches the KVM console in a separate window or tab automatically. Irrespective of the KVM type you choose, use the KVM console to monitor the progress of the configuration and respond to the Maglev Configuration wizard prompts. Step 3 With the KVM displayed, reboot the appliance by making one of the following selections: • In the main Cisco IMC GUI browser window: Choose Host Power > Power Cycle, and switch to the KVM console to continue. • In the KVM console: Choose Power > Power Cycle System (cold boot). If you are asked to confirm your choice to reboot the appliance, click OK. After displaying reboot messages, the KVM console displays the Maglev Configuration wizard welcome screen. Step 4 Click Start a Cisco DNA Center Cluster to begin configuring the primary node. The wizard discovers all of the ports on the appliance and presents them to you one by one, in separate screens, in the following order: a. 10-Gbps Cluster port (Port 2, enp10s0, Network Adapter #1) b. 1-Gbps Cisco DNA Center GUI port (1, enp1s0f0, Network Adapter #2) c. 1-Gbps Cloud port (2, enp1s0f1, Network Adapter #3) d. 10-Gbps Enterprise port (Port 1, enp9s0, Network Adapter #4) Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 61 Configure the Appliance Configure the Primary Node Note Step 5 If the wizard fails to display either or both of the Enterprise and Cluster ports during the course of configuration, these ports may be non-functional or disabled. These two ports are required for Cisco DNA Center functionality. If you discover that they are non-functional, choose cancel to exit the configuration immediately. Be sure you have completed all of the steps provided in Execute Preconfiguration Checks before resuming configuration or contacting the Cisco Technical Assistance Center (TAC). The wizard discovers the 10-Gbps Cluster port (Port 2, enp10s0) first, and presents it as NETWORK ADAPTER #1. As explained in Interface Cable Connections, this port is used to link the appliance to the cluster, so apply the host IP address, netmask, and other values that are appropriate for this purpose (see Required IP Addresses and Subnets and Required Configuration Information for the values to enter). Enter the configuration values for NETWORK ADAPTER #1, as shown in the table below. Table 17: Primary Node Entries for Network Adapter #1: 10-Gbps Cluster Port (enp10s0) Host IP address Enter the IP address for the Cluster port. This is required. Note that you cannot change the address of the Cluster port later. Netmask Enter the netmask for the port's IP address. This is required. Default Gateway IP address Enter a default gateway IP address to use for the port. Important Ensure that you enter a default gateway IP address for at least one of your appliance's interfaces. Otherwise, you will not be able to complete the configuration wizard. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 62 Configure the Appliance Configure the Primary Node DNS Servers Enter the IP address of the preferred DNS server. If you are entering multiple DNS servers, separate the IP addresses in the list with spaces. Important For each appliance in your cluster, configure a maximum of three DNS servers. Problems can occur if you configure more than three DNS servers for an appliance. Static Routes Enter one or more static routes in the following format, separated by spaces: <network>/<netmask>/<gateway>. This is usually required on the GUI port only. Cluster Link Check the check box to indicate that this port will be the link to a cluster. This is required on the Cluster port only. After you finish entering the configuration values, click next>> to proceed. The wizard validates the values you entered and issues an error message if any are incorrect. If you receive an error message, check that the value you entered is correct, then reenter it. If needed, click <<back to reenter it. Step 6 After successful validation of the Cluster port values you entered, the wizard presents the 1-Gbps Cisco DNA Center GUI port (1, enp1s0f0) as NETWORK ADAPTER #2. As explained in Interface Cable Connections, this port is used to access the Cisco DNA Center GUI from your management network. Apply the host IP address, netmask, and other values that are appropriate for this purpose (see Required IP Addresses and Subnets and Required Configuration Information for the values to enter). Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 63 Configure the Appliance Configure the Primary Node Enter the configuration values for NETWORK ADAPTER #2, as shown in the table below. Table 18: Primary Node Entries for Network Adapter #2: 1-Gbps GUI Port (enp1s0f0) Host IP address Enter the IP address for the 1-Gbps GUI Port. This is required only if you are using the GUI Port to access the Cisco DNA Center GUI from your management network; otherwise, you can leave it blank. Netmask Enter the netmask for the port's IP address. This is required if you enter an IP address. Default Gateway IP address Enter a default gateway IP address to use for the port. Important Ensure that you enter a default gateway IP address for at least one of your appliance's interfaces. Otherwise, you will not be able to complete the configuration wizard. DNS Servers Enter the IP address of the preferred DNS server. If you are entering multiple DNS servers, separate the IP addresses in the list with spaces. Important • For NTP, ensure port 123 (UDP) is open between Cisco DNA Center and your NTP server. • For each appliance in your cluster, configure a maximum of three DNS servers. Problems can occur if you configure more than three DNS servers for an appliance. Static Routes Enter one or more static routes in the following format, separated by spaces: <network>/<netmask>/<gateway>. Cluster Link Leave this field blank. It is required on the Cluster port only. After you provide the necessary information, click next>> to proceed. Correct any validation errors as you did in previous screens. Step 7 After successful validation of the Cisco DNA Center GUI port values you entered, the wizard presents the 1-Gbps Cloud port (2, enp1s0f1) as NETWORK ADAPTER #3. As explained in Interface Cable Connections, this is an optional port used to link the appliance to the Internet when you cannot do so through the 10-Gbps Enterprise port (Port 1, enp9s0). Apply the host IP address, netmask, and other values that are appropriate for this purpose (see Required IP Addresses and Subnets and Required Configuration Information for the values to enter). Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 64 Configure the Appliance Configure the Primary Node Enter the configuration values for NETWORK ADAPTER #3, as shown in the table below. Table 19: Primary Node Entries for Network Adapter #3: 1-Gbps Cloud Port (enp1s0f1) Host IP address Enter the IP address for the Cloud port. This is required only if you are using the Cloud port for internet connection; otherwise, you can leave it blank. Netmask Enter the netmask for the port's IP address. This is required if you enter an IP address. Default Gateway IP address Enter a default gateway IP address to use for the Cloud port. Important Ensure that you enter a default gateway IP address for at least one of your appliance's interfaces. Otherwise, you will not be able to complete the configuration wizard. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 65 Configure the Appliance Configure the Primary Node DNS Servers Enter the IP address of the preferred DNS server. If you are entering multiple DNS servers, separate the IP addresses in the list with spaces. Important For each appliance in your cluster, configure a maximum of three DNS servers. Problems can occur if you configure more than three DNS servers for an appliance. Static Routes Enter one or more static routes in the following format, separated by spaces: <network>/<netmask>/<gateway>. This is usually required on the Cisco DNA Center GUI port only. Cluster Link Leave this field blank. It is required on the Cluster port only. After you provide the necessary information, click next>> to proceed. Correct any validation errors as you did in previous screens. Step 8 After successful validation of the Cloud port values you entered, the wizard presents the 10-Gbps Enterprise port (Port 1, enp9s0) as NETWORK ADAPTER #4. As explained in Interface Cable Connections, this port is required to link the appliance to the enterprise network. Apply the host IP address, netmask, and other values that are appropriate for this purpose, (see Required IP Addresses and Subnets and Required Configuration Information for the values to enter). Enter the configuration values for NETWORK ADAPTER #4, as shown in the table below. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 66 Configure the Appliance Configure the Primary Node Table 20: Primary Node Entries for Network Adapter #4: 10-Gbps Enterprise Port (enp9s0) Host IP address Enter the IP address for the 10-Gbps Enterprise port. This is required. Netmask Enter the netmask for the port's IP address. This is required. Default Gateway IP address Enter a default gateway IP address to use for the port. Important Ensure that you enter a default gateway IP address for at least one of your appliance's interfaces. Otherwise, you will not be able to complete the configuration wizard. DNS Servers Enter the IP address of the preferred DNS server. If you are entering multiple DNS servers, separate the IP addresses in the list with spaces. Important For each appliance in your cluster, configure a maximum of three DNS servers. Problems can occur if you configure more than three DNS servers for an appliance. Static Routes Enter one or more static routes in the following format, separated by spaces: <network>/<netmask>/<gateway>. This is usually required on the Cisco DNA Center GUI port only. Cluster Link Leave this field blank. It is required on the Cluster port only. After you provide the necessary information, click next>> to proceed. Correct validation errors, if any, as you did in previous screens. The wizard validates and applies your network adapter configurations. Step 9 After the network adapter configuration is complete, the wizard prompts you to enter configuration values for the NETWORK PROXY you are using, as shown below. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 67 Configure the Appliance Configure the Primary Node Enter the configuration values for the NETWORK PROXY, as shown in the table below. Table 21: Primary Node Entries for Network Proxy HTTPS Proxy Enter the URL or host name of an HTTPS network proxy used to access the Internet. Note Connection from Cisco DNA Center to the HTTPS proxy is supported only via HTTP in this release. HTTPS Proxy Username Enter the user name used to access the network proxy. If no proxy login is required, leave this field blank. HTTPS Proxy Password Enter the password used to access the network proxy. If no proxy login is required, leave this field blank. After you provide the necessary information, click next>> to proceed. Correct validation errors, if any, as you did in previous screens. Step 10 After network proxy configuration completes, the wizard prompts you to enter virtual IP addresses for the primary node, in MAGLEV CLUSTER DETAILS, as shown below. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 68 Configure the Appliance Configure the Primary Node Enter a space-separated list of the virtual IP addresses used for traffic between the cluster and your network. This is required for both three-node clusters and single-node clusters that will be converted into a three-node cluster in the future. If you have a single-node cluster setup and plan to stick with it, skip this step and proceed to Step 11. Important You must enter one virtual IP address for each configured network interface. You will not be able to complete the wizard unless you do so. These addresses are tied to the cluster link's status, which must be in the UP state. You also have the option to specify the fully qualified domain name (FQDN) for your cluster. Cisco DNA Center uses this domain name to do the following: • It uses this hostname to access your cluster’s web interface and the Representational State Transfer (REST) APIs used by devices in the enterprise network that Cisco DNA Center manages. • In the Subject Alternative Name (SAN) field of Cisco DNA Center certificates, it uses the FQDN to the define the Plug and Play server that should be used for device provisioning. After you provide the necessary information, click next>> to proceed. Correct validation errors, if any, as you did in previous screens. Step 11 After you have entered the virtual IP addresses, the wizard prompts you to enter USER ACCOUNT SETTINGS values, as shown below. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 69 Configure the Appliance Configure the Primary Node Enter the values for USER ACCOUNT SETTINGS, as shown in the table below. Table 22: Primary Node Entries for User Account Settings Linux Password Enter a Linux password for the maglev user. Re-enter Linux Password Confirm the Linux password by entering it a second time. Password Generation Seed If you do not want to create the Linux password yourself, enter a seed phrase in this field and then press <Generate Password> to generate the password. Auto Generated Password (Optional) The seed phrase appears as part of a random and secure password. If desired, you can either use this password "as is", or you can further edit this auto-generated password. Press <Use Generated Password> to save the password. Administrator Passphrase Enter a password for the default admin superuser, used to log in to Cisco DNA Center for the first time. Re-enter Administrator Passphrase Confirm the administrator passphrase by entering it a second time. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 70 Configure the Appliance Configure the Primary Node After you provide the necessary information, click next>> to proceed. Correct validation errors, if any, as you did in previous screens. Step 12 After you have entered the user account details, the wizard prompts you to enter NTP SERVER SETTINGS values, as shown below. Enter one or more NTP server addresses or hostnames, separated by spaces. At least one NTP address or hostname is required. For a production deployment, we recommend that you configure a minimum of three NTP servers. After you provide the necessary information, click next>> to proceed. Correct validation errors, if any, as you did in previous screens. The wizard validates and applies your NTP server configuration. Step 13 After you have specified the appropriate NTP servers, the wizard prompts you to enter MAGLEV ADVANCED SETTINGS values, as shown below. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 71 Configure the Appliance Configure the Primary Node Enter the configuration values for MAGLEV ADVANCED SETTINGS, as shown in the table below. Table 23: Primary Node Entries for Maglev Advanced Settings Services Subnet Enter a dedicated IP subnet for Cisco DNA Center to use in managing its own services. Cluster Services Subnet Enter a dedicated IP subnet for Cisco DNA Center to use in managing its clustering services. When you are finished, click next>> to proceed. Correct validation errors, if any, as you did in previous screens. Step 14 After you have entered the Maglev advanced settings, a final message appears, stating that the wizard is ready to apply the configuration (as shown below). Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 72 Configure the Appliance Configure Add-On Nodes Click proceed>> to complete the configuration wizard. The host will reboot automatically and display messages on the KVM console as it applies your settings and brings up services. This process can take several hours. You can monitor its progress via the KVM console. At the end of the configuration process, the appliance power-cycles again, then displays a CONFIGURATION SUCCEEDED! message. What to do next • If you are deploying this appliance in standalone mode only, perform the first-time setup: First-Time Setup Workflow. • If you are deploying this appliance as the primary node in a cluster, configure the second and third installed appliances in the cluster: Configure Add-On Nodes. Configure Add-On Nodes Perform the steps in this procedure to configure the second and third appliances in the cluster. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 73 Configure the Appliance Configure Add-On Nodes Important In order to build a three-node cluster, the same version of the System package must be installed on your three Cisco DNA Center appliances. Otherwise, unexpected behavior and possible downtime can occur. Note Ensure that all of the IP addresses you enter while completing this procedure are valid IPv4 addresses with valid IPv4 netmasks. Also make sure that the addresses and their corresponding subnets do not overlap. Service communication issues can result if they do. When joining each new add-on node to the cluster, you must specify the first host in the cluster as the primary node. Note the following when joining add-on nodes to a cluster: • Be sure to join only a single node to the cluster at a time. Do not attempt to add multiple nodes at the same time, because this results in unpredictable behavior. • Before adding a new node to the cluster, be sure that all the installed packages are deployed on the primary node. You can check this by using SSH to log in to the primary node's Cisco DNA Center GUI port as the Linux User (maglev) and then running the maglev package status command. All the installed packages should appear in the command output as DEPLOYED. In the following example, the application-policy, sd-access, sensor-assurance, and sensor-automation packages were not installed; therefore, they are the only packages whose status is NOT_DEPLOYED. Your package status should look similar to this before you configure an add-on node: $ ssh [email protected] -p 2222 The authenticity of host '[172.29.131.14]:2222 ([172.29.131.14]:2222)' can't be established. ECDSA key fingerprint is SHA256:scye+2ll6NFHAkOZDs0cNLHBR75j1KV3ZXIKuUaiadk. Are you sure you want to continue connecting (yes/no)? yes Warning: Permanently added '[172.29.131.14]:2222' (ECDSA) to the list of known hosts. Welcome to the Maglev Appliance [email protected]'s password: Welcome to the Maglev Appliance System information as of Thu Dec 20 03:07:13 UTC 2018 System load: 4.08 Usage of /: 59.8% of 28.03GB Memory usage: 21% Swap usage: 0% Processes: 831 Users logged in: 0 IP IP IP IP IP address address address address address for for for for for enp9s0: 17.192.1.14 enp10s0: 192.192.192.14 enp1s0f0: 172.29.131.14 docker0: 169.254.0.1 tun10: 10.60.3.0 To run a command as administrator (user "root"), use "sudo <command>". See "man sudo_root" for details. [Thu Dec 20 03:07:13 UTC] [email protected] $ maglev package status [administration] password for 'admin': maglev-1 [main - https://kong-frontend.maglev-system.svc.cluster.local:443] NAME DEPLOYED AVAILABLE STATUS ----------------------------------------------------------------------------------application-policy 2.1.10.170000 NOT_DEPLOYED assurance 1.0.5.686 1.1.8.1440 DEPLOYED automation-core 2.1.8.60044 2.1.12.60011 DEPLOYED Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 74 Configure the Appliance Configure Add-On Nodes base-provision-core command-runner device-onboarding image-management ncp-system ndp-base-analytics ndp-platform ndp-ui network-visibility path-trace sd-access sensor-assurance sensor-automation system 2.1.8.60044 2.1.8.60044 2.1.8.60044 2.1.8.60044 2.1.8.60044 1.0.7.878 1.0.7.829 1.0.7.956 2.1.8.60044 2.1.8.60044 1.0.4.807 2.1.12.60016 2.1.9.60029 2.1.12.60016 2.1.12.60011 2.1.9.60029 1.0.7.908 1.0.7.866 1.0.7.975 2.1.12.60016 2.1.12.60016 2.1.12.60016 1.1.5.40 2.1.9.60029 1.0.4.855 DEPLOYED DEPLOYED DEPLOYED DEPLOYED DEPLOYED DEPLOYED DEPLOYED DEPLOYED DEPLOYED DEPLOYED NOT_DEPLOYED NOT_DEPLOYED NOT_DEPLOYED DEPLOYED • Expect some service downtime during the cluster attachment process for each add-on node. Services will need to be redistributed across the nodes and the cluster will be down for periods of time during that process. Before you begin Ensure that you: • Configured the first appliance in the cluster, following the steps in Configure the Primary Node. • Collected all of the information specified in Required IP Addresses and Subnets and Required Configuration Information. • Installed the second and third appliances, as described in Appliance Installation Workflow. • Have done the following: 1. Ran the maglev package status command on the first appliance. You can also access this information from the Cisco DNA Center home page by clicking the Help icon ( ) and choosing About > Show Packages. 2. Contacted the Cisco TAC, gave them the output of this command, and asked them to point you to the ISO that you should install on your second and third appliances. • Configured Cisco IMC browser access on both the add-on appliances, as described in Enable Browser Access to Cisco Integrated Management Controller. • Checked that both the add-on node appliances' ports, and the switches they use, are properly configured, as described in Execute Preconfiguration Checks. • Confirmed that you are using a compatible browser. For a list of compatible browsers, see the Release Notes document for the version of Cisco DNA Center you are installing. • Enabled ICMP on the firewall between Cisco DNA Center and the DNS server you specify in Step 8 of the following procedure. The Maglev Configuration wizard uses ping to verify the DNS server you specify. This ping might get blocked if there is a firewall between Cisco DNA Center and the DNS server, and ICMP is not enabled on that firewall. When this happens, you will not be able to complete the wizard. Step 1 Point your browser to the Cisco IMC IP address you set during the Cisco IMC GUI configuration you performed, and log in to the Cisco IMC GUI as the Cisco IMC user (see Enable Browser Access to Cisco Integrated Management Controller). Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 75 Configure the Appliance Configure Add-On Nodes After successful login, the appliance displays the Cisco Integrated Management Controller Chassis Summary window, with a hyperlinked menu at the top of the window, as shown below. Step 2 From the hyperlinked menu, choose Launch KVM and then select either Java based KVM or HTML based KVM. If you select Java-based KVM, you will need to launch the Java startup file from your browser or file manager in order to view the KVM console in its own window. If you select HMTL-based KVM, it launches the KVM console in a separate window or tab automatically. Irrespective of the KVM type you choose, use the KVM console to monitor the progress of the configuration and respond to the Maglev Configuration wizard prompts. Step 3 With the KVM displayed, reboot the appliance by choosing one of the following options: • In the main Cisco IMC GUI browser window: Choose Host Power > Power Cycle, and switch to the KVM console to continue. • In the KVM console: Choose Power > Power Cycle System (cold boot). If you are asked to confirm your choice to reboot the appliance, click OK. After displaying reboot messages, the KVM console displays the Maglev Configuration wizard welcome screen. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 76 Configure the Appliance Configure Add-On Nodes Step 4 Click Join a Cisco DNA Center Cluster to begin configuring the add-on node. The wizard discovers all of the ports on the appliance and presents them to you one by one, in separate screens, in the following order: a. 10-Gbps Cluster port (Port 2, enp10s0, Network Adapter #1) b. 1-Gbps Cisco DNA Center GUI port (1, enp1s0f0, Network Adapter #2) c. 1-Gbps Cloud port (2, enp1s0f1, Network Adapter #3) d. 10-Gbps Enterprise port (Port 1, enp9s0, Network Adapter #4) Note Step 5 If the wizard fails to display one or both of the 10-Gbps ports during the course of configuration,it might indicate that these ports are nonfunctional or disabled. These 10-Gbps ports are required for Cisco DNA Center functionality. If you discover that they are nonfunctional, choose cancel to exit the configuration wizard immediately. Be sure that you have completed all of the steps provided in Execute Preconfiguration Checks before resuming the configuration or by contacting the Cisco Technical Assistance Center (for more information, see the "Get Assistance from the Cisco TAC" topic in the Release Notes document). The wizard discovers the 10-Gbps Cluster port (Port 2, enp10s0) first, and presents it as NETWORK ADAPTER #1. As explained in Interface Cable Connections, this port is used to link the appliance to the cluster, so apply the host IP address, netmask, and other values that are appropriate for this purpose (see Required IP Addresses and Subnets and Required Configuration Information for the values to enter). Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 77 Configure the Appliance Configure Add-On Nodes Enter configuration values for NETWORK ADAPTER #1 as shown in the table below. Table 24: Add-On Node Entries for Network Adapter #1: 10-Gbps Cluster Port (enp10s0) Host IP address Enter the IP address for the Cluster port. This is required. Note that you cannot change the address of the Cluster port later. Netmask Enter the netmask for the port's IP address. This is required. Default Gateway IP address Enter a default gateway IP address to use for the port. Important Ensure that you enter a default gateway IP address for at least one of your appliance's interfaces. Otherwise, you will not be able to complete the configuration wizard. DNS Servers Enter the IP address of the preferred DNS server. If you are entering multiple DNS servers, separate the IP addresses in the list with spaces. Important For each appliance in your cluster, configure a maximum of three DNS servers. Problems can occur if you configure more than three DNS servers for an appliance. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 78 Configure the Appliance Configure Add-On Nodes Static Routes Enter one or more static routes in the following format, separated by spaces: <network>/<netmask>/<gateway>. This is usually required on the Cisco DNA Center GUI port only. Cluster Link Check the check box to indicate that this port will be the link to a cluster. This is required on the Cluster port only. After you finish entering the configuration values, click next>> to proceed. The wizard validates the values you entered and issues an error message if any are incorrect. If you receive an error message, check that the value you entered is correct, then reenter it. If needed, click <<back to reenter it. Step 6 After successful validation of the Cluster port values you entered, the wizard presents the 1-Gbps Cisco DNA Center GUI port (1, enp1s0f0) as NETWORK ADAPTER #2. As explained in Interface Cable Connections, this port is used to access the Cisco DNA Center GUI from your management network. Apply the host IP address, netmask, and other values that are appropriate for this purpose (see Required IP Addresses and Subnets and Required Configuration Information for the values to enter). Enter the configuration values for NETWORK ADAPTER #2, as shown in the table below. Table 25: Add-On Node Entries for Network Adapter #2: 1-Gbps GUI Port (enp1s0f0) Host IP address Enter the IP address for the 1-Gbps GUI Port. This is required only if you are using the GUI Port to access the Cisco DNA Center GUI from your management network; otherwise, you can leave it blank. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 79 Configure the Appliance Configure Add-On Nodes Netmask Enter the netmask for the port's IP address. This is required if you enter an IP address. Default Gateway IP address Enter a default gateway IP address to use for the port. Important Ensure that you enter a default gateway IP address for at least one of your appliance's interfaces. Otherwise, you will not be able to complete the configuration wizard. DNS Servers Enter the IP address of the preferred DNS server. If you are entering multiple DNS servers, separate the IP addresses in the list with spaces. Important • For NTP, ensure port 123 (UDP) is open between Cisco DNA Center and your NTP server. • For each appliance in your cluster, configure a maximum of three DNS servers. Problems can occur if you configure more than three DNS servers for an appliance. Static Routes Enter one or more static routes in the following format, separated by spaces: <network>/<netmask>/<gateway>. Cluster Link Leave this field blank. It is required on the Cluster port only. After you provide the necessary information, click next>> to proceed. Correct validation errors, if any, as you did in previous screens. Step 7 After successful validation of the Cisco DNA Center GUI port values you entered, the wizard presents the 1-Gbps Cloud port (2, enp1s0f1) as NETWORK ADAPTER #3. As explained in Interface Cable Connections, this is an optional port used to link the appliance to the Internet when you cannot do so through the 10-Gbps Enterprise port (Port 1, enp9s0). Apply the host IP address, netmask, and other values that are appropriate for this purpose (see Required IP Addresses and Subnets and Required Configuration Information for the values to enter). Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 80 Configure the Appliance Configure Add-On Nodes Enter the configuration values for NETWORK ADAPTER #3, as shown in the table below. Table 26: Add-On Node Entries for Network Adapter #3: 1-Gbps Cloud Port (enp1s0f1) Host IP address Enter the IP address for the Cloud port. This is required only if you are using the Cloud port for internet connection; otherwise, you can leave it blank. Netmask Enter the netmask for the port's IP address. This is required if you enter an IP address. Default Gateway IP address Enter a default gateway IP address to use for the Cloud port. Important Ensure that you enter a default gateway IP address for at least one of your appliance's interfaces. Otherwise, you will not be able to complete the configuration wizard. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 81 Configure the Appliance Configure Add-On Nodes DNS Servers Enter the IP address of the preferred DNS server. If you are entering multiple DNS servers, separate the IP addresses in the list with spaces. Important For each appliance in your cluster, configure a maximum of three DNS servers. Problems can occur if you configure more than three DNS servers for an appliance. Static Routes Enter one or more static routes in the following format, separated by spaces: <network>/<netmask>/<gateway>. This is usually required on the GUI port only. Cluster Link Leave this field blank. It is required on the Cluster port only. After you provide the necessary information, click next>> to proceed. Correct validation errors, if any, as you did in previous screens. Step 8 After successful validation of the Cloud port values you entered, the wizard presents the 10-Gbps Enterprise port (Port 1, enp9s0) as NETWORK ADAPTER #4. As explained in Interface Cable Connections, this port is required to link the appliance to the enterprise network. Apply the host IP address, netmask, and other values that are appropriate for this purpose (see Required IP Addresses and Subnets and Required Configuration Information for the values to enter). Enter the configuration values for NETWORK ADAPTER #4, as shown in the table below. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 82 Configure the Appliance Configure Add-On Nodes Table 27: Add-On Node Entries for Network Adapter #4: 10-Gbps Enterprise Port (enp9s0) Host IP address Enter the IP address for the 10-Gbps Enterprise port. This is required. Netmask Enter the netmask for the port's IP address. This is required. Default Gateway IP address Enter a default gateway IP address to use for the port. Important Ensure that you enter a default gateway IP address for at least one of your appliance's interfaces. Otherwise, you will not be able to complete the configuration wizard. DNS Servers Enter the IP address of the preferred DNS server. If you are entering multiple DNS servers, separate the IP addresses in the list with spaces. Important For each appliance in your cluster, configure a maximum of three DNS servers. Problems can occur if you configure more than three DNS servers for an appliance. Static Routes Enter one or more static routes in the following format, separated by spaces: <network>/<netmask>/<gateway>. This is usually required on the GUI port only. Cluster Link Leave this field blank. It is required on the Cluster port only. After you provide the necessary information, click next>> to proceed. Correct validation errors, if any, as you did in previous screens. Step 9 After the network adapter configuration is complete, the wizard prompts you to enter configuration values for the NETWORK PROXY that you are using, as shown below. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 83 Configure the Appliance Configure Add-On Nodes Enter the configuration values for the NETWORK PROXY, as shown in the table below. Table 28: Add-On Node Entries for Network Proxy HTTPS Proxy Enter the URL or host name of an HTTPS network proxy used to access the Internet. Note Connection from Cisco DNA Center to the HTTPS proxy is supported only through HTTP in this release. HTTPS Proxy Username Enter the user name used to access the network proxy. If no proxy login is required, leave this field blank. HTTPS Proxy Password Enter the password used to access the network proxy. If no proxy login is required, leave this field blank. After you provide the necessary information, click next>> to proceed. Correct validation errors, if any, as you did in previous screens. Step 10 After network proxy configuration completes, the wizard prompts you to identify the Cluster port on the primary node, and primary node login details, in MAGLEV CLUSTER DETAILS, as shown below. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 84 Configure the Appliance Configure Add-On Nodes Enter the values for MAGLEV CLUSTER DETAILS , as shown in the table below. Table 29: Add-On Node Entries for Maglev Cluster Details Maglev Node Enter the IP address of the Cluster port on the primary node in the cluster. If you have followed the recommendations for port assignment, this will be the IP address of Port 2, enp10s0, Network Adapter #1 on the primary node. Username Enter maglev. Password Enter the Linux password you configured on the primary node. After you provide the necessary information, click next>> to proceed. Correct validation errors, if any, as you did in previous screens. Step 11 After you have entered the Maglev cluster details, the wizard prompts you to enter USER ACCOUNT SETTINGS values for this add-on node, as shown below. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 85 Configure the Appliance Configure Add-On Nodes Enter the values for USER ACCOUNT SETTINGS, as shown in the table below. Table 30: Add-On Node Entries for User Account Settings Linux Password Enter a Linux password for the maglev user. Re-enter Linux Password Confirm the Linux password by entering it a second time. Password Generation Seed If you do not want to create the Linux password yourself, enter a seed phrase in this field and then press <Generate Password> to generate the password. Auto Generated Password (Optional) The seed phrase appears as part of a random and secure password. If required, you can either use this password as is, or you can further edit this auto-generated password. Click <Use Generated Password> to save the password. Administrator Passphrase Enter a password for the default admin superuser, used to log in to Cisco DNA Center for the first time. Re-enter Administrator Passphrase Confirm the administrator passphrase by entering it a second time. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 86 Configure the Appliance Configure Add-On Nodes After you provide the necessary information, click next>> to proceed. Correct validation errors, if any, as you did in previous screens. Step 12 After you have entered the user account details, the wizard prompts you to enter NTP SERVER SETTINGS values, as shown below. Enter one or more NTP server addresses or hostnames, separated by spaces. At least one NTP address or hostname is required. They should be the same NTP servers you specified for the primary node. After you provide the necessary information, click next>> to proceed. Correct validation errors, if any, as you did in previous screens. Step 13 When you are finished entering the NTP server settings, a final message appears, stating that the wizard is ready to apply the configuration (as shown below). Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 87 Configure the Appliance Upgrade to the Latest Cisco DNA Center Release Click proceed>> to complete the configuration wizard. The host will reboot automatically and display messages on the KVM console as it applies your settings and brings up services. This process can take several hours. You can monitor its progress via the KVM console. At the end of the configuration process, the appliance power-cycles again, then displays a CONFIGURATION SUCCEEDED! message. What to do next • If you have an additional appliance to deploy as the third and final node in the cluster, repeat this procedure. • If you have finished adding hosts to the cluster, perform the first-time setup: First-Time Setup Workflow. Upgrade to the Latest Cisco DNA Center Release For information about upgrading your current release of Cisco DNA Center, see the Cisco DNA Center Upgrade Guide. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 88 CHAPTER 6 Complete First-Time Setup • First-Time Setup Workflow, on page 89 • Compatible Browsers, on page 89 • Log In for the First Time, on page 89 • Integrate Cisco ISE with Cisco DNA Center, on page 92 • Configure Authentication and Policy Servers, on page 97 • Configure SNMP Properties, on page 99 First-Time Setup Workflow After you finish configuring all of the Cisco DNA Center appliances you have installed, perform the tasks described in this chapter to prepare Cisco DNA Center for production use. Note the following points: • For the parameter information you need to complete this work, see Required First-Time Setup Information. • If you have deployed high availability (HA) in your production environment, you will also need to redistribute services among your cluster nodes to optimize HA operation (see Redistribute Services). Complete this step after you have configured the SNMP settings for your appliances. Compatible Browsers The Cisco DNA Center GUI is compatible with the following HTTPS-enabled browsers: • Google Chrome: Version 62.0 or later. • Mozilla Firefox: Version 54.0 or later. We recommend that the client systems you use to log in to Cisco DNA Center be equipped with 64-bit operating systems and browsers. Log In for the First Time After you have installed and configured the Cisco DNA Center appliance, you can log in to its GUI. Use a compatible, HTTPS-enabled browser when accessing Cisco DNA Center. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 89 Complete First-Time Setup Log In for the First Time When you log in for the first time as the admin superuser (with the username admin and the SUPER-ADMIN-ROLE assigned), you are asked to complete a first-time setup wizard that helps you enhance system security and complete the essential setup tasks. Although you can skip each of the steps in the wizard, we recommend that you complete all of them as indicated, so that your system is ready for use as soon as possible. You should also create new Cisco DNA Center users. We recommend that you create at least one additional user account to be used for daily operations, and that this user account have the NETWORK-ADMIN-ROLE. Before you begin To log in to Cisco DNA Center and complete the first-time setup wizard, you will need: • The admin superuser username and password you specified when following the steps in Configure the Primary Node. • The requisite information, as described in Required First-Time Setup Information. Step 1 After the Cisco DNA Center appliance reboot is completed, launch your browser. Step 2 Enter the host IP address to access the Cisco DNA Center GUI, using HTTPS:// and the IP address of the Cisco DNA Center GUI that was displayed at the end of the configuration process. After entering the IP address, one of the following messages appears (depending on the browser you are using): • Google Chrome: Your connection is not private • Mozilla Firefox: Warning: Step 3 Potential Security Risk Ahead Ignore the message and click Advanced. One of the following messages appears: • Google Chrome: This server could not prove that it is GUI-IP-address; its security certificate is not trusted by your computer's operating system. This may be caused by a misconfiguration or an attacker intercepting your connection. • Mozilla Firefox: Someone could be trying to impersonate the site and you should not continue. Websites prove their identity via certificates. Firefox does not trust GUI-IP-address because its certificate issuer is unknown, the certificate is self-signed, or the server is not sending the correct intermediate certificates. These messages appear because the controller uses a self-signed certificate. For information on how Cisco DNA Center uses certificates, see the "Certificate and Private Key Support" section in the Cisco Digital Network Architecture Center Administrator Guide. Step 4 Ignore the message and do one of the following: • Google Chrome: Click the Proceed to GUI-IP-address (unsafe) link. • Mozilla Firefox: Click Accept the Risk and Continue. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 90 Complete First-Time Setup Log In for the First Time The Cisco DNA Center Login window appears. Step 5 In the Login window, enter the admin's username (admin) and password that you set when you configured Cisco DNA Center, then click Log In. The Reset Login window appears. Step 6 Enter the old password, enter and confirm a new password for the admin superuser, and then click Save. The Enter Cisco.com ID window appears. Step 7 Enter the username and password for the cisco.com user, then click Next. If the cisco.com user login does not match any known Cisco Smart Account user login, the Smart Account window appears. Step 8 If the Smart Account window appears, enter the username and password for your organization's Smart Account, or click the corresponding link to open a new Smart Account. After you are finished, click Next. The IP Address Manager window appears. Step 9 If your organization uses an external IP address manager (IPAM), do the following and then click Next: • Enter your IPAM server's name and URL. • Enter the username and password required for server access. • Choose your IPAM provider (such as Infoblox). • Choose the specific view of IP addresses available in the IPAM server database that you want Cisco DNA Center to use. The Enter Proxy Server window appears. Step 10 Enter the proxy server information your organization will use, then click Next: • Include the server username and password if your proxy server requires a login. • To validate this information before proceeding (recommended), ensure that the Validate Settings check box is checked. The software EULA window appears. Step 11 Click Next to accept the software End User License Agreement and continue. The Ready to go! window appears. Step 12 Click any of the links in this window, or click Go to System 360 to display the System 360 dashboard and start using Cisco DNA Center. We recommend that you click the User Management link to display the User Management window. Then click Add to begin adding new Cisco DNA Center users. After you have entered the new user's name and password, and selected the user's role, click Save to create the new user. Repeat this as needed until you have added all the new users for your initial deployment. Be sure to create at least one user with the NETWORK-ADMIN-ROLE. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 91 Complete First-Time Setup Integrate Cisco ISE with Cisco DNA Center What to do next Complete other administrative setup tasks, in any order: • Integrate Cisco ISE with Cisco DNA Center • Configure Authentication and Policy Servers • Configure SNMP Properties Integrate Cisco ISE with Cisco DNA Center This release of Cisco DNA Center provides a mechanism to create a trusted communications link with Cisco ISE and permits Cisco DNA Center to share data with Cisco ISE in a secure manner. After Cisco ISE is registered with Cisco DNA Center, any device that Cisco DNA Center discovers, along with relevant configuration and other data, is pushed to Cisco ISE. Users can use Cisco DNA Center to discover devices and then apply both Cisco DNA Center and Cisco ISE functions to them because these devices are exposed in both applications. Cisco DNA Center and Cisco ISE devices are all uniquely identified by their device names. As soon as they are provisioned and belong to a particular site in the Cisco DNA Center site hierarchy, Cisco DNA Center devices are pushed to Cisco ISE. Any updates to a Cisco DNA Center device (such as changes to IP address, SNMP or CLI credentials, Cisco ISE shared secret, and so on) will flow to the corresponding device instance on Cisco ISE automatically. Note that Cisco DNA Center devices are pushed to Cisco ISE only when these devices are associated with a particular site where Cisco ISE is configured as its AAA server. Before you begin Before attempting to integrate Cisco ISE with Cisco DNA Center, ensure that you have met the following prerequisites: • You have deployed one or more Cisco ISE version 2.3 (and later) hosts on your network. For information on installing Cisco ISE, see the Cisco Identity Services Engine Install and Upgrade guides for version 2.3 and later. • If you have a standalone Cisco ISE deployment, you must integrate with the Cisco ISE node and enable the pxGrid service and External RESTful Services (ERS) on that node. Note Cisco ISE 2.4 and later supports pxGrid 2.0 as well as pxGrid 1.0. Although pxGrid 2.0 allows up to four pxGrid nodes in the Cisco ISE deployment, Cisco DNA Center releases earlier than 2.2.1.x do not support more than two pxGrid nodes. • If you have a distributed Cisco ISE deployment: • You must integrate Cisco DNA Center with the Cisco ISE admin node, the primary Policy Administration node (PAN), and enable ERS on the primary PAN. You must also enable ERS in your secondary PAN. In the case of a primary PAN failover in Cisco ISE, if ERS is not enabled in the secondary PAN, the secondary PAN is not available to Cisco DNA Center. As a result, the connection between Cisco DNA Center and Cisco ISE is affected. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 92 Complete First-Time Setup Integrate Cisco ISE with Cisco DNA Center Note As a best practice, use ERS through the PAN. But for backup, enable ERS on the Policy Service nodes (PSNs). • As with single-node deployments, you must enable the pxGrid service on one of the Cisco ISE nodes within the distributed deployment. Although you can choose to do so, you do not have to enable pxGrid on the PAN. You can enable pxGrid on any of the other Cisco ISE nodes in your distributed deployment. • The PSNs you configure in Cisco ISE to handle TrustSec/SD Access content and PACs must also be defined in Work Centers > Trustsec > Trustsec Servers > Trustsec AAA Servers. For more information, see the Segmentation document in the Administrator Workflow for your release of Cisco ISE. • You have enabled communication between Cisco DNA Center and Cisco ISE on the following ports: 22, 443, 5222, 8910, and 9060. • The Cisco ISE host on which pxGrid is enabled must be reachable from Cisco DNA Center on the IP address of the Cisco ISE eth0 interface. • The Cisco ISE node can reach the fabric underlay network via the appliance's NIC. • The Cisco ISE admin node certificate must contain the Cisco ISE IP address or FQDN in either the certificate subject name or the Subject Alternative Name (SAN). • The Cisco DNA Center system certificate must list both the Cisco DNA Center appliance IP address and FQDN in the SAN field. Note For Cisco ISE 2.4 Patch 13, 2.6 Patch 7, and 2.7 Patch 3, if you are using the Cisco ISE default self-signed certificate as the pxGrid certificate, Cisco ISE might reject that certificate after applying those patches. This is because the older versions of that certificate have the Netscape Cert Type extension specified as the SSL server, which now fails (because a client certificate is required). This issue does not occur in Cisco ISE 3.0 and later. For details and a suggested workaround, see the Cisco ISE Release Notes. For more information about configuring Cisco ISE for Cisco DNA Center, see Integration with Cisco DNA Center in the Cisco ISE Administrators Guide. Step 1 Enable the Cisco ISE pxGrid service and ERS: a) Log in to the Cisco ISE primary policy administration node. b) Choose Administration > System > Deployment. The Deployment Nodes window opens. c) Click the hostname of the Cisco ISE node on which you want to enable pxGrid services. In a distributed deployment, this can be any Cisco ISE node in the deployment. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 93 Complete First-Time Setup Integrate Cisco ISE with Cisco DNA Center The Edit Node window opens, with the General Settings tab selected by default. d) e) f) g) h) Step 2 Ensure that the pxGrid check box is checked, then click Save. Choose Administration > System > Settings. From the left navigation pane, click ERS Settings to open the ERS Settings window. Click the Enable ERS for Read/Write radio button, then click OK in the notification prompt. Click Save. Add the Cisco ISE node to Cisco DNA Center as a AAA server: a) Log in to the Cisco DNA Center GUI. b) Click the Menu icon ( ) and choose System > System 360. c) In the Identity Services Engine (ISE) pane, click the Configure link. d) From the Authentication and Policy Servers window, click Add and choose ISE from the drop-down list. e) Complete the following tasks in the Add AAA/ISE server slide-in pane: • In the Server IP Address field, enter the Cisco ISE management IP address. • Enter the Shared Secret used to secure communications between your network devices and Cisco ISE. • In the Username and Password fields, enter the corresponding Cisco ISE admin credentials. • Enter the FQDN for the Cisco ISE node. • (Optional) Enter the virtual IP address of the load balancer behind which the Cisco ISE PSNs are located. If you have multiple policy service node farms behind different load balancers, you can enter a maximum of six virtual IP addresses. f) Click Add. The first time integration with Cisco ISE is initiated, you will see a notification that the certificate from Cisco ISE is not yet trusted. • You can view the certificate to see the details. • Choose Accept to trust the certificate and continue with the integration process. If you do not wish to trust the certificate and terminate the integration process, choose Decline. After the integration completes successfully, a confirmation message is displayed. If any problem is encountered in the integration process, a message is shown with details of the problem. An option to edit or retry is shown where possible. • If the error message says that the Cisco ISE Admin credentials are invalid, click Edit and re-enter the correct information. • If errors are found with certificates in the integration process, you must delete the Cisco ISE server entry and restart the integration from the beginning after the certificate issue has been resolved. Step 3 Verify that Cisco DNA Center is connected to Cisco ISE, and that the Cisco ISE SGT groups and devices are being pushed to Cisco DNA Center: a) Log in to the Cisco DNA Center GUI. b) Click the Menu icon ( ) and choose System > System 360. c) In the Identity Services Engine (ISE) pane, click the Update link. d) From the Authentication and Policy Servers window, verify that the status of the Cisco ISE AAA server is still Active. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 94 Complete First-Time Setup Group-Based Access Control: Policy Data Migration and Synchronization Step 4 Verify that Cisco ISE is connected to Cisco DNA Center and that the connection has subscribers: a) Log in to the Cisco ISE nodes that are shown as pxGrid servers in the Cisco Identity Services Engine (ISE) Deployment window. b) Choose Administration > pxGrid Services and click the Web Clients tab. You should see two pxGrid clients in the list with the IP address of the Cisco DNA Center server. Group-Based Access Control: Policy Data Migration and Synchronization When You Start Using Cisco DNA Center 1.3.3.0 In previous releases of Cisco DNA Center, the Group-Based Access Control policy function stored some policy Access Contracts and Policies locally in Cisco DNA Center. Cisco DNA Center also propagated that data to Cisco ISE. Cisco ISE provides the runtime policy services to the network, which includes group-based access control policy downloads to the network devices. Usually, the policy information in Cisco DNA Center matches the policy information in Cisco ISE. But it is possible that the data is not in sync; the data may not be consistent. Because of this, after installing or upgrading to Cisco DNA Center 1.3.3.0, the following steps are necessary before you can use the Group-Based Access Control capabilities. • Integrate Cisco ISE with Cisco DNA Center, if it is not already • Upgrade Cisco ISE, if the version is not the minimum required. See the Cisco DNA Center Release Notes for the required versions of Cisco ISE. • Perform Policy Migration and Synchronization What Is “Migration and Synchronization”? Cisco DNA Center reads all the Group-Based Access Control policy data in the integrated Cisco ISE and compares that data with the policy data in Cisco DNA Center. If you upgraded from a previous version, existing policy data is retained. You must synchronize the policies before you can manage Group-Based Access Control Policy in Cisco DNA Center. How Does Migration and Synchronization Work? Usually, the policy data in Cisco ISE and in Cisco DNA Center is consistent, so no special handling or conversion of data is necessary. Sometimes, when there are minor discrepancies or inconsistencies, only some of the data is converted during the migration. If there is a conflict, the data in Cisco ISE is given precedence, so as not to introduce changes in policy behavior in the network. The following list describes the actions taken during migration: • Scalable Groups: The Scalable Group Tag (SGT), which is a numeric value, uniquely identifies a Scalable Group. Cisco ISE Security Groups are compared to Scalable Groups in Cisco DNA Center. • When the Name and SGT value are the same, nothing is changed. The information in Cisco DNA Center is consistent with Cisco ISE and does not need to be changed. • When a Cisco ISE Security Group SGT value does not exist in Cisco DNA Center, a new Scalable Group is created in Cisco DNA Center. The new Scalable Group is given the default association of “Default_VN.” Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 95 Complete First-Time Setup Group-Based Access Control: Policy Data Migration and Synchronization • When a Cisco ISE Security Group SGT value exists in Cisco DNA Center, but the names do not match, the name from Cisco ISE Security Group replaces the name of that Scalable Group in Cisco DNA Center. • When the Cisco ISE Security Group Name is the same, but the SGT value is different, the Security Group from Cisco ISE is migrated. It retains the name and tag value, and the Cisco DNA Center Scalable Group is renamed. A suffix of “_DNA” is added. Contracts All the SGACLs in Cisco ISE which are referenced by policies are compared to Contracts in Cisco DNA Center. • When the SGACL and Contract have the same name and content, there is no need for further action. The information in Cisco DNA Center is consistent with Cisco ISE and does not need to be changed. • Where the SGACL and Contract have the same name, but the content is different, the SGACL content from Cisco ISE is migrated. The previous Contract content in Cisco DNA Center is discarded. When the SGACL name does not exist in Cisco DNA Center, a new Contract with that name is created, and the SGACL content from Cisco ISE is migrated. Note When creating new Access Contracts based upon Cisco ISE SGACL content, Cisco DNA Center parses the text command lines, and, where possible, renders these SGACL commands as a modeled Access Contract. Each ACE line renders as an “Advanced” application line. If a Cisco ISE SGACL contains text which cannot be parsed successfully, the text content of the SGACL is not converted into modeled format. It is stored as raw command line text. These SGACL text contracts may be edited, but no parsing or syntax checking of the text content is performed during migration. Policies A Policy is uniquely identified by a source group - destination group pair. All Cisco ISE TrustSec Egress Policy Matrix policies are compared to the policies in Cisco DNA Center. • When a policy for a source group - destination group references the same SGACL/Contract name in Cisco ISE, no changes are made. • When a policy for a source group - destination group references a different SGACL/Contract name in Cisco ISE, the Cisco ISE Contract name is referenced in the policy. This overwrites the previous Contract reference in Cisco DNA Center. • The Cisco ISE default policy is checked and migrated to Cisco DNA Center. Note Cisco DNA Center supports a single contract in access policies. Cisco ISE has an option to use multiple SGACLs in access policies, but this option is not enabled by default in ISE, and in general is not widely used. Existing SDA customers who have been using the previous release of Cisco DNA Center to manage Group-Based Access Control policy did no use this option. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 96 Complete First-Time Setup Configure Authentication and Policy Servers If you enabled the option to allow multiple SGACLs on Cisco ISE and used this when creating policies, those policies cannot be migrated to Cisco DNA Center in this release. The specific policy features which make use of the “multiple SGACL” option that cannot be migrated are: • Multiple SGACLs in a policy • Policy Level catch-all rules set to “Permit” or “Deny.” Only the value of “None” is currently supported for migration to Cisco DNA Center. • Default Policy set to use a customer-created SGACL, but only the standard values of “Permit IP”, “Permit_IP_Log”, “Deny IP”, and “Deny_IP_Log”, are currently supported for migration to Cisco DNA Center. If any of the preceding SGACLs are detected during the policy migration and synchronization operation, a notification is generated, and you must choose between the following options to move continue: • Manage Group-Based Access Control policy in Cisco DNA Center: If this option is selected, then all management of Group-Based Access Control Policy are done in Cisco DNA Center. The user interface screens in Cisco ISE for management of Cisco ISE Security Groups, SGACLs, and Egress Policies are available in Read-Only mode. If there were any issues migrating policies (due to use of multiple SGACLs in Cisco ISE), those policies have no contract selected in Cisco DNA Center. The policy uses the default policy, and you can select a new contract for those policies after completing the migration. If there was an problem migrating the default policy, the default policy is set to “Permit”. • Manage Group-Based Access Control Policy in Cisco ISE: If this option is selected, Cisco DNA Center Group-Based Access Control policy management is inactive. No changes are made to Cisco ISE and and there is no effect on policy enforcement in the network. Group-Based Access Control policy is managed in Cisco ISE at the TrustSec workcenter. • Manage Group-Based Access Control policy in both Cisco DNA Center and Cisco ISE: This option is NOT RECOMMENDED for general use, since policy changes made in Cisco ISE are NOT synchronized with Cisco DNA Center. The two systems cannot be kept in sync. This option is intended as a short-term or interim option, and should only be considered when you enabled the “Allow Multiple SGACLs” option in Cisco ISE. You can use this if you need more time and flexibility updating Cisco ISE. Configure Authentication and Policy Servers Cisco DNA Center uses AAA servers for user authentication and Cisco ISE for both user authentication and access control. Use this procedure to configure AAA servers, including Cisco ISE. Before you begin • If you are using Cisco ISE to perform both policy and AAA functions, make sure that Cisco DNA Center and Cisco ISE are integrated as described in Integrate Cisco ISE with Cisco DNA Center. • If you are using another product (not Cisco ISE) to perform AAA functions, make sure that you do the following: • Register Cisco DNA Center with the AAA server, and define the shared secret on both the AAA server and Cisco DNA Center. • Define an attribute name for Cisco DNA Center on the AAA server. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 97 Complete First-Time Setup Configure Authentication and Policy Servers • For a Cisco DNA Center multihost cluster configuration, define all the individual host IP addresses and the virtual IP address for the multihost cluster on the AAA server. Step 1 From the Cisco DNA Center home page, choose Step 2 Click Step 3 Configure the primary AAA server by providing the following information: > System Settings > Settings > Authentication and Policy Servers. . • Server IP Address: IP address of the AAA server. • Shared Secret: Key for device authentications. The shared secret can be up to 128 characters in length. Step 4 To configure an AAA server (except Cisco ISE), leave the Cisco ISE Server slider in the Off position and proceed to Step 5. To configure a Cisco ISE server, click the Cisco ISE server slider to move it to the On position and enter information in the following fields: • Username—Name that is used to log in to Cisco ISE CLI. Note This user must be a Super Admin. • Password—Password for the Cisco ISE CLI username. • FQDN—FQDN of the Cisco ISE server. Note • We recommend that you copy the FQDN that is defined in Cisco ISE (Administration > Deployment > Deployment Nodes > List) and paste it directly into this field. • The FQDN that you enter must match the FQDN, Common Name (CN), or Subject Alternative Name (SAN) defined in the Cisco ISE certificate. The FQDN consists of two parts, a hostname and a domain name, in the following format: hostname.domainname.com. For example, the FQDN for a Cisco ISE server might be ise.cisco.com. • Subscriber Name—Unique text string that identifies a pxGrid client registering for Cisco ISE pxGrid services; for example, acme. The subscriber name is used during Cisco DNA Center-to-Cisco ISE integration. • (Optional) SSH Key—Diffie-Hellman-Group14-SHA1 SSH key used to connect to Cisco ISE. • (Optional) Virtual IP Address(es)—Virtual IP address of the load balancer behind which the Cisco ISE policy service nodes are located. If you have multiple policy service node farms behind different load balancers, you can enter a maximum of six virtual IP addresses. Note Step 5 If the status of the configured ISE server is "FAILED" due to password change, click Retry, and update the password to resync the ISE connectivity. Click View Advanced Settings and configure the following settings: Note The settings you need to configure will vary, depending on the protocol you set for the server. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 98 Complete First-Time Setup Configure SNMP Properties • Protocol: RADIUS is set by default, but you can choose TACACS instead or choose both protocols. Attention If you do not choose TACACS for Cisco ISE servers, it will not be available when you configure Cisco ISE nodes. • Authentication Port: Port used by RADIUS to relay authentication messages to the AAA server. The default is UDP port 1812. • Accounting Port: Port used by RADIUS to relay important events to the AAA server. The information in these events is used for security and billing purposes. The default UDP port is 1813. • Port: Port used by TACACS to communicate with the AAA server. The default port is 49. • Retries: Number of times that Cisco DNA Center attempts to connect with the AAA server before abandoning the attempt to connect. The default number of attempts is 3. • Timeout: Length of time the device waits for the AAA server to respond before abandoning the attempt to connect. The default timeout is 4 seconds. Step 6 Click Apply. Step 7 To add a secondary server, repeat Step 2 through Step 6. Configure SNMP Properties You can configure the retry and timeout values for SNMP. Before you begin Only a user with SUPER-ADMIN-ROLE permissions can perform this procedure. For more information, see the Cisco DNA Center Administrator Guide. Step 1 From the Cisco DNA Center home page, click Step 2 Configure the following fields: and then choose System Settings > Settings > SNMP Properties. • Retries: Number of attempts allowed to connect to the device. Valid values are from 1 to 3. The default is 3. • Timeout (in Seconds): Number of seconds Cisco DNA Center waits for when trying to establish a connection with a device before timing out. Valid values are from 1 to 300 seconds, in intervals of 5 seconds. The default is 5 seconds. Step 3 Click Apply. Note To return to the default settings, click Revert to Defaults. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 99 Complete First-Time Setup Configure SNMP Properties Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 100 CHAPTER 7 Troubleshoot the Deployment • Troubleshooting Tasks, on page 101 • Log Out, on page 101 • Reconfigure the Appliance Using the Configuration Wizard, on page 102 • Power-Cycle the Appliance, on page 103 Troubleshooting Tasks When troubleshooting issues with the appliance's configuration, you will normally perform the following tasks: 1. If you are currently using the Cisco DNA Center GUI: Log Out. 2. To reconfigure the appliance's hardware, log in to and use the Cisco IMC GUI, as explained in Steps 12 and 13 of Enable Browser Access to Cisco Integrated Management Controller. 3. To change the appliance configuration, launch and use the Maglev Configuration wizard, as explained in Reconfigure the Appliance Using the Configuration Wizard. 4. Power-cycle the appliance so that your changes are active: Power-Cycle the Appliance, on page 103. For more information about the appliance's network adapters, see the Managing Adapters section of the Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 3.1. As noted elsewhere, never attempt to manage the appliance hardware through the Linux CLI. Use only the Cisco IMC GUI or the Maglev Configuration wizard to change appliance settings. Log Out Follow the steps below to log out of the Cisco DNA Center GUI. For security reasons, we recommend that you log out after you complete a work session. If you do not log out yourself, you will be logged out automatically after 30 minutes of inactivity. Step 1 Step 2 Click . Click Sign out. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 101 Troubleshoot the Deployment Reconfigure the Appliance Using the Configuration Wizard This ends your session and logs you out. Reconfigure the Appliance Using the Configuration Wizard To reconfigure an appliance, you must use the Configuration wizard to update the appliance settings. You cannot use the Linux CLI to do this. The normal Linux administration procedures that you might use to update configuration settings on a standard Linux server will not work and should not be attempted. After the appliance is configured, you cannot use the Configuration wizard to change all of the appliance settings. Changes are restricted to the following settings only: • Host IP address of the appliance • DNS server IP addresses • Default gateway IP address • NTP server IP addresses • Cluster Virtual IP address • Cluster hostname (FQDN) • Static routes • Proxy server IP address • Maglev user password • Admin user password Before you begin You will need the Linux user name (maglev) and password that are currently configured on the target appliance. Step 1 Point your browser to the Cisco IMC IP address you set during the Cisco IMC GUI configuration you performed, and log in to the Cisco IMC GUI as the Cisco IMC user (see Enable Browser Access to Cisco Integrated Management Controller). After successful login, the appliance displays the Cisco Integrated Management Controller Chassis Summary window, with a hyperlinked menu at the top of the window, as shown below. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 102 Troubleshoot the Deployment Power-Cycle the Appliance Step 2 From the hyperlinked menu, choose Launch KVM and then select either Java based KVM or HTML based KVM. If you select Java-based KVM, you will need to launch the Java startup file from your browser or file manager in order to view the KVM console in its own window. If you select HMTL-based KVM, it launches the KVM console in a separate window or tab automatically. Irrespective of the KVM type you choose, use the KVM console to monitor the progress of the configuration and respond to the Maglev Configuration wizard prompts. Step 3 When prompted, enter the Linux password. Step 4 Enter the following command to access the Configuration wizard. sudo maglev-config update If you are prompted for the Linux password, enter it again. Step 5 The Configuration wizard presents an abbreviated version of the same series of screens shown in, for example, Configure Add-On Nodes. Make changes to the settings presented, if required. After you finish making changes on each screen, choose [Next], as needed, to proceed through the Configuration wizard. Step 6 At the end of the configuration process, a message appears, stating that the Configuration wizard is now ready to apply your changes. The following options are available: • [back]: Review and verify your changes. • [cancel]: Discard your changes and exit the Configuration wizard. • [proceed]: Save your changes and begin applying them. Choose proceed>> to complete the installation. The Configuration wizard applies the changes you made. At the end of the configuration process, a CONFIGURATION SUCCEEDED! message appears. What to do next Ensure your changes are applied and active by power-cycling the appliance. See Power-Cycle the Appliance, on page 103. Note If you have updated the DNS Server IP addresses, we recommend that you perform a cold boot when power-cycling the appliance. This ensures that your DNS changes are applied. Power-Cycle the Appliance Complete one of the following procedures on your Cisco DNA Center appliance to either halt it or perform a warm restart. You can halt the appliance before you make hardware repairs, or you can initiate a warm restart after you have corrected software issues. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 103 Troubleshoot the Deployment Using the Cisco IMC GUI Using the Cisco IMC GUI If you want to use the KVM console that is accessible from the Cisco IMC GUI in order to halt your appliance or perform a warm restart, complete the tasks described in this procedure. Before you begin Note that any hardware changes you make using the Cisco IMC GUI will be applied after the appliance reboots. Caution Step 1 Power-cycling your appliance from the Cisco IMC GUI can result in the corruption or loss of data. Only do so if your appliance is completely unresponsive to SSH, the Cisco IMC console, or the physical console. Point your browser to the Cisco IMC IP address you set during the Cisco IMC GUI configuration you performed, and log in to the Cisco IMC GUI as the Cisco IMC user (see Enable Browser Access to Cisco Integrated Management Controller, on page 41). After successful login, the appliance displays the Cisco Integrated Management Controller Chassis Summary window, with a hyperlinked menu at the top of the window, as shown below. Step 2 With the KVM displayed, reboot the appliance by choosing Host Power > Power Cycle . If you are asked to confirm your choice to reboot the appliance, click OK. Using SSH If you want to use SSH in order to halt your appliance or perform a warm restart, complete the following tasks: Before you begin You will need the following: Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 104 Troubleshoot the Deployment Using SSH • Secure Shell (SSH) client software. • The IP address that you configured for the 10-Gbps Enterprise port on the appliance that needs reconfiguration. Log in to the appliance at this address, on port 2222. To identify the Enterprise port, see the rear-panel figure in Front and Rear Panels, on page 2. • The Linux user name (maglev) and the password that is currently configured on the target appliance. Step 1 Using a Secure Shell (SSH) client, log in to the IP address of the Enterprise port of the appliance that needs to be reconfigured, on port 2222: ssh maglev@Enterprise-port's-IP-address -p 2222 Step 2 When prompted, enter the Linux password. Step 3 Enter the command that is appropriate for the task you want to perform: • To halt the appliance, enter: sudo shutdown -h now • To initiate a warm restart, enter: sudo shutdown -r now If you are prompted for the Linux password, enter it again. Step 4 Review the command output that is displayed as the host shuts down. Step 5 If you halted your appliance, power up the Maglev root process by turning the appliance back on, using the front-panel power button. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 105 Troubleshoot the Deployment Using SSH Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 106 APPENDIX A Review High Availability Cluster Deployment Scenarios Cisco DNA Center's implementation of high availability (HA) is described in the Cisco Digital Network Architecture Center High Availability Guide. We recommend that you first review this information and then determine whether you want to deploy HA in your production environment. If you choose to do so, complete the following tasks: 1. Complete the deployment procedure that is appropriate for your network: • New HA Deployment • Existing HA Deployment of the Primary Node with Standard Interface Configurations • Existing HA Deployment of Primary Node with Nonstandard Interface Configurations 2. Redistribute Services among your cluster nodes. 3. See Additional HA Deployment Considerations and make any additional configurations that are necessary. • New HA Deployment, on page 107 • Existing HA Deployment of the Primary Node with Standard Interface Configurations, on page 108 • Existing HA Deployment of Primary Node with Nonstandard Interface Configurations, on page 108 • Redistribute Services, on page 109 • Additional HA Deployment Considerations, on page 109 New HA Deployment To install a brand new HA cluster, complete the following steps: Step 1 Configure the first installed appliance as the primary node. See Configure the Primary Node. Step 2 Configure the second and third appliances in the cluster. See Configure Add-On Nodes. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 107 Review High Availability Cluster Deployment Scenarios Existing HA Deployment of the Primary Node with Standard Interface Configurations Existing HA Deployment of the Primary Node with Standard Interface Configurations To deploy an existing HA cluster, where the primary node uses the required interface cable configurations, complete the following steps. Step 1 Upgrade the primary node to Cisco DNA Center 1.3.3.0. For information about upgrading your current release of Cisco DNA Center, see Cisco Digital Network Architecture Center Upgrade Guide. Step 2 Confirm that you are using the required interface cable configurations on the primary node. See Interface Cable Connections. Step 3 Update the virtual IP address (if the virtual IP address is not yet added). See Reconfigure the Appliance Using the Configuration Wizard. Step 4 Configure the second and third appliances in the cluster. See Configure Add-On Nodes. Step 5 Enter the following command to check the GlusterFS size: sudo du -h /data/maglev/srv/maglev-system/glusterfs/mnt/bricks/default_brick/ | tail -1 | awk '{print $1}' If the GlusterFS file system size is larger than 150 GB, complete the steps described in Existing HA Deployment of Primary Node with Nonstandard Interface Configurations. Existing HA Deployment of Primary Node with Nonstandard Interface Configurations To deploy an existing HA cluster where the primary node uses nonstandard interface configurations, complete the following steps. Step 1 Upgrade the primary node to Cisco DNA Center 1.3.3.0. For information about upgrading your current release of Cisco DNA Center, see the Cisco DNA Center Upgrade Guide. Step 2 Create a backup of the remote repository. See the "Backup and Restore" chapter in the Cisco DNA Center Administrator Guide. Step 3 Reimage the primary node with the required interface cable configuration. See Interface Cable Connections and Install the Cisco DNA Center ISO Image. Make sure that the VIP has been configured correctly on the primary node. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 108 Review High Availability Cluster Deployment Scenarios Redistribute Services Step 4 On the primary node, install the same set of packages that you selected during the backup. Step 5 Using the backup file that you created in Step 2, restore the remote repository's data. Step 6 Configure the second and third appliances in the cluster. See Configure Add-On Nodes. Redistribute Services Cisco DNA Center's implementation of HA is described in the Cisco Digital Network Architecture Center High Availability Guide. We recommend that you first review this information and then determine whether you want to deploy HA in your production environment. If you choose to do so, optimize HA operation by redistributing the services among your cluster nodes: 1. From the home page, click and then choose System Settings. The System 360 tab is displayed by default. 2. In the Hosts area, click Enable Service Distribution. After you click Enable Service Distribution, Cisco DNA Center enters into maintenance mode. In this mode, Cisco DNA Center is unavailable until the redistribution of services is completed. You should take this into account when scheduling an HA deployment. Note Cisco DNA Center goes into maintenance mode every time you restore the database, perform a system upgrade (not a package upgrade), and enable a service redistribution for HA (as described above). Additional HA Deployment Considerations For an existing HA deployment, the following additional configurations must be made. Note For information about known HA bugs and workarounds, see “Open Bugs—HA" in the Release Notes for Cisco Digital Network Architecture Center. Telemetry If you enabled telemetry for a device (without enabling the VIP), complete the following steps: Step 1 Use the maglev-config update command to update the cluster VIP. Step 2 Disable telemetry on the device: a. From the Cisco DNA Center home page, choose Network Telemetry from the Tools area. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 109 Review High Availability Cluster Deployment Scenarios Wireless Controller The Network Telemetry window appears. b. Click the Site View tab. c. Check the check box of the device on which you want to disable telemetry, and then choose Actions > Disable Telemetry. Step 3 Reenable telemetry using the profile associated with the device previously. Wireless Controller You must update the wireless controllers in your network with the new VIP of Cisco DNA Center. Cisco DNA Center First-Generation Appliance Installation Guide, Release 1.3.3.0 110
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Related manuals
Download PDF
advertisement