Cisco DNA Center Guide

Cisco DNA Center Administrator Guide, Release 2.2.2 First Published: 2021-08-09 Last Modified: 2021-11-03 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: https://www.cisco.com/c/en/us/about/legal/trademarks.html. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1721R) © 2021 Cisco Systems, Inc. All rights reserved. CONTENTS CHAPTER 1 New and Changed Information CHAPTER 2 Configure System Settings 1 3 About System Settings 4 Use the System 360 4 View the Services in System 360 6 Monitor System Health 7 Establish Cisco IMC Connectivity 7 Delete Cisco IMC Settings 7 Subscribe to System Event Notifications 8 Event Notification Information 8 System Health Scale Numbers 14 View the System Topology 15 Troubleshoot Appliance and External System Issues 16 Troubleshoot External System Connectivity Issues 17 System Topology Notifications 17 Suggested Actions 19 Supported REST APIs 22 Cisco DNA Center and Cisco ISE Integration 30 Anonymize Data 32 Configure Authentication and Policy Servers 33 Configure Cisco AI Network Analytics Data Collection 35 Disable Cisco AI Network Analytics Data Collection 37 Update the Machine Reasoning Knowledge Base 37 Cisco Accounts 38 Configure Cisco Credentials 38 Cisco DNA Center Administrator Guide, Release 2.2.2 iii Contents Clear Cisco Credentials 39 Configure Connection Mode 39 Register Plug and Play 40 Configure Smart Account 41 Smart Licensing 42 Device Controllability 42 Configure Device Controllability 44 Accept the License Agreement 45 Cloud Access Keys 45 Integrity Verification 46 Upload the KGV File 46 Configure an IP Address Manager 48 Configure Debugging Logs 49 Configure the Network Resync Interval 51 View Audit Logs 51 Export Audit Logs to Syslog Servers 52 Activate High Availability 53 Configure Integration Settings 53 Set Up a Login Message 53 Configure the Proxy 54 Security Recommendations 55 Change the Minimum TLS Version and Enable RC4-SHA (Not Secure) 56 Configure the Proxy Certificate 58 Certificate and Private Key Support 59 Certificate Chain Support 60 Update the Cisco DNA Center Server Certificate 60 Use an External SCEP Broker 62 Switch Back to an Internal PKI Certificate 63 Export Cisco DNA Center PKI Certificate 63 Certificate Management 63 Configure the Device Certificate Lifetime 63 Change the Role of the PKI Certificate from Root to Subordinate 64 Provision a Rollover Subordinate CA Certificate 66 Configure the Device Certificate Trustpoint 68 Cisco DNA Center Administrator Guide, Release 2.2.2 iv Contents Renew Certificates 68 Configure Trustpool 69 Configure the SFTP Server 70 Configure SNMP Properties 70 About Product Usage Telemetry Collection 71 Configure vManage Properties 71 Account Lockout 72 Password Expiry 72 Enable ICMP Ping 73 Configure an Image Distribution Server 73 Enable PNP Device Authorization 74 CHAPTER 3 Manage Applications 75 Application Management 75 Download and Update System Updates 75 Download and Install Packages and Updates 76 Package Download and Upgrade Event Notifications 77 Uninstall a Package 77 CHAPTER 4 Manage Users 79 About User Profiles 79 About User Roles 79 Create an Internal User 80 Edit a User 80 Delete a User 81 Reset a User Password 81 Change Your Own User Password 82 Change Your Own User Password without Admin Permission 82 Reset a Forgotten Password 82 Configure Role-Based Access Control 83 Cisco DNA Center User Role Permissions 84 Display Role-Based Access Control Statistics 88 Configure External Authentication 88 Two-Factor Authentication 90 Cisco DNA Center Administrator Guide, Release 2.2.2 v Contents Prerequisites for Two-Factor Authentication 91 Two-Factor Authentication Workflow 91 Configure Two-Factor Authentication 91 Enable Two-Factor Authentication Using RADIUS 93 Enable Two-Factor Authentication Using TACACS+ 93 Log In Using Two-Factor Authentication 94 Display External Users 94 CHAPTER 5 Manage Licenses 95 License Manager Overview 95 Integration with Cisco Smart Accounts 99 Set Up License Manager 99 Visualize License Usage and Expiration 100 View License Details 101 Change License Level 102 Export License Information 103 Auto Registration of Smart License-Enabled Devices 103 Day 0 Configuration for Smart License-Enabled Devices 103 Apply Specific License Reservation or Permanent License Reservation to Devices 104 Enable SLR/PLR When the Devices and Cisco DNA Center Are Connected to CSSM 104 Enable SLR/PLR When the Devices and Cisco DNA Center Are Not Connected to CSSM 105 Generate the Authorization Code from CSSM 105 Cancel SLR or PLR Applied to Devices 106 Install the Authorization Code and Enable the High Security License 106 Disable High Security License 107 Upload Resource Utilization Details to CSSM 108 Change Device Throughput 108 Transfer Licenses Between Virtual Accounts 109 Manage Customer Tags to Smart License-Enabled Devices 109 Modify License Policy 110 CHAPTER 6 Backup and Restore 111 About Backup and Restore 111 Backup and Restore Event Notifications 112 Cisco DNA Center Administrator Guide, Release 2.2.2 vi Contents Backup Server Requirements 113 Backup Storage Requirements 115 Example of NFS Server Configuration—Ubuntu 116 Example of NFS Server Configuration—CentOS 117 Configure Firewall Rules to Allow NFS 118 Configure Firewall Rules—Debian/Ubuntu 118 Configure Firewall Rules—RedHat/CentOS 118 Configure Backup Servers 119 Back Up Data Now 120 Schedule Data Backups 121 Restore Data from Backups 122 CHAPTER 7 Implement Disaster Recovery 125 Overview 125 Key Terms 125 Navigate the Disaster Recovery GUI 127 View Disaster Recovery System Status 128 Prerequisites 129 Configure Disaster Recovery After an Upgrade 133 Scenario 1 133 Scenario 2 133 Upgrade a Disaster Recovery System 133 Add the Disaster Recovery Certificate 134 Configure the Witness Site 135 Configure Disaster Recovery 137 Replace the Current Witness Site 140 Deregister Your System 141 Monitor the Event Timeline 141 System and Site States 143 Failovers: An Overview 146 Initiate a Manual Failover 147 Pause Your Disaster Recovery System 150 Place Your System on Pause 150 Rejoin Your System 151 Cisco DNA Center Administrator Guide, Release 2.2.2 vii Contents Backup and Restore Considerations 153 Disaster Recovery Event Notifications 154 Supported Events 154 Troubleshoot Your Disaster Recovery System 156 Troubleshoot BGP Route Advertisement Issues 162 Cisco DNA Center Administrator Guide, Release 2.2.2 viii CHAPTER 1 New and Changed Information The following table summarizes the new and changed features and tells you where they are documented. Table 1: New and Changed Features for Cisco DNA Center, Release 2.2.2 Feature Description Where Documented Disaster Recovery Updated the GUI description with a screenshot of the new logical Navigate the Disaster Recovery topology. GUI, on page 127 Disaster Recovery Added a description of the new Disaster Recovery System slide-in pane. View Disaster Recovery System Status, on page 128 Disaster Recovery Updated the Supported Events table. Supported Events, on page 154 Disaster Recovery Updated the Disaster Recovery System Issues table. Troubleshoot Your Disaster Recovery System, on page 156 Disaster Recovery The links that connect the main, recovery, and witness sites should Prerequisites, on page 129 have a maximum of 350 ms RTT latency (up from 200 ms in earlier releases). System Health Listed the newly supported events to which a user can subscribe Subscribe to System Event to receive notifications: Notifications, on page 8 • Certificate expiration • Hardware configuration compliance • Managed services • Supported scale numbers System Health Documented the scale numbers that Cisco DNA Center appliances System Health Scale Numbers, support for various network components. on page 14 Cisco DNA Center Administrator Guide, Release 2.2.2 1 New and Changed Information Feature Description Where Documented System Health Documented the following new features: View the System Topology, on page 15 • Topology updates occur when a certificate is set to expire or the hardware configuration for a connected appliance or external system is not compliant. • System Health now provides hardware information for both a disaster recovery system's main and recovery sites. Previously, this information was only provided for a system's main site. System Health Listed the REST APIs that System Health supports and provided sample API output. • Supported REST APIs, on page 22 • Sample API Output, on page 24 Export Cisco DNA Center PKI Cisco DNA Center allows you to download the device certificates Export Cisco DNA Center PKI Certificate that are required to set up an external entity such as a AAA Certificate, on page 63 (pronounced "triple A") server or Cisco ISE server to authenticate the devices. 1. In the Cisco DNA Center GUI, click the Menu icon ( ) and choose System > Settings > Trust & Privacy > PKI Certificates. 2. Click Download CA Certificate to export the device CA and add it as the trusted CA on the external entities. ICMP Ping The Cisco DNA Center Internet Control Message Protocol (ICMP) Enable ICMP Ping, on page 73 pings the unreachable access points in flex connect mode every 5 minutes to enhance reachability. Image Distribution Servers Image Distribution Server helps in storage and software distribution. You can set up one or more protocols for newly added image distribution server. Configure an Image Distribution Server, on page 73 PNP Device Authorization With this release, Cisco DNA Center allows you to enable the authorization of PNP devices. Enable PNP Device Authorization, on page 74 Note The documentation set for this product strives to use bias-free language. For purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Cisco DNA Center Administrator Guide, Release 2.2.2 2 CHAPTER 2 Configure System Settings • About System Settings, on page 4 • Use the System 360, on page 4 • View the Services in System 360, on page 6 • Monitor System Health, on page 7 • Cisco DNA Center and Cisco ISE Integration, on page 30 • Anonymize Data, on page 32 • Configure Authentication and Policy Servers, on page 33 • Configure Cisco AI Network Analytics Data Collection, on page 35 • Update the Machine Reasoning Knowledge Base, on page 37 • Cisco Accounts, on page 38 • Device Controllability, on page 42 • Cloud Access Keys, on page 45 • Integrity Verification, on page 46 • Configure an IP Address Manager, on page 48 • Configure Debugging Logs, on page 49 • Configure the Network Resync Interval, on page 51 • View Audit Logs, on page 51 • Activate High Availability, on page 53 • Configure Integration Settings, on page 53 • Set Up a Login Message, on page 53 • Configure the Proxy, on page 54 • Security Recommendations, on page 55 • Configure the SFTP Server, on page 70 • Configure SNMP Properties, on page 70 • About Product Usage Telemetry Collection, on page 71 • Configure vManage Properties, on page 71 • Account Lockout, on page 72 • Password Expiry, on page 72 • Enable ICMP Ping, on page 73 • Configure an Image Distribution Server, on page 73 • Enable PNP Device Authorization, on page 74 Cisco DNA Center Administrator Guide, Release 2.2.2 3 Configure System Settings About System Settings About System Settings To start using Cisco DNA Center, you must first configure the system settings so that the server can communicate outside the network, ensure secure communications, authenticate users, and perform other key tasks. Use the procedures described in this chapter to configure the system settings. Note Any changes that you make to the Cisco DNA Center configuration—including changes to the proxy server settings—must be done from the Cisco DNA Center GUI, and the changes to the IP address, static route, DNS server, or maglev user password—must be done from the CLI with the sudo maglev-config update command. Use the System 360 The System 360 tab provides at-a-glance information about Cisco DNA Center. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Step 2 On the System 360 dashboard, review the following displayed data metrics: ) and choose System > System 360. Cluster • Hosts: Displays information about the Cisco DNA Center hosts. The information that is displayed includes the IP address of the hosts and detailed data about the services running on the hosts. Click the View Services link to view detailed data about the services running on the hosts. Note The host IP address has a color badge next to it. A green badge indicates that the host is healthy. A red badge indicates that the host is unhealthy. The side panel displays the following information: • Node Status: Displays the health status of the node. If the node health is unhealthy, hover over the status to view additional information for troubleshooting. • Services Status: Displays the health status of the services. Even if one service is down, the status is Unhealthy. • Name: Service name. • Appstack: App stack name. An app stack is a loosely coupled collection of services. A service in this environment is a horizontally scalable application that adds instances of itself when demand increases, and frees instances of itself when demand decreases. • Health: Status of the service. • Version: Version of the service. • Tools: Displays metrics and logs for the service. Click the Metrics link to view service monitoring data in Grafana. Grafana is an open-source metric analytics and visualization suite. You can troubleshoot issues by reviewing the service monitoring data. For information about Grafana, see https://grafana.com/. Click the Logs link to view service logs in Kibana. Kibana is an open-source analytics and visualization platform. You can Cisco DNA Center Administrator Guide, Release 2.2.2 4 Configure System Settings Use the System 360 troubleshoot issues by reviewing the service logs. For information about Kibana, see https://www.elastic.co/products/kibana. • High Availability: Displays whether HA is enabled and active. Important Three or more hosts are required for HA to work in Cisco DNA Center. • Cluster Tools: Lets you access the following tools: • Service Explorer: Access the app stack and the associated services. • Monitoring: Access multiple dashboards of Cisco DNA Center components using Grafana, which is an open-source metric analytics and visualization suite. Use the Monitoring tool to review and analyze key Cisco DNA Center metrics, such as memory and CPU usage. For information about Grafana, see https://grafana.com/. Note In a multihost Cisco DNA Center environment, expect duplication in the Grafana data due to the multiple hosts. • Log Explorer: Access Cisco DNA Center activity and system logs using Kibana. Kibana is an open-source analytics and visualization platform designed to work with Elasticsearch. Use the Log Explorer tool to review detailed activity and system logs. In the Kibana left navigation pane, click Dashboard. Then, click System Overview and view all of the system logs. For information about Kibana, see https://www.elastic.co/products/kibana. Note All logging in Cisco DNA Center is enabled, by default. • Workflow: Access the Workflow Visualizer, which provides detailed graphical representations of Cisco DNA Center infrastructure tasks, including Success, Failure, and Pending status markings. Use the Workflow tool to determine the location of a failure in a Cisco DNA Center task. System Management • Software Updates: Displays the status of application or system updates. Click the View link to view the update details. Note An update has a color badge next to it. A green badge indicates that the update or actions related to the update succeeded. A yellow badge indicates that there is an available update. • Backups: Displays the status of the most recent backup. Click the View link to view all backup details. Additionally, it displays the status of the next scheduled backup (or indicates that no backup is scheduled). Note A backup has a color badge next to it. A green badge indicates a successful backup with a timestamp. A yellow badge indicates that the next backup is not yet scheduled. • Application Health: Displays the health of automation and Assurance. Note Application health has a color badge next to it. A green badge indicates a healthy application. A red badge indicates that the application is unhealthy. Click the View link to troubleshoot. Externally Connected Systems Displays information about external network services used by Cisco DNA Center. Cisco DNA Center Administrator Guide, Release 2.2.2 5 Configure System Settings View the Services in System 360 • Identity Services Engine (ISE): Displays Cisco ISE configuration data, including the IP address and status of the primary and secondary Cisco ISE servers. Click the Configure link to configure Cisco DNA Center for integration with Cisco ISE. • IP Address Manager (IPAM): Displays IP address manager configuration data and the integration status. Click the Configure link to configure the IP Address Manager. • vManage: Displays vManage configuration data. Click the Configure link to configure vManage. View the Services in System 360 The System 360 tab provides detailed information about the app stacks and services running on Cisco DNA Center. You can use this information to assist in troubleshooting issues with specific applications or services. For example, if you are having issues with Assurance, you can view monitoring data and logs for the NDP app stack and its component services. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Step 2 On the System 360 tab, in the Cluster Tools area, click Service Explorer. ) and choose System > System 360. The node clusters and the associated services are displayed in a tree-like structure in a new browser window. • Hover over the node to view the node cluster health status. The healthy node clusters are marked in green. Unhealthy node clusters are marked in red. • The Services table shows all the services associated with the node. The managed services are marked as (M). • In the Service table, click the global filter icon to filter services by app stack name, service health status (Up, Down, or In Progress), or managed services. • Enter a service name in the Global Search field to find a service. Click the service name to view the service in its associated node. Step 3 Click the service to launch the Service 360 view, which displays the following details: • Name: Service name. • Appstack: App stack name. • Version: Version of the service. • Health: Status of the service. • Metrics : Click the link to view the services monitoring data in Grafana. • Logs: Click the link to view the service logs in Kibana. • Required Healthy Instances: Shows the number of healthy instances and indicates whether the service is managed. • Instances: Click the instances to view details. Step 4 Enter the service name in the Search field to search the services listed in the table. Cisco DNA Center Administrator Guide, Release 2.2.2 6 Configure System Settings Monitor System Health Step 5 Click the filter icon in the services table to filter services based on app stack name, service status (Up, Down, or In Progress), or managed service. Monitor System Health From the System Health page, you can monitor the health of the physical components on your Cisco DNA Center appliances and keep tabs on any issues that may occur. Refer to the following topics, which describe how to enable this functionality and use it in your production environment. Establish Cisco IMC Connectivity To enable the System Health page, you need to establish connectivity with Cisco Integrated Management Controller (Cisco IMC), which collects health information for your appliances' hardware. Complete the following procedure to do so. Note Step 1 Only users with SUPER-ADMIN-ROLE permissions can enter Cisco IMC connectivity settings for an appliance. In the Cisco DNA Center GUI, click the Menu icon ( System Health Notifications. ) and choose System > Settings > System Configuration > The IP address of each appliance in your cluster is listed in the Cisco DNA Center Address column. Step 2 Configure the information required to log in to Cisco IMC: a) Click the IP address for an appliance. The Edit Cisco DNA Center Server Configuration slide-in pane opens. b) Enter the following information and then click Save: • The IP address configured for the appliance's Cisco IMC port. • The username and password required to log in to Cisco IMC. c) Repeat this step for the other appliances in your cluster, if necessary. Delete Cisco IMC Settings To delete the Cisco IMC connectivity settings that have been configured previously for a particular appliance, complete the following procedure. Note Only users with SUPER-ADMIN-ROLE permissions can delete these settings. Cisco DNA Center Administrator Guide, Release 2.2.2 7 Configure System Settings Subscribe to System Event Notifications Step 1 In the Cisco DNA Center GUI, click the Menu icon ( System Health Notifications. Step 2 For the appliance whose settings you want to delete, click its Delete ( ) icon in the Actions column. Step 3 At the confirmation prompt, click Ok. ) and choose System > Settings > System Configuration > Subscribe to System Event Notifications After you have established connectivity with Cisco IMC, Cisco DNA Center collects event information from Cisco IMC and stores this information as raw system events. These raw events are then processed by the rules engine and converted into system event notifications that are displayed in the System Health topology. By completing the procedure described in the Cisco DNA Center Platform User Guide's "Work with Events" topic, you can also receive these notifications in one of the available formats. When completing this procedure, select and subscribe to the following events in the Platform > Developer Toolkit > Events table: • Certificate expiration events: • SYSTEM-CERTIFICATE • SYSTEM-NODE-CERTIFICATE • Connected external systems events: • SYSTEM-EXTERNAL-CMX • SYSTEM-EXTERNAL-IPAM • SYSTEM-EXTERNAL-ISE-AAA-TRUST • SYSTEM-EXTERNAL-ISE-PAN-ERS • SYSTEM-EXTERNAL-ISE-PXGRID • SYSTEM-EXTERNAL-ITSM • Disaster recovery system events: SYSTEM-DISASTER-RECOVERY • General system events: • SYSTEM-CIMC • SYSTEM-CONFIGURATION • SYSTEM-HARDWARE • SYSTEM-MANAGED-SERVICES • SYSTEM-SCALE-LIMITS Event Notification Information The following table lists the key information that Cisco DNA Center provides when it generates a system health notification message. Cisco DNA Center Administrator Guide, Release 2.2.2 8 Configure System Settings Event Notification Information Domain Subdomain Tag Instance System CPU <node-hostname>:CPU-1 Ok Memory CPU Memory State Disk Cisco DNA Center CPU-1 has failed on <node-hostname> Disabled Cisco DNA Center CPU-1 is disabled on <node-hostname> <node-hosntame>D : IMM_A1 Ok <node-hostname>:Disk1 Ok NotOk RAID Controller Network Interfaces RAIDController NIC <node-hostname>:Controler-1 Ok PSU Cisco DNA Center RAM DIMM_A1 is working as expected on <node-hostname> Cisco DNA Center RAM DIMM_A1 has failed on <node-hostname> Cisco DNA Center Disk 2 is working as expected on <node-hostname> Cisco DNA Center Disk 2 has failed on <node-hostname> Cisco DNA Center RAID VD-2 is working as expected on <node-hostname> NotOk Cisco DNA Center RAID VD-2 has degraded on <node-hostname> Disabled Cisco DNA Center RAID VD-2 is offline on <node-hostname> <node-hostname>:nic-1 Ok NotOk PSU_FAN Cisco DNA Center CPU-1 is working as expected on <node-hostname> NotOk NotOk Disk Message <node-hostname>:psu-1 Ok NotOk Cisco DNA Center network interfaces are working as expected Cisco DNA Center: <x> network interfaces are missing for <node-hostname>: nic-1 Cisco DNA Center power supply (PSU-1) is powered on and thermal condition is normal for <node-hostname> Cisco DNA Center power supply (PSU-2) is powered off and thermal condition is critical for <node-hostname> Cisco DNA Center Administrator Guide, Release 2.2.2 9 Configure System Settings Event Notification Information Domain Subdomain Tag Instance Disaster Recovery <disaster-recovery-hostname> Ok DisasterRecovery State Message • Disaster recovery cluster is up • Disaster recovery failover succeeded to <site-name> Degraded • Disaster recovery failover triggered from <site-name> to site-name • Disaster recovery failed while failing over to <site-name> • Disaster recovery standby cluster on <site-name> is down; cannot failover • Disaster recovery witness is down; cannot failover • Disaster recovery replication halted; recovery point objective will be impacted • Disaster recovery pause failed • Disaster recovery route advertisement failed • Disaster recovery IPSec communication failed NotOk • Disaster recovery configuration failed • Disaster recovery failed to rejoin the standby system Platform Services ManagedServices <hostname>:<name> OK NOTOK Scale Limits wired_concurrent_clients <hostname>:<name> OK Cisco DNA Center Administrator Guide, Release 2.2.2 10 Managed Service <service-name> is Running Managed Service <service-name> is Interrupted OK Configure System Settings Event Notification Information Domain Subdomain Tag Instance State Message NOTOK The number of concurrent wired clients exceeded 26250 (105% of limit) DEGRADED The number of concurrent wired clients exceeded 21250 (85% of limit) CAUTION wireless_concurrent_clients <hostname>:<name> OK NOTOK The number of concurrent wired clients exceeded 18750 (75% of limit) OK The number of concurrent wireless clients exceeded 18750 (75% of limit) DEGRADED The number of concurrent wireless clients exceeded 21250 (85% of limit) CAUTION wired_devices <hostname>:<name> OK NOTOK The number of concurrent wireless clients exceeded 18750 (75% of limit) OK The number of wired devices exceeded 1050 (105% of limit) DEGRADED The number of wired devices exceeded 850 (85% of limit) CAUTION wireless_devices <hostname>:<name> OK NOTOK The number of wired Devices exceeded 750 (75% of limit) OK The number of wireless devices exceeded 3800 (105% of limit) DEGRADED The number of wireless devices exceeded 3400 (85% of limit) CAUTION interfaces <hostname>:<name> OK NOTOK The number of wireless devices exceeded 3000 (75% of limit) OK The number of interfaces exceeded 1140000000 (95% of limit) Cisco DNA Center Administrator Guide, Release 2.2.2 11 Configure System Settings Event Notification Information Domain Subdomain Tag Instance State Message DEGRADED The number of interfaces exceeded 1020000000 (85% of limit) CAUTION ippools <hostname>:<name> OK NOTOK The number of interfaces exceeded 900000000 (75% of limit) OK The number of IP pools exceeded 47500 (95% of limit) DEGRADED The number of IP pools exceeded 42500 (85% of limit) CAUTION netflows <hostname>:<name> OK NOTOK The number of IP pools exceeded 37500 (75% of limit) OK The number of Netflows exceeded 37500 (75% of limit) DEGRADED The number of Netflows exceeded xxx (x% of limit) CAUTION physical_ports <hostname>:<name> OK NOTOK The number of Netflows exceeded yyy (y% of limit) OK The number of physical ports exceeded 50400 (95% of limit) DEGRADED The number of physical ports exceeded 40800 (85% of limit) CAUTION policy <hostname>:<name> OK NOTOK The number of physical ports exceeded 36000 (75% of limit) OK The number of policies exceeded 23750 (95% of limit) DEGRADED The number of policies exceeded 21250 (85% of limit) Cisco DNA Center Administrator Guide, Release 2.2.2 12 Configure System Settings Event Notification Information Domain Subdomain Tag scalable_group Instance State Message CAUTION The number of policies exceeded 18750 (75% of limit) <hostname>:<name> OK NOTOK OK The number of scalable groups exceeded 3800 (95% of limit) DEGRADED The number of scalable groups exceeded 3400 (85% of limit) CAUTION sites <hostname>:<name> OK NOTOK The number of scalable groups exceeded 3000 (75% of limit) OK The number of sites exceeded 475 (95% of limit) DEGRADED The number of sites exceeded 425 (85% of limit) CAUTION transient_clients <hostname>:<name> OK NOTOK The number of sites exceeded 375 (75% of limit) OK The number of transient clients exceeded 71250 (95% of limit) DEGRADED The number of transient clients exceeded 63750 (85% of limit) CAUTION Software Upgrade Upgrade <hostname>:<name> OK NOTOK Backup Backup <hostname>:<name> OK NOTOK Restore Restore <hostname>:<name> OK NOTOK The number of transient clients exceeded 56250 (75% of limit) Successfully finished downloading package <package-name> with version <package-version> Catalog package download failed for <package-name> Successfully completed backup Failed to backup Successfully restored Failed to restore configuration Cisco DNA Center Administrator Guide, Release 2.2.2 13 Configure System Settings System Health Scale Numbers Domain Subdomain Tag Connectivity ISE ISE_ERS Instance State <Cisco-ISE-hostname> Success Failed Integrations IPAM IPAM <IPAM-hostname> Ok Critical ISE ISE_AAA <Cisco-ISE-hostname> Up Down CMX CMX Message ISE AAA trust establishment succeeded for ISE server <ISE-server-details> ISE AAA trust establishment failed for ISE server <ISE-server-details> IPAM connection to Cisco DNA Center established. IPAM <IPAM-IP-address>. IPAM connection to Cisco DNA Center offline. IPAM <IPAM-IP-address>. ISE AAA trust establishment succeeded for ISE server. ISE <ISE-IP-address> ISE AAA trust establishment failed for ISE server. ISE <ISE-IP-address> <CMX-hostname> serviceAvailable CMX connection to Cisco DNA Center offline. CMX <CMX-IP-address>. serviceNotAvailable CMX connection to Cisco DNA Center offline. CMX <CMX-IP-address>. ITSM ITSM <ITSM-hostname> Up Down ITSM connection to Cisco DNA Center offline. ITSM <ITSM-IP-address>. ITSM connection to Cisco DNA Center offline. ITSM <ITSM-IP-address>. System Health Scale Numbers Six versions of the second-generation Cisco DNA Center appliance are available: • 44-core appliance: Cisco part number DN2-HW-APL • 44-core promotional appliance: Cisco part number DN2-HW-APL-U • 56-core appliance: Cisco part number DN2-HW-APL-L • 56-core promotional appliance: Cisco part number DN2-HW-APL-L-U • 112-core appliance: Cisco part number DN2-HW-APL-XL • 112-core promotional appliance: Cisco part number DN2-HW-APL-XL-U Cisco DNA Center Administrator Guide, Release 2.2.2 14 Configure System Settings View the System Topology System Health monitors these appliances and generates a notification whenever a network component listed in the following table exceeds a particular threshold. The priority of the notification that's generated depends on the percentage of a threshold that's been measured: • When 75% of a threshold has been exceeded, an information (P3) notification is generated. • When 85% of a threshold has been exceeded, a warning (P2) notification is generated. • When 95% and 105% of a threshold has been exceeded, a critical (P1) notification is generated. Note 1,000,000 notifications are maintained in the audit log for every appliance (regardless of type) and are stored for one year. Network Component 44-Core Appliance 56-Core Appliance 112-Core Appliance Wired devices (routers, 1,000 switches, stacks, and wireless LAN controllers) 2,000 5,000 Wireless devices (access 4,000 points and sensors) 6,000 13,000 Physical ports in inventory 48,000 192,000 480,000 Logical and physical interfaces 1,200,000 1,200,000 1,200,000 Wired clients (concurrent) 25,000 40,000 40,000 Wireless clients (concurrent) 25,000 40,000 60,000 Transient clients 75,000 120,000 250,000 Sites 500 1,000 2,000 Incoming NetFlows 27,500 60,000 120,000 IP pools 50,000 100,000 100,000 Policy matrix size 25,000 25,000 25,000 View the System Topology From the System Health page's topology, you can view a graphical representation of your Cisco DNA Center appliances and the external systems that are connected to your network, such as Cisco Connected Mobile Experiences (Cisco CMX) and Cisco Identity Services Engine (Cisco ISE). Here, you can quickly identify any network components that are experiencing an issue and require further attention. In order to populate this page with appliance and external system data, you must first complete the tasks described in the following topics: Cisco DNA Center Administrator Guide, Release 2.2.2 15 Configure System Settings Troubleshoot Appliance and External System Issues • Establish Cisco IMC Connectivity, on page 7 • Subscribe to System Event Notifications, on page 8 To view this page, click the Menu icon ( ) in the Cisco DNA Center GUI and choose System > System Health. Topology data is polled every 30 seconds. If any new data is received, the topology automatically updates to reflect this data. Note the following: • Cisco DNA Center now supports IPv6. When viewing a cluster on which IPv6 is enabled, the topology also displays the following information for that cluster's Enterprise virtual IP address: • Pre field: 16-bit prefix • GID field: 32-bit global ID • Subnet field: 16-bit subnet value The remainder of the cluster's Enterprise virtual IP address is used to label its topology icon. • An IPv6-enabled cluster can only connect to and retrieve data from external systems that also support IPv6. • Whenever a connected appliance or external system has a certificate installed that's set to expire, the topology does the following: • If a certificate is set to expire within 90 days, the topology displays a warning. • If a certificate is set to expire within 30 days, the topology displays an error to bring your attention to the issue. • System Health runs a hardware compliance check regularly and indicates whenever a connected appliance or external system does not meet the minimum configuration requirements. For example, System Health updates the topology to indicate when the Write Through cache write policy is not set for a connected virtual drive. • If disaster recovery is operational in your production environment, System Health now provides hardware information for the appliances at both the main and recovery site. Previously, hardware information was provided only for main site appliances. Troubleshoot Appliance and External System Issues When viewing the System Health topology, the minor issue icon ( ) and major issue icon ( ) indicate network components that require attention. To begin troubleshooting the issue that a component is experiencing, place your cursor over its topology icon to open a pop-up window that displays the following information: • A timestamp that indicates when the issue was detected. • If you are viewing the pop-up window for a Cisco DNA Center appliance, the Cisco IMC firmware version that is installed on the appliance. • A brief summary of the issue. • The current state or severity of the issue. • The domain, subdomain, and IP address or location associated with the issue. Cisco DNA Center Administrator Guide, Release 2.2.2 16 Configure System Settings Troubleshoot External System Connectivity Issues If you open the pop-up window for a connected external system that has three or more associated servers or a Cisco DNA Center appliance that has three or more hardware components that are experiencing an issue, the More Details link is displayed. Click the link to open a slide-in pane that lists the relevant servers or components. You can then view information for a specific item by clicking > to maximize its entry. Troubleshoot External System Connectivity Issues If Cisco DNA Center is currently unable to communicate with an external system, do the following to ping that system and troubleshoot why it cannot be reached. Before you begin Do the following before you complete this procedure: • Install the Machine Reasoning package. See "Download and Install Packages and Updates" in the Cisco DNA Center Administrator Guide. • Create a role that has write permission to the Machine Reasoning function and assign that role to the user that will complete this procedure. To access this parameter in the Create a User Role wizard, expand the System row in the Define the Access wizard page. For more information, see "Configure Role-Based Access Control" in the Cisco DNA Center Administrator Guide. Step 1 From the top-right portion of the System Health page, choose Tools > Network Ping to open the Ping Device page. The page lists all of the devices that Cisco DNA Center currently manages. Step 2 Click the radio button for any device whose reachablity status is Reachable and then click the Troubleshoot link. The Reasoner Inputs pop-up window opens. Step 3 In the Target IP Address field, enter the IP address of the external system that cannot be reached. Step 4 Click Run Machine Reasoning. A dialog box is displayed after Cisco DNA Center has pinged the external system. Step 5 Click View Details to see whether the ping was successful. Step 6 If the ping failed, click the View Relevant Activities link to open the Activity Details slide-in pane and then click the View Details icon. The Device Command Output pop-up window opens, listing possible causes for the inability to reach the external system. System Topology Notifications The following tables list the various notifications that are displayed in the System Health page's system topology for your Cisco DNA Center appliances and any connected external systems. Notifications are grouped by their corresponding severity: • Severity 1 (Error): Indicates a critical error, such as a disabled RAID controller or faulty power supply. • Severity 2 (Warning): Indicates an issue such as the inability to establish trust with a Cisco ISE server. • Severity 3: (Success): Indicates that a server or hardware component is operating as expected. Cisco DNA Center Administrator Guide, Release 2.2.2 17 Configure System Settings System Topology Notifications Note If all of the hardware components on an appliance are operating without any issues, an individual notification is not provided for each component. The following notification is displayed instead: Cisco DNA Center Ok. Table 2: Cisco DNA Center Appliance Notifications Component Severity 1 Notification Severity 2 Notification Severity 3 Notification CPU Processor CPU1 (SerialNumber xxxxxx) State is Disabled Processor CPU1 (SerialNumber Processor CPU1 (SerialNumber xxxxxx) Health is NotOk and State is xxxxxx) Health is Ok and State is Enabled Enabled Disk Driver - PD1 State is Disabled Driver - PD1 Health is Critical and State is Enabled Driver - PD1 Health is Ok and State is Enabled MemoryV1 Memory Summary (TOTALSYSTEMMEMORYGIB 256) Health is NotOk — Memory Summary (TOTALSYSTEMMEMORYGIB - 256) Health is Ok MemoryV2 Storage DIMM1 (SerialNumber xxxxx) Status is NotOperable — Storage DIMM1 (SerialNumber xxxxx) Status is Operable NIC NIC Adapter Card MLOM State is Disabled NIC Adapter Card MLOM State is Enabled and port0 is Down NIC Adapter Card MLOM State is Enabled and port0 is Up Power supply PowerSupply PSU1 (SerialNumber xxxx) State is Disabled — PowerSupply PSU1 (SerialNumber - xxxx) State is Enabled RAID Cisco 12G SAS Modular Raid Cisco 12G SAS Modular Raid Controller (SerialNumber - xxxxx) State Controller (SerialNumber - xxxxx) is Disabled Health is NotOK and State is Enabled Cisco 12G SAS Modular Raid Controller (SerialNumber - xxxxx) Health is OK and State is Enabled Table 3: Connected External System Notifications Component Severity 1 Notification Cisco Connected — Mobile Experiences (CMX) server Severity 2 Notification Severity 3 Notification There is a critical issue with the integrated CMX server. CMX server is integrated and servicing. Cisco DNA Center Administrator Guide, Release 2.2.2 18 Configure System Settings Suggested Actions Component Severity 1 Notification Severity 2 Notification IP address management (IPAM) server There is a critical issue with the — connected third-party IPAM provider Severity 3 Notification • A third-party IPAM provider is connected. • There is no third-party IPAM provider connected. • The third-party IPAM provider is currently synchronizing. Cisco — ISE—External RESTful Services (ERS) ISE PAN ERS connection: ISE ERS ISE PAN ERS connection: ERS API call unauthorized reachability with ISE - Success Cisco ISE—Trust — ISE AAA Trust Establishment: Trust ISE AAA Trust Establishment: Establishment Error Successfully established trust and discovered PSNs from PAN IT service management (ITSM) server — Servicenow connection health status is NOT up and running Servicenow connection health status is up and running Suggested Actions The following table lists the issues that you will most likely encounter while monitoring the health of your system and suggests actions you can take to remedy those issues. Cisco DNA Center Administrator Guide, Release 2.2.2 19 Configure System Settings Suggested Actions Component Subcomponent Issue Cisco ISE External RESTful Services (ERS)—Reachability Timeout elapsed (possibly because the Cisco ISE ERS API load threshold has been exceeded). Suggested Actions • Check your proxy configuration for a proxy server between Cisco DNA Center and Cisco ISE. • Check whether you can reach Cisco ISE from Cisco DNA Center. Unable to establish a connection with Cisco ISE. • Check whether a firewall is configured. • Check your proxy configuration for a proxy server between Cisco DNA Center and Cisco ISE. • Check whether you can reach Cisco ISE from Cisco DNA Center. ERS—Availability No response to ERS API call. • Check which version of Cisco ISE is installed. • Check if ERS is enabled on Cisco ISE. See the "Enable External RESTful Services APIs" topic in the Cisco Identity Services Engine Administrator Guide for more information. ERS—Authentication Cisco ISE ERS API call is unauthorized. ERS—Configuration Cisco ISE certificate has been changed. From the Cisco DNA Center GUI, reestablish trust. See the "Enable PKI in Cisco ISE" topic in the Cisco Identity Services Engine Administrator Guide for more information. ERS—Unclassified/Generic An undefined diagnostic error Error occurred. Check whether the AAA settings credentials and the Cisco ISE credentials are the same. 1. Delete the AAA settings that are currently configured in Cisco DNA Center. 2. Reenter the appropriate AAA settings. See the "Integrate Cisco ISE with Cisco DNA Center" in the Cisco Digital Network Architecture Center Second Generation Appliance Installation Guide for more information. 3. Reestablish trust. See the "Enable PKI in Cisco ISE" topic in the Cisco Identity Services Engine Administrator Guide for more information. Trust—Reachability Unable to establish an HTTPS connection. Cisco DNA Center Administrator Guide, Release 2.2.2 20 Check whether the AAA settings credentials and the Cisco ISE credentials are the same. Configure System Settings Suggested Actions Component Subcomponent Issue Suggested Actions The Cisco DNA Center endpoint URL configured for Cisco ISE certificate chain uploads is unreachable. • Check your proxy configuration for a proxy server between Cisco DNA Center and Cisco ISE. • Check whether you can reach Cisco ISE from Cisco DNA Center. Trust—Configuration Invalid Cisco ISE certificate chain. • If necessary, regenerate the Cisco ISE internal root CA chain. See the "ISE CA Chain Regeneration" topic in the Cisco Identity Services Engine Administrator Guide for more information. • Ensure that the internal CA certificate chain has not been removed from Cisco ISE. The Cisco DNA Center endpoint URL configured for Cisco ISE certificate chain uploads is forbidden. • Launch the URL and check whether you can access the /aaa/Cisco ISE/certificate directory on the endpoint. • Check whether the Use CSRF Check for Enhanced Security option is enabled in Cisco ISE. See the "Enable External RESTful Services APIs" topic in the Cisco Identity Services Engine Administrator Guide for more information. Trust—Authentication The Cisco ISE password has expired. • Regenerate the Cisco ISE admin password. See the "Administrative Access to Cisco ISE" topic in the Cisco Identity Services Engine Administrator Guide for more information. • Ensure that you can log in to the Cisco ISE GUI. Trust—Unclassified/Generic An undefined diagnostic error Error occurred. Cisco DNA Center Administrator Guide, Release 2.2.2 21 Configure System Settings Supported REST APIs Component Subcomponent Issue Suggested Actions 1. Delete the AAA settings that are currently configured in Cisco DNA Center. 2. Reenter the appropriate AAA settings. See the "Integrate Cisco ISE with Cisco DNA Center" in the Cisco Digital Network Architecture Center Second Generation Appliance Installation Guide for more information. 3. Reestablish trust. See the "Enable PKI in Cisco ISE" topic in the Cisco Identity Services Engine Administrator Guide for more information. Cisco Connected Reachability Mobile Experiences Authentication (CMX) server Unable to establish connectivity with Check whether the server in question is currently down. the server. Unable to log in to the server. IP address management (IPAM) server Confirm that the correct login credentials are configured in Cisco DNA Center. IT service management (ITSM) server Hardware Disk The specified hardware component is Replace the faulty component. experiencing an issue. Fan Power supply Memory module CPU Networking card RAID controller System resources Storage The specified mount directory is full. • Clear up storage space in the current directory by removing unnecessary data. • Specify a new mount directory that has more storage space. Supported REST APIs System Health supports the REST APIs that are listed in the following table. To run any of these APIs, append the following URL with the API's path: https://CDNAC-server-IP-address/api/v1/API-path Cisco DNA Center Administrator Guide, Release 2.2.2 22 Configure System Settings Supported REST APIs Method API Path Description GET diagnostics/system/health Displays the latest health-related events for all connected Cisco DNA Center appliances and external systems. diagnostics/system/health?summary=true Displays the most recent health event with the highest severity. diagnostics/system/health?domain=DNAC-Appliance Displays all hardware events for connected appliances. diagnostics/system/health?domain=Integrations&subdomain-AAA Displays all integration and AAA trust Trust Establishment establishment events. diagnostics/system/health?limit=5 Displays the five latest health-related events. diagnostics/system/performance Summarizes performance information for connected appliances, displaying averages for the past 15 minutes. diagnostics/system/performance?range=now-1h Displays Key Performance Indicator (KPI) metrics for the past hour. diagnostics/system/performance?range=now-1d Displays KPI metrics for the past day. diagnostics/system/performance?range=now-1w Displays KPI metrics for the past week. diagnostics/system/performance?function=max provide max, current value, default is average for the duration specified diagnostics/system/nodes/performance?range=now-1d Displays each connected appliance's KPI metrics for the past day. diagnostics/system/performance?kpi=cpu,memory Displays the CPU and Memory utilization percentages for the default duration, which is 15 minutes. diagnostics/system/nodes/performance/history?kpi=cpu Displays the specified KPI's historical metrics for the default duration. When specifying multiple KPIs, separate them with a comma. diagnostics/system/nodes/performance/history?kpi=cpu&range=now-1d Displays the specified KPI's historical metrics for the past day. /system/health/summary/ Displays the most recent severe cluster event. Cluster events include all hardware component and external subsystem events. /system/health/externalsubsystems/subdomain Displays the most recent event for the specified subdomain. Valid subdomain values include IPAM, ISE, CMX, and ITSM. /system/health/hardware Displays the most recent severe hardware event. Cisco DNA Center Administrator Guide, Release 2.2.2 23 Configure System Settings Sample API Output Method API Path /system/health/hardware/hardware_component Description Displays the most recent event for the specified hardware component. Valid hardware component values include CPU, RAID, MEMORY, POWER, NIC, and DISK. /diagnostics/system/health/externalsubsystems/ISE The output provided by this API will vary, depending on the current state of the connected Cisco ISE server. See Sample API Output, on page 24 for examples of what this output looks like. /diagnostics/system/health/externalsubsystems/IPAM The output provided by this API will vary, depending on the current state of the connected Cisco Prime Network Registrar IP Address Manager (IPAM). See Sample API Output, on page 24 for examples of what this output looks like. Sample API Output The following tables provide examples of the output you will see when you run either the /diagnostics/system/health/externalsubsystems/ISE or /diagnostics/system/health/externalsubsystems/IPAM API. Sample /diagnostics/system/health/externalsubsystems/ISE Output Scenario: A Cisco ISE server has not been integrated with Cisco DNA Center. Output: { "DNAC-Cluster": { "Status": "Warning", "TooltipInfo": "No data available" } } Cisco DNA Center Administrator Guide, Release 2.2.2 24 Configure System Settings Sample API Output Sample /diagnostics/system/health/externalsubsystems/ISE Output Scenario: A Cisco ISE server has been integrated with Cisco DNA Center and is functioning properly. Output: { "DNAC-Cluster": { "Status": "Ok", "Group": "ISE", "Label": { "hostname": "ISE-60-38.example.com", "ip": "172.28.80.37" }, "Family": "ExternalSystems", "Id": 1, "TooltipInfo": [ { "_id": "-429109689", "tenantId": "TNT0", "severity": 3, "timestamp": "1591072373412", "source": "ISE ERS Client", "actualState": "", "description": "ISE PAN ERS connection : ERS reachability with ISE - Success", "group": "ISE", "family": "External Subsystem", "drUsability": "No", "state": "SUCCESS", "eventInstanceIdentity": { "subDomain": "ISE", "domain": "Connectivity", "namespace": "SystemRawEvent", "id": "SYSTEM-EXTERNAL-ISE-PAN-ERS", "type": "SYSTEM", "tags": "ISE_ERS", "event_instance_id": { "component": "primary", "hostname": "ISE-60-38.example.com", "ip": "172.28.80.37" } } } ] } } Cisco DNA Center Administrator Guide, Release 2.2.2 25 Configure System Settings Sample API Output Sample /diagnostics/system/health/externalsubsystems/ISE Output Scenario: A Cisco ISE event with a Warning status has occurred. Output: { "DNAC-Cluster": { "Status": "Warning", "Group": "ISE", "Label": { "hostname": "pi-system-200.example.com", "ip": "10.197.73.213" }, "Family": "ExternalSystems", "Id": 1, "TooltipInfo": [ { "_id": "-440073227", "tenantId": "TNT0", "severity": 2, "timestamp": "1591072804646", "source": "AAA Trust Establishment", "actualState": "", "description": "ISE AAA Trust Establishment : Trust Establishment - Error-IP/FQDN not reachable", "group": "ISE", "family": "External Subsystem", "drUsability": "No", "state": "FAILED", "eventInstanceIdentity": { "subDomain": "ISE", "domain": "Integrations", "namespace": "SystemRawEvent", "id": "SYSTEM-EXTERNAL-ISE-AAA-TRUST", "type": "SYSTEM", "tags": "ISE_AAA", "event_instance_id": { "hostname": "pi-system-200.example.com", "component": "primary", "ip": "10.197.73.213" } } } ] } } Cisco DNA Center Administrator Guide, Release 2.2.2 26 Configure System Settings Sample API Output Sample /diagnostics/system/health/externalsubsystems/ISE Output Scenario: External RESTful Services (ERS) is disabled on a connected Cisco ISE server. Output: { "DNAC-Cluster": { "Status": "Warning", "Group": "ISE", "Label": { "hostname": "csg-nscg-0861.example.com", "ip": "10.63.107.41" }, "Family": "ExternalSystems", "Id": 1, "TooltipInfo": [ { "_id": "-915009445", "tenantId": "TNT0", "severity": 2, "timestamp": "1591357663101", "source": "ISE ERS Client", "actualState": "", "description": "ISE PAN ERS connection : Timeout elapsed", "group": "ISE", "family": "External Subsystem", "state": "FAILED", "eventInstanceIdentity": { "subDomain": "ISE", "domain": "Connectivity", "namespace": "SystemRawEvent", "id": "SYSTEM-EXTERNAL-ISE-PAN-ERS", "type": "SYSTEM", "tags": "ISE_ERS", "event_instance_id": { "hostname": "csg-nscg-0861.example.com", "component": "primary", "ip": "10.63.107.41" } } } ] } } Cisco DNA Center Administrator Guide, Release 2.2.2 27 Configure System Settings Sample API Output Sample /diagnostics/system/health/externalsubsystems/ISE Output Scenario: ERS is enabled on a connected Cisco ISE server. Output: { "DNAC-Cluster": { "Status": "Ok", "Group": "ISE", "Label": { "hostname": "csg-nscg-0861.example.com", "ip": "10.30.148.52" }, "Family": "ExternalSystems", "Id": 1, "TooltipInfo": [ { "_id": "-915009445", "tenantId": "TNT0", "severity": 3, "timestamp": "1591359643926", "source": "ISE ERS Client", "actualState": "", "description": "ISE PAN ERS connection : ERS reachability with ISE Success", "group": "ISE", "family": "External Subsystem", "state": "SUCCESS", "eventInstanceIdentity": { "subDomain": "ISE", "domain": "Connectivity", "namespace": "SystemRawEvent", "id": "SYSTEM-EXTERNAL-ISE-PAN-ERS", "type": "SYSTEM", "tags": "ISE_ERS", "event_instance_id": { "hostname": "csg-nscg-0861.example.com", "component": "primary", "ip": "10.30.148.52" } } } ] } } Sample /diagnostics/system/health/externalsubsystems/IPAM Output Scenario: Cisco Prime Network Registrar IPAM is not connected to Cisco DNA Center. Output: { "DNAC-Cluster": { "Status": "Warning", "TooltipInfo": "No data available" } } Cisco DNA Center Administrator Guide, Release 2.2.2 28 Configure System Settings Sample API Output Sample /diagnostics/system/health/externalsubsystems/IPAM Output Scenario: IPAM is connected to Cisco DNA Center and is functioning properly. Output: { "DNAC-Cluster": { "Status": "Ok", "Group": "IPAM Integration", "Label": { "hostname": "", "ip": "192.168.101.72" }, "Family": "ExternalSystems", "Id": 1, "TooltipInfo": [ { "_id": "1328761079", "tenantId": "TNT0", "severity": 3, "timestamp": "1591072639889", "source": "INFOBLOX: https://192.168.101.72", "actualState": "", "description": "A third-party IPAM provider is connected.", "group": "IPAM", "family": "External Subsystem", "drUsability": "No", "state": "OK", "eventInstanceIdentity": { "subDomain": "IPAM Integration", "domain": "Integrations", "namespace": "SystemRawEvent", "id": "SYSTEM-EXTERNAL-IPAM", "type": "SYSTEM", "tags": "IPAM", "event_instance_id": { "hostname": "", "ip": "192.168.101.72" } } } ] } } Cisco DNA Center Administrator Guide, Release 2.2.2 29 Configure System Settings Cisco DNA Center and Cisco ISE Integration Sample /diagnostics/system/health/externalsubsystems/IPAM Output Scenario: IPAM is connected to Cisco DNA Center and an error has occurred. Output: { "DNAC-Cluster": { "Status": "Error", "Group": "IPAM Integration", "Label": { "hostname": "", "ip": "192.168.101.72" }, "Family": "ExternalSystems", "Id": 1, "TooltipInfo": [ { "_id": "1328761079", "tenantId": "TNT0", "severity": 1, "timestamp": "1591363687041", "source": "INFOBLOX: https://192.168.101.72", "actualState": "", "description": "There is a critical issue with the connected third-party IPAM provider.", "group": "IPAM", "family": "External Subsystem", "state": "CRITICAL", "eventInstanceIdentity": { "subDomain": "IPAM Integration", "domain": "Integrations", "namespace": "SystemRawEvent", "id": "SYSTEM-EXTERNAL-IPAM", "type": "SYSTEM", "tags": "IPAM", "event_instance_id": { "hostname": "", "ip": "192.168.101.72" } } } ] } } Cisco DNA Center and Cisco ISE Integration Cisco ISE has three use cases with Cisco DNA Center: 1. Cisco ISE can be used as a AAA (pronounced "triple A") server for user, device, and client authentication. If you are not using access control policies, or are not using Cisco ISE as a AAA server for device authentication, you do not have to install and configure Cisco ISE. 2. Access control policies use Cisco ISE to enforce access control. Before you create and use access control policies, integrate Cisco DNA Center and Cisco ISE. The process involves installing and configuring Cisco ISE with specific services, and configuring Cisco ISE settings in Cisco DNA Center. For more information about installing and configuring Cisco ISE with Cisco DNA Center, see the Cisco DNA Center Installation Guide. Cisco DNA Center Administrator Guide, Release 2.2.2 30 Configure System Settings Cisco DNA Center and Cisco ISE Integration 3. If your network uses Cisco ISE for user authentication, configure Assurance for Cisco ISE integration. This integration lets you see more information about wired clients, such as the username and operating system, in Assurance. For more information, see "About Cisco ISE Configuration for Cisco DNA Center" in the Cisco DNA Assurance User Guide. After Cisco ISE is successfully registered and its trust established with Cisco DNA Center, Cisco DNA Center shares information with Cisco ISE. Cisco DNA Center devices that are assigned to a site that is configured with Cisco ISE as its AAA server have their inventory data propagated to Cisco ISE. Additionally, any updates on these Cisco DNA Center devices (for example, device credentials) in Cisco DNA Center also updates Cisco ISE with the changes. If a Cisco DNA Center device associated to a site with Cisco ISE as its AAA server is not propagated to Cisco ISE as expected, Cisco DNA Center automatically retries after waiting for a specific time interval. This subsequent attempt occurs when the initial Cisco DNA Center device push to Cisco ISE fails due to any networking issue, Cisco ISE downtime, or any other auto correctable errors. Cisco DNA Center attempts to establish eventual consistency with Cisco ISE by retrying to add the device or update its data to Cisco ISE. However, a retry is not attempted if the failure to propagate the device or device data to Cisco ISE is due to a rejection from Cisco ISE itself, as an input validation error. If you change the RADIUS shared secret for Cisco ISE, Cisco ISE does not update Cisco DNA Center with the changes. To update the shared secret in Cisco DNA Center to match Cisco ISE, edit the AAA server with the new password. Cisco DNA Center downloads the new certificate from Cisco ISE, and updates Cisco DNA Center. Cisco ISE does not share existing device information with Cisco DNA Center. The only way for Cisco DNA Center to know about the devices in Cisco ISE is if the devices have the same name in Cisco DNA Center; Cisco DNA Center and Cisco ISE uniquely identify devices for this integration through the device's hostname variable. Note The process that propagates Cisco DNA Center inventory devices to Cisco ISE and updates the changes to it are all captured in the Cisco DNA Center audit logs. If there are any issues in the Cisco DNA Center-to-Cisco ISE workflow, view the audit logs in the Cisco DNA Center GUI for information. Cisco DNA Center integrates with the primary Administration ISE node. When you access Cisco ISE from Cisco DNA Center, you connect with this node. Cisco DNA Center polls Cisco ISE every 15 minutes. If the Cisco ISE server is down, Cisco DNA Center shows the Cisco ISE server as red (unreachable). When the Cisco ISE server is unreachable, Cisco DNA Center increases polling to 15 seconds, and then doubles the polling time to 30 seconds, 1 minute, 2 minutes, 4 minutes, and so on, until it reaches the maximum polling time of 15 minutes. Cisco DNA Center continues to poll every 15 minutes for 3 days. If Cisco DNA Center does not regain connectivity, it stops polling and updates the Cisco ISE server status to Untrusted. If this happens, you must reestablish trust between Cisco DNA Center and the Cisco ISE server. Review the following additional requirements and recommendations to verify Cisco DNA Center and Cisco ISE integration: • Cisco DNA Center and Cisco ISE integration is not supported over a proxy server. If you have Cisco ISE configured with a proxy server in your network, configure Cisco DNA Center such that it does not use the proxy server; it can do this by bypassing the proxy server's IP address. Cisco DNA Center Administrator Guide, Release 2.2.2 31 Configure System Settings Anonymize Data • Cisco DNA Center and Cisco ISE integration is not supported through a Cisco DNA Center virtual IP address (VIP). If you are using an enterprise CA-issued certificate for Cisco DNA Center, make sure the Cisco DNA Center certificate includes the IP addresses of all interfaces on Cisco DNA Center in the Subject Alternative Name (SAN) extension. If Cisco DNA Center is a three-node cluster, the IP addresses of all interfaces from all three nodes must be included in the SAN extension of the Cisco DNA Center certificate. • You must have Admin-level access in Cisco ISE. • Disable password expiry for the Admin user in Cisco ISE. Alternatively, make sure that you update the password before it expires. For more information, see the Cisco Identity Services Engine Administrator Guide. • When the Cisco ISE certificate changes, Cisco DNA Center must be updated. To do that, edit the AAA server (Cisco ISE), reenter the password, and save. This forces Cisco DNA Center to download the certificate chain for the new admin certificate from Cisco ISE, and update Cisco DNA Center. If you are using Cisco ISE in HA mode, and the admin certificate changes on either the primary or secondary administrative node, you must update Cisco DNA Center. • Cisco DNA Center configures certificates for itself and for Cisco ISE to connect over pxGrid. You can use other certificates with pxGrid for connections to other pxGrid clients, such as Firepower. These other connections do not interfere with the Cisco DNA Center and Cisco ISE pxGrid connection. • You can change the RADIUS secret password. You provided the secret password when you configured Cisco ISE as a AAA server under System > Settings > External Services > Authentication and Policy Servers. To change the secret password, choose Design > Network Settings > Network and click the Change Shared Secret link. This causes Cisco ISE to use the new secret password when connecting to network devices managed by Cisco DNA Center. • Cisco DNA Center supports certificate revocation checks via CRL Distribution Point (CDP) and Online Certificate Status Protocol (OCSP). During integration, Cisco DNA Center receives the Cisco ISE admin certificate over port 9060 and verifies its validity based on the CDP and OCSP URLs inside that Cisco ISE admin certificate. If both CDP (which contains a list of CRLs) and OCSP are configured, Cisco DNA Center uses OCSP to verify the revocation status of the certificate and falls back to CDP if the OCSP URL is not accessible. If there are multiple CRLs present in CDP, Cisco DNA Center contacts the next CRL if the first CRL is not reachable. However, due to a JDK PKI Oracle bug, the system does not check for all CRL entries. Proxy is not supported for certificate verification. Cisco DNA Center contacts the CRL and OCSP servers without proxy. • OCSP and CRL entries are optional in the certificate. • LDAP is not supported as a protocol for certificate validation. Do not include LDAP URLs in CDP or AIA extensions. • All URLs in CDP and OCSP must be reachable from Cisco DNA Center. Unreachable URLs can cause a poor integration experience, including a failed integration. Anonymize Data Cisco DNA Center allows you to anonymize wired and wireless endpoints data. You can scramble personally identifiable data, such as the user ID and device hostname of wired and wireless endpoints. Cisco DNA Center Administrator Guide, Release 2.2.2 32 Configure System Settings Configure Authentication and Policy Servers Make sure that you enable anonymization before you run Discovery. If you anonymize the data after you run Discovery, the new data coming into the system is anonymized, but the existing data is not anonymized. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Data. The Anonymize Data window is displayed. Step 2 Check the Enable Anonymization check box. Step 3 Click Save. After you enable anonymization, you can only search for the device using nonanonymized information such as the MAC address, IP address, so on. ) and choose System > Settings > Trust & Privacy > Anonymize Configure Authentication and Policy Servers Cisco DNA Center uses AAA servers for user authentication and Cisco ISE for both user authentication and access control. Use this procedure to configure AAA servers, including Cisco ISE. Before you begin • If you are using Cisco ISE to perform both policy and AAA functions, make sure that Cisco DNA Center and Cisco ISE are integrated. • If you are using another product (not Cisco ISE) to perform AAA functions, make sure to do the following: • Register Cisco DNA Center with the AAA server, including defining the shared secret on both the AAA server and Cisco DNA Center. • Define an attribute name for Cisco DNA Center on the AAA server. • For a Cisco DNA Center multihost cluster configuration, define all individual host IP addresses and the virtual IP address for the multihost cluster on the AAA server. • Before you configure Cisco ISE, confirm that: 1. You deployed Cisco ISE 2.3 or later in your network. If you have a multihost Cisco ISE deployment, integrate with the Cisco ISE admin node. 2. The pxGrid service is enabled on the Cisco ISE host with which you plan to integrate Cisco DNA Center, and the ERS service is enabled for read/write operations. Note Cisco ISE 2.4 and later supports pxGrid 2.0 and pxGrid 1.0. Although pxGrid 2.0 allows up to four pxGrid nodes in the Cisco ISE deployment, Cisco DNA Center does not currently support more than two pxGrid nodes. 3. The Cisco ISE GUI and Cisco ISE shell username and passwords are the same. 4. There is no proxy configured between Cisco DNA Center and Cisco ISE. If a proxy server is configured on Cisco ISE, the Cisco DNA Center IP address must bypass that proxy server. Cisco DNA Center Administrator Guide, Release 2.2.2 33 Configure System Settings Configure Authentication and Policy Servers 5. There is no firewall between Cisco DNA Center and Cisco ISE. If there is a firewall, open the communication between Cisco DNA Center and Cisco ISE. 6. A ping between Cisco DNA Center and Cisco ISE succeeds with both the IP address and hostname. 7. The Cisco ISE admin node certificate contains the Cisco ISE IP address or FQDN in either the certificate subject name or the SAN. 8. If a certificate signed by your internal certificate authority (CA) is used, the certificate includes all IP addresses in the SAN field. 9. The pxGrid approval is set for automatic or manual approval in Cisco ISE to enable the pxGrid connection in Cisco DNA Center. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Authentication and Policy Servers. Step 2 Click Add. Step 3 Configure the primary AAA server by providing the following information: ) and choose System > Settings > External Services > • Server IP Address: IP address of the AAA server. • Shared Secret: Key for device authentications. The shared secret can contain up to 100 characters. Step 4 To configure a AAA server (not Cisco ISE), leave the Cisco ISE Server toggle to Off and proceed to the next step. To configure a Cisco ISE server, set the Cisco ISE server toggle to On and enter information in the following fields: • Username: Name that is used to log in to the Cisco ISE CLI. Note This user must be a Super Admin. • Password: Password for the Cisco ISE CLI username. • FQDN: Fully qualified domain name (FQDN) of the Cisco ISE server. Note • We recommend that you copy the FQDN that is defined in Cisco ISE (Administration > Deployment > Deployment Nodes > List) and paste it directly into this field. • The FQDN that you enter must match the FQDN, Common Name (CN), or Subject Alternative Name (SAN) defined in the Cisco ISE certificate. The FQDN consists of two parts, a hostname and the domain name, in the following format: hostname.domainname.com Example: The FQDN for a Cisco ISE server can be ise.cisco.com. • Virtual IP Address(es): Virtual IP address of the load balancer behind which the Cisco ISE policy service nodes (PSNs) are located. If you have multiple PSN farms behind different load balancers, you can enter a maximum of six virtual IP addresses. Cisco DNA Center Administrator Guide, Release 2.2.2 34 Configure System Settings Configure Cisco AI Network Analytics Data Collection Note After the required information is provided, Cisco ISE is integrated with Cisco DNA Center in two phases. It takes several minutes for the integration to complete. The phase-wise integration status is shown in the Authentication and Policy Servers page and System 360 page as follows: Cisco ISE server registration phase: • Authentication and Policy Servers page: "In Progress" • System 360 page: "Primary Available" pxGrid subscriptions registration phase: • Authentication and Policy Servers page: "Active" • System 360 page: "Primary Available" and "PXGRID Available" If the status of the configured Cisco ISE server is "FAILED" due to a password change, click Retry, and update the password to resynchronize the Cisco ISE connectivity. Step 5 Click View Advanced Settings and configure the settings: • Protocol: TACACS and RADIUS (the default). You can select both protocols. Attention If you do not enable TACAS for a Cisco ISE server here, you cannot configure the Cisco ISE server as a TACACS server under Design > Network Settings > Network when configuring a AAA server for network device authentication. • Authentication Port: Port used to relay authentication messages to the AAA server. The default is UDP port 1812. • Accounting Port: Port used to relay important events to the AAA server. The information in these events is used for security and billing purposes. The default UDP port is 1813. • Port: Port used by TACAS. Cisco DNA Center supports only port 49 for TACACS; do not change the port number. • Retries: Number of times that Cisco DNA Center attempts to connect with the AAA server before abandoning the attempt to connect. The default number of attempts is 3. • Timeout: Length of time the device waits for the AAA server to respond before abandoning the attempt to connect. The default timeout is 4 seconds. Step 6 Click Add. Step 7 To add a secondary server, repeat the preceding steps. Configure Cisco AI Network Analytics Data Collection Use this procedure to enable Cisco AI Network Analytics to export network event data from wireless controllers as well as the site hierarchy to the Cisco DNA Center. Before you begin • Make sure that you have the Cisco DNA Advantage software license for Cisco DNA Center. The AI Network Analytics application is part of the Cisco DNA Advantage software license. Cisco DNA Center Administrator Guide, Release 2.2.2 35 Configure System Settings Configure Cisco AI Network Analytics Data Collection • Make sure that you have downloaded and installed the AI Network Analytics application. See Download and Install Packages and Updates, on page 76. • Make sure that your network or HTTP proxy is configured to allow outbound HTTPS (TCP 443) access to the following cloud hosts: • api.use1.prd.kairos.ciscolabs.com (US East Region) • api.euc1.prd.kairos.ciscolabs.com (EU Central Region) Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Step 2 Scroll down to External Services and choose Cisco AI Analytics. The AI Network Analytics window appears. Step 3 Do one of the following: ) and choose System > Settings. • If you have an earlier version of Cisco AI Network Analytics installed in your appliance, do the following: a. Click Recover from a config file. The Restore AI Network Analytics window appears. b. Drag-and-drop the configuration files in the area provided or choose the files from your file system. c. Click Restore. Cisco AI Network Analytics might take a few minutes to restore, and then the Success dialog box appears. • If this is the first time you are configuring Cisco AI Network Analytics, do the following: a. Click Configure. b. In the Where should we securely store your data? area, choose the location to store your data. Options are: Europe (Germany) or US East (North Virginia). The system starts testing cloud connectivity as indicated by the Testing cloud connectivity... tab. After cloud connectivity testing completes, the Testing cloud connectivity... tab changes to Cloud connection verified. c. Click Next. The terms and conditions window appears. d. Click the Accept Cisco Universal Cloud Agreement check box to agree to the terms and conditions, and then click Enable. Cisco DNA Center Administrator Guide, Release 2.2.2 36 Configure System Settings Disable Cisco AI Network Analytics Data Collection Cisco AI Network Analytics might take a few minutes to enable, and then the Success dialog box appears. Step 4 In the Success dialog box, click Okay. The AI Network Analytics window appears, and the Cloud Connection area displays Step 5 (Recommended) In the AI Network Analytics window, click Download Configuration file. . Disable Cisco AI Network Analytics Data Collection To disable Cisco AI Network Analytics data collection, you must turn off (disable) the connection to the Cisco AI Network Analytics cloud service. This will disable all of the Cisco AI Network Analytics-related features, such as AI-Driven Issues, Network Heatmap, Site Comparison, and Peer Comparison. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Step 2 Scroll down to External Services and choose Cisco AI Analytics. The AI Network Analytics window appears. Step 3 In the Cloud Connection area, click the button to off, such that Step 4 Click Update. Step 5 To delete your network data from the Cisco AI Network Analytics cloud, contact the Cisco Technical Response Center (TAC) and open a support request. Step 6 (Optional) If you have misplaced your previous configuration, click Download configuration file. ) and choose System > Settings. appears. Update the Machine Reasoning Knowledge Base Machine Reasoning knowledge packs are step-by-step workflows that are used by the Machine Reasoning Engine (MRE) to identify security issues and improve automated root cause analysis. These knowledge packs are continuously updated as more information is received. The Machine Reasoning Knowledge Base is a repository of these knowledge packs (workflows). To have access to the latest knowledge packs, you can Cisco DNA Center Administrator Guide, Release 2.2.2 37 Configure System Settings Cisco Accounts either configure Cisco DNA Center to automatically update the Machine Reasoning Knowledge Base on a daily basis, or you can perform a manual update. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Step 2 Scroll down to External Services and choose Machine Reasoning Knowledge Base. The Machine Reasoning Knowledge Base window shows the following information: ) and choose System > Settings. • INSTALLED: Shows the installed version and installation date of the Machine Reasoning Knowledge Base package. When there is a new update to the Machine Reasoning Knowledge Base, the AVAILABLE UPDATE area appears in the Machine Reasoning Knowledge Base window, which provides the Version and Details about the update. • AUTO UPDATE: Automatically updates the Machine Reasoning Knowledge Base in Cisco DNA Center on a daily basis. Step 3 (Recommended) Check the AUTO UPDATE check box to automatically update the Machine Reasoning Knowledge Base. The Next Attempt area shows the date and time of the next update. You can perform an automatic update only if Cisco DNA Center is successfully connected to the Machine Reasoning Engine in the cloud. Step 4 To manually update the Machine Reasoning Knowledge Base in Cisco DNA Center, do one of the following: • Under AVAILABLE UPDATES, click Update. A Success pop-up window appears with the status of the update. • Manually download the Machine Reason Knowledge Base to your local machine and import it to Cisco DNA Center. Do the following: a. Click Download. The Opening mre_workflow_signed dialog box appears. b. Open or save the downloaded file to the desired location in your local machine, and then click OK. c. Click Import to import the downloaded Machine Reasoning Knowledge Base from your local machine to Cisco DNA Center. Cisco Accounts Configure Cisco Credentials You can configure Cisco credentials for Cisco DNA Center. Cisco credentials are the username and password that you use to log in to the Cisco website to access software and services. Note The Cisco credentials configured for Cisco DNA Center using this procedure are used for software image and update downloads. The Cisco credentials are also encrypted by this process for security purposes. Cisco DNA Center Administrator Guide, Release 2.2.2 38 Configure System Settings Clear Cisco Credentials Before you begin Only a user with SUPER-ADMIN-ROLE permissions can perform this procedure. For more information, see About User Roles, on page 79. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Credentials. Step 2 Enter your Cisco username and password. Step 3 Click Save. ) and choose System > Settings > Cisco Accounts > Cisco.com Your cisco.com credentials are configured for the software and services. Clear Cisco Credentials To delete the cisco.com credentials that are currently configured for Cisco DNA Center, complete the following procedure. Note • When you perform any tasks that involve software downloads or device provisioning and cisco.com credentials are not configured, you will be prompted to enter them before you can proceed. In the resulting dialog box, check the Save For Later check box in order to save these credentials for use throughout Cisco DNA Center. Otherwise, you will need to enter credentials each time you perform these tasks. • Completing this procedure will undo your acceptance of the end-user license agreement (EULA). See Accept the License Agreement, on page 45 for a description of how to re-enter EULA acceptance. Before you begin Only a user with SUPER-ADMIN-ROLE permissions can perform this procedure. For more information, see About User Roles, on page 79. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Credentials. Step 2 Click Clear. Step 3 In the resulting dialog box, click Continue to confirm the operation. ) and choose System > Settings > Cisco Accounts > Cisco.com Configure Connection Mode The Connection mode manages the connections between smart-enabled devices in your network that interact with Cisco DNA Center and the Cisco Smart Software Manager (SSM). Ensure that you have SUPER-ADMIN access permission to configure the different connection modes. Cisco DNA Center Administrator Guide, Release 2.2.2 39 Configure System Settings Register Plug and Play Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Connection Mode. ) and choose System > Settings > Cisco Accounts > SSM The following connection modes are available: • Direct • On-Prem CSSM • Smart Proxy Step 2 Choose Direct to enable a direct connection to the Cisco SSM cloud. Step 3 If your organization is security sensitive, choose On-Prem CSSM. The on-prem option lets you access a subset of Cisco SSM functionality without using a direct internet connection to manage your licenses with the Cisco SSM cloud. a) Before you enable On-Prem CSSM, make sure that the satellite is deployed, up, and running in your network site. b) Enter the details for the On-Prem CSSM Host, Smart Account Name, Client Id, and Client Secret. For information about how to retrieve the client ID and client secret, see the Cisco Smart Software Manager On-Prem User Guide. c) Click Test Connection to validate the CSSM connection. d) Click Save and then Confirm. Caution Step 4 If there are any smart-enabled devices in your Cisco DNA Center inventory that are already registered with Cisco SSM, those devices are deregistered from Cisco SSM. After deregistration, Cisco DNA Center inventory-managed devices go into Evaluation License mode, and network performance might degrade or an outage might occur until these devices are registered again. Therefore, we recommend that you perform this operation during a maintenance window. Choose Smart Proxy to register your smart-enabled devices with the Cisco SSM cloud through Cisco DNA Center. With this mode, devices do not need a direct connection to the Cisco SSM cloud. Cisco DNA Center proxies the requests from the device to the Cisco SSM cloud through itself. Register Plug and Play You can register Cisco DNA Center as a controller for Cisco Plug and Play (PnP) Connect, in a Cisco Smart Account for redirection services. This lets you synchronize the device inventory from the Cisco PnP Connect cloud portal to PnP in Cisco DNA Center. Before you begin Only a user with SUPER-ADMIN-ROLE or CUSTOM-ROLE with system management permissions can perform this procedure. In the Smart account, users are assigned roles that specify the functions and authorized to perform: • Smart Account Admin user can access all the Virtual Accounts. • Users can access assigned Virtual Accounts only. Cisco DNA Center Administrator Guide, Release 2.2.2 40 Configure System Settings Configure Smart Account Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Connect. A table of PnP connected profiles is displayed. Step 2 Click Register to register a virtual account. Step 3 In the Register Virtual Account window, the Smart Account you configured is displayed in the Select Smart Account drop-down list. You can select account from the Select Virtual Account drop-down list. Step 4 Click the required Controller radio button. Step 5 Enter the IP address or FQDN (Fully Qualified Domain Name). Step 6 Enter the profile name. A profile is created for the selected virtual account with the configuration you provided. Step 7 Click Save. ) and choose System > Settings > Cisco Accounts > PnP Configure Smart Account Cisco Smart Account credentials are used for connecting to your Smart Licensing account. The License Manager tool uses the details of license information from this Smart Account for entitlement and license management. Before you begin Ensure that you have SUPER-ADMIN-ROLE permissions. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Account. Step 2 Click the Add button. You are prompted to provide Smart Account credentials. ) and choose System > Settings > Cisco Accounts > Smart a) Enter your Smart Account username and password. b) Click Save. Your Smart Account is configured. Step 3 If you want to change the selected Smart Account Name, click Change. You will be prompted to Select the Smart Account that will be used for connecting to your Smart Licensing Account on Cisco SSM cloud. a) Choose the Smart Account from the drop-down list. b) Click Save. Step 4 Click View all virtual accounts to view all the virtual accounts associated with the Smart Account. Note Cisco Accounts supports multiple smart and virtual accounts. Step 5 (Optional) If you want to register smart license-enabled devices automatically to a virtual account, check the Auto register smart license enabled devices check box. A list of virtual accounts associated with the smart account is displayed. Step 6 Select the required virtual account. Whenever a smart license-enabled device is added in the inventory, it will be automatically registered to the selected virtual account. Cisco DNA Center Administrator Guide, Release 2.2.2 41 Configure System Settings Smart Licensing Smart Licensing Cisco Smart Licensing is a flexible licensing model that provides you with an easier, faster, and more consistent way to purchase and manage software across the Cisco portfolio and across your organization. And it's secure—you control what users can access. With Smart Licensing, you get: • Easy Activation: Smart Licensing establishes a pool of software licenses that can be used across the entire organization—no more product activation keys (PAKs). • Unified Management: My Cisco Entitlements (MCE) provides a complete view into all of your Cisco products and services in an easy-to-use portal, so you always know what you have and what you are using. • License Flexibility: Your software is not node-locked to your hardware, so you can easily use and transfer licenses as needed. To use Smart Licensing, you must first set up a Smart Account on Cisco Software Central (software.cisco.com). For a more detailed overview on Cisco licensing, go to cisco.com/go/licensingguide. Before you begin • To enable Smart Licensing, you must configure Cisco Credentials (see Configure Cisco Credentials, on page 38) and upload Cisco DNA Center license conventions in Cisco SSM. • Smart Licensing is not supported when the System > Settings > Cisco Accounts > SSM Connection Mode is On-Prem CSSM. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Licensing. ) and choose System > Settings > Cisco Accounts > Smart By default, Smart User and Smart Domain details are displayed. Step 2 Choose a virtual account from the Search Virtual Account drop-down list to register. Step 3 Click Register. Step 4 After successful registration, click the View Available Licenses link to view the available Cisco DNA Center licenses. Device Controllability Device controllability is a system-level process on Cisco DNA Center that enforces state synchronization for some device-layer features. Its purpose is to aid in the deployment of network settings that Cisco DNA Center needs to manage devices. Changes are made on network devices when running discovery, when adding a device to inventory, or when assigning a device to a site. To view the configuration that is pushed to the device, go to Provision > Inventory and from the Focus drop-down list, choose Provision. In the Provision Status column, click See Details. Cisco DNA Center Administrator Guide, Release 2.2.2 42 Configure System Settings Device Controllability Note When Cisco DNA Center configures or updates devices, the transactions are captured in the audit logs, which you can use to track changes and troubleshoot issues. The following device settings are enabled as part of device controllability: • Device Discovery • SNMP Credentials • NETCONF Credentials • Adding Devices to Inventory Cisco TrustSec (CTS) Credentials Note Cisco TrustSec (CTS) Credentials are pushed during inventory only if the Global site is configured with Cisco ISE as AAA. Otherwise, CTS is pushed to devices during "Assign to Site" when the site is configured with Cisco ISE as AAA. • Assigning Devices to a Site • Controller Certificates • SNMP Trap Server Definitions • Syslog Server Definitions • NetFlow Server Definitions • Wireless Service Assurance (WSA) • IPDT Enablement Device controllability is enabled by default. If you do not want device controllability enabled, disable it manually. For more information, see Configure Device Controllability, on page 44. When device controllability is disabled, Cisco DNA Center does not configure any of the preceding credentials or features on devices while running discovery or when the devices are assigned to a site. However, the telemetry settings and related configuration are pushed when the device is provisioned or when the Update Telemetry Settings action is performed from Provision > Inventory > Actions. At the time of the network settings creation on the site, if device controllability is enabled, the associated devices are configured accordingly. The following circumstances dictate whether or not device controllability configures network settings on devices: • Device Discovery: If SNMP and NETCONF credentials are not already present on a device, these settings are configured during the discovery process. • Device in Inventory: After a successful initial inventory collection, IPDT is configured on the devices. In earlier releases, the following IPDT commands were configured: Cisco DNA Center Administrator Guide, Release 2.2.2 43 Configure System Settings Configure Device Controllability ip device tracking ip device tracking probe delay 60 ip device tracking probe use-svi For each interface: interface $physicalInterface ip device tracking maximum 65535 In the current release, the following IPDT commands are configured for any newly discovered device: device-tracking tracking device-tracking policy IPDT_POLICY tracking enable For each interface: interface $physicalInterface device-tracking attach-policy IPDT_POLICY • Device in Global Site: When you successfully add, import, or discover a device, Cisco DNA Center places the device in the Managed state and assigns it to the Global site by default. Even if you have defined SNMP server, Syslog server, and NetFlow collector settings for the Global site, Cisco DNA Center does not change these settings on the device. • Device Moved to Site: If you move a device from the Global site to a new site that has SNMP server, Syslog server, and NetFlow collector settings configured, Cisco DNA Center changes these settings on the device to the settings configured for the new site. • Device Removed from Site: If you remove a device from a site, Cisco DNA Center does not remove the SNMP server, Syslog server, and NetFlow collector settings from the device. • Device Deleted from Cisco DNA Center: If you delete a device from Cisco DNA Center and check the Configuration Clean-up check box, the SNMP server, Syslog server, and NetFlow collector settings are removed from the device. • Device Moved from Site to Site: If you move a device—for example, from Site A to Site B—Cisco DNA Center replaces the SNMP server, Syslog server, and NetFlow collector settings on the device with the settings assigned to Site B. • Update Site Telemetry Changes: The changes made to any settings that are under the scope of device controllability are applied to the network devices during device provisioning or when the Update Telemetry Settings action is performed, even if device controllability is not enabled. Configure Device Controllability Device controllability aids deployment of the required network settings that Cisco DNA Center needs to manage devices. Note If you disable device controllability, none of the credentials or features described in the Device Controllability page will be configured on the devices during discovery or at runtime. Device controllability is enabled by default. To manually disable device controllability, do the following: Cisco DNA Center Administrator Guide, Release 2.2.2 44 Configure System Settings Accept the License Agreement Step 1 In the Cisco DNA Center GUI, click the Menu icon ( ) and choose System > Settings > Device Settings > Device Controllability. Step 2 Uncheck the Enable Device Controllability check box. Step 3 Click Save. Accept the License Agreement You must accept the end-user license agreement (EULA) before downloading software or provisioning a device. Note If you have not yet configured cisco.com credentials, you are prompted to configure them in the Device EULA Acceptance window before proceeding. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( EULA Acceptance. Step 2 Click the Cisco End User License Agreement link and read the EULA. Step 3 Check the I have read and accept the Device EULA check box. Step 4 Click Save. ) and choose System > Settings > Device Settings > Device Cloud Access Keys You can register cloud access keys after installing the Cloud Device Provisioning Application package in Cisco DNA Center. The system supports multiple cloud access keys. Each key is used as a separate cloud profile that contains all the AWS infrastructure constructs or resources that are discovered by using that cloud access key. After a cloud access key is added, AWS VPC inventory collection is triggered automatically for it. The AWS infrastructure constructs resources that get discovered by VPC inventory collection for that cloud access key that can then be viewed and used for cloud provisioning of CSRs and WLCs. Before you begin • Obtain the access key ID and secret key from the Amazon Web Services (AWS) console. • Subscribe to CSR or WLC products in the AWS marketplace and verify the image ID for the target region. • Identify the key pair that CSRs will use during HA failover on AWS. The key pair's name is selected from a list in Cisco DNA Center when provisioning CSRs in that region. • Identify the IAM role that CSRs will use during HA failover on AWS. The IAM role is selected from a list in Cisco DNA Center when provisioning CSRs. Cisco DNA Center Administrator Guide, Release 2.2.2 45 Configure System Settings Integrity Verification • Configure the proxy for Cisco DNA Center to communicate with AWS via HTTPS REST APIs. See Configure the Proxy, on page 54. • The Cloud Connect extension to the eNFV app is enabled by deploying a separate Cloud Device Provisioning Application package. The package is not included by default in the standard Cisco DNA Center installation. You must download and install the package from a catalog server. For more information, see Download and Install Packages and Updates, on page 76. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Step 2 Click Add. Step 3 Enter the Access Key Name and choose the Cloud Platform from the drop-down list. Enter the Access Key ID and Secret Key obtained from the AWS console. Step 4 Click Save and Discover. ) and choose System > Settings > Cloud Access Keys. What to do next • After a cloud access key is added, AWS VPC inventory collection is triggered automatically for it. It takes several minutes to synchronize with the cloud platform. Inventory collection is scheduled to occur at the default interval. • After successful cloud inventory collection, the Cloud tab in the Provision section provides a view of the collected AWS VPC inventory. Integrity Verification Integrity Verification (IV) monitors key device data for unexpected changes or invalid values that indicate possible compromise, if any, of the device. The objective is to minimize the impact of a compromise by substantially reducing the time to detect unauthorized changes to a Cisco device. Note For this release, IV runs integrity verification checks on software images that are uploaded into Cisco DNA Center. To run these checks, the IV service needs the Known Good Value (KGV) file to be uploaded. Upload the KGV File To provide security integrity, Cisco devices must be verified as running authentic and valid software. Currently, Cisco devices have no point of reference to determine whether they are running authentic Cisco software. IV uses a system to compare the collected image integrity data with the KGV for Cisco software. Cisco produces and publishes a KGV data file that contains KGVs for many of its products. This KGV file is in standard JSON format, is signed by Cisco, and is bundled with other files into a single KGV file that can be retrieved from the Cisco website. The KGV file is posted at: https://tools.cisco.com/cscrdr/security/center/files/trust/Cisco_KnownGoodValues.tar Cisco DNA Center Administrator Guide, Release 2.2.2 46 Configure System Settings Upload the KGV File The KGV file is imported into IV and used to verify integrity measurements obtained from the network devices. Note Device integrity measurements are made available to and used entirely within the IV. Connectivity between IV and cisco.com is not required. The KGV file can be air-gap transferred into a protected environment and loaded into the IV. Before you begin Only a user with SUPER-ADMIN-ROLE permissions can perform this procedure. For more information, see About User Roles, on page 79. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Verification. Step 2 Review the current KGV file information: ) and choose System > Settings > External Services > Integrity • File Name: Name of the KGV tar file. • Imported By: Cisco DNA Center user who imported the KGV file. If it is automatically downloaded, the value is System. • Imported Time: Time at which the KGV file is imported. • Imported Mode: Local or remote import mode. • Records: Records processed. • File Hash: File hash for the KGV file. • Published: Publication date of the KGV file. Step 3 To import the KGV file, perform one of the following steps: • Click Import New from Local to import a KGV file locally. • Click Import Latest from Cisco to import a KGV file from cisco.com. Note Step 4 The Import Latest from Cisco option does not require a firewall setup. However, if a firewall is already set up, only the connections to https://tools.cisco.com must be open. If you clicked Import Latest from Cisco, a connection is made to cisco.com and the latest KGV file is automatically imported to Cisco DNA Center. Note A secure connection to https://tools.cisco.com is made using the certificates added to Cisco DNA Center and its proxy (if one was configured during the first-time setup). Step 5 If you clicked Import New from Local, the Import KGV window appears. Step 6 Perform one of the following procedures to import locally: • Drag and drop a local KGV file into the Import KGV field. • Click Click here to select a KGV file from your computer to select a KGV file from a folder on your computer. Cisco DNA Center Administrator Guide, Release 2.2.2 47 Configure System Settings Configure an IP Address Manager • Click the Latest KGV file link and download the latest KGV file before dragging and dropping it into the Import KGV field. Step 7 Click Import. The KGV file is imported into Cisco DNA Center. Step 8 After the import is finished, verify the current KGV file information in the UI to ensure that it has been updated. IV automatically downloads the latest KGV file from cisco.com to your system 7 days after Cisco DNA Center is deployed. The auto downloads continue every 7 days. You can also download the KGV file manually to your local system and then import it to Cisco DNA Center. For example, if a new KGV file is available on a Friday and the auto download is every 7 days (on a Monday), you can download it manually. The following KGV auto download information is displayed: • Frequency: The frequency of the auto download. • Last Attempt: The last time the KGV scheduler was triggered. • Status: The status of the KGV scheduler's last attempt. • Message: A status message. What to do next After importing the latest KGV file, choose Design > Image Repository to view the integrity of the imported images. Note The effect of importing a KGV file can be seen in the Image Repository window, if the images that are already imported have an Unable to verify status (physical or virtual). Additionally, future image imports, if any, will also refer to the newly uploaded KGV for verification. Configure an IP Address Manager You can configure Cisco DNA Center to communicate with an external IP address manager. When you use Cisco DNA Center to create, reserve, or delete any IP address pool, Cisco DNA Center conveys this information to your external IP address manager. Before you begin • You should have an external IP address manager already set up and functional. • Import the IPAM certificate manually to the trustpool. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Address Manager. Step 2 In the IP Address Manager section, enter the required information in the following fields: Cisco DNA Center Administrator Guide, Release 2.2.2 48 ) and choose System > Settings > External Services > IP Configure System Settings Configure Debugging Logs • Server Name: Name of server. • Server URL: IP address of server. • Username: Required username for server access. • Password: Required password for server access. • Provider: Choose a provider from the drop-down list. Note If you choose BlueCat as your provider, ensure that your user has been granted API access in the BlueCat Address Manager. See your BlueCat documentation for information about configuring API access for your user or users. • View: Choose a view from the drop-down list. If you only have one view configured, only default appears in the drop-down list. Step 3 Click Apply to apply and save your settings. What to do next Click the System 360 tab and verify the information to ensure that your external IP address manager configuration succeeded. Configure Debugging Logs To assist in troubleshooting service issues, you can change the logging level for the Cisco DNA Center services. A logging level determines the amount of data that is captured in the log files. Each logging level is cumulative; that is, each level contains all the data generated by the specified level and higher levels, if any. For example, setting the logging level to Info also captures Warn and Error logs. We recommend that you adjust the logging level to assist in troubleshooting issues by capturing more data. For example, by adjusting the logging level, you can capture more data to review in a root cause analysis or RCA support file. The default logging level for services is informational (Info). You can change the logging level from informational to a different logging level (Debug or Trace) to capture more information. Caution Note Due to the type of information that might be disclosed, logs collected at the Debug level or higher should have restricted access. Log files are created and stored in a centralized location on your Cisco DNA Center host. From this location, Cisco DNA Center can query and display logs in the GUI. The total compressed size of the log files is 2 GB. If the log files exceed 2 GB, the newer log files overwrite the older ones. Cisco DNA Center Administrator Guide, Release 2.2.2 49 Configure System Settings Configure Debugging Logs Before you begin Only a user with SUPER-ADMIN-ROLE permissions can perform this procedure. For more information, see About User Roles, on page 79. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Debugging Logs. ) and choose System > Settings > System Configuration > The Debugging Logs window displays the following fields: • Services • Logger Name • Logging Level • Timeout Step 2 From the Services drop-down list, choose a service to adjust its logging level. The Services drop-down list displays the services that are currently configured and running on Cisco DNA Center. Step 3 Enter the Logger Name. This is an advanced feature that has been added to control which software components emit messages into the logging framework. Use this feature with care. Misuse of this feature can result in loss of information needed for technical support purposes. Log messages will be written only for the loggers (packages) specified here. By default, the Logger Name includes packages that start with com.cisco. You can enter additional package names as comma-separated values. Do not remove the default values unless you are explicitly directed to do so. Use * to log all packages. Step 4 From the Logging Level drop-down list, choose the new logging level for the service. Cisco DNA Center supports the following logging levels in descending order of detail: • Trace: Trace messages • Debug: Debugging messages • Info: Normal, but significant condition messages • Warn: Warning condition messages • Error: Error condition messages Step 5 From the Timeout field, choose the time period for the logging level. Configure logging-level time periods in increments of 15 minutes up to an unlimited time period. If you specify an unlimited time period, the default level of logging should be reset each time a troubleshooting activity is completed. Step 6 Review your selection and click Apply. (To cancel your selection, click Cancel.) Cisco DNA Center Administrator Guide, Release 2.2.2 50 Configure System Settings Configure the Network Resync Interval Configure the Network Resync Interval You can update the polling interval at the global level for all devices by choosing System > Settings > Network Resync Interval. Or, you can update the polling interval at the device level for a specific device by choosing Device Inventory. When you set the polling interval using the Network Resync Interval, that value takes precedence over the Device Inventory polling interval value. Before you begin • Only a user with SUPER-ADMIN-ROLE permissions can perform this procedure. For more information, see About User Roles, on page 79. • Make sure that you have devices in your inventory. If not, discover devices using the Discovery feature. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Resync Interval. Step 2 In the Resync Interval field, enter a new time value (in minutes). Step 3 (Optional) Check the Override for all devices check box to override the existing configured polling interval for all devices. Step 4 Click Save. ) and choose System > Settings > Device Settings > Network View Audit Logs Audit logs capture information about the various applications running on Cisco DNA Center. Audit logs also capture information about device public key infrastructure (PKI) notifications. The information in these audit logs can be used to assist in troubleshooting issues, if any, involving the applications or the device PKI certificates. Audit logs also record system events that occurred, when and where they occurred, and which users initiated them. With audit logging, configuration changes to the system get logged in separate log files for auditing. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( ) and choose Activity > Audit Logs. The Audit Logs window appears, where you can view logs about the current policies in your network. These policies are applied to network devices by the applications installed on Cisco DNA Center. Step 2 Click the timeline slider to specify the time range of data you want displayed on the window: • In the Time Range area, choose a time range: Last 2 Weeks, Last 7 Days, Last 24 Hours, or Last 3 Hours. • To specify a custom range, click By Date and specify the start and end date and time. • Click Apply. Step 3 Click the arrow next to an audit log to view the corresponding child audit logs. Cisco DNA Center Administrator Guide, Release 2.2.2 51 Configure System Settings Export Audit Logs to Syslog Servers Each audit log can be a parent to several child audit logs. By clicking the arrow, you can view a series of additional child audit logs. Note Step 4 An audit log captures data about a task performed by Cisco DNA Center. Child audit logs are subtasks to a task performed by Cisco DNA Center. (Optional) From the list of audit logs in the left pane, click a specific audit log message. In the right pane, click Event ID > Copy Event ID to Clipboard. With the copied ID, you can use the API to retrieve the audit log message based on the event ID. The audit log displays the Description, User, Interface, and Destination of each policy in the right pane. Note The audit log displays northbound operation details such as POST, DELETE, and PUT with payload information, and southbound operation details such as the configuration pushed to a device. For detailed information about the APIs on Cisco DevNet, see Cisco DNA Center Platform Intent APIs. Step 5 (Optional) Click Filter to filter the log by User ID, Log ID, or Description. Step 6 Click Subscribe to subscribe to the audit log events. A list of syslog servers appears. Step 7 Check the syslog server check box that you want to subscribe to and click Save. Note Uncheck the syslog server check box to unsubscribe from the audit log events and click Save. Step 8 In the right pane, use the Search field to search for specific text in the log message. Step 9 In the Cisco DNA Center GUI, click the Menu icon ( ) and choose Activity > Scheduled Tasks to view upcoming, in progress, completed, and failed administrative tasks, such as OS updates or device replacements. Step 10 In the Cisco DNA Center GUI, click the Menu icon ( completed, and failed work items. ) and choose Activity > Work Items tab to view in progress, Export Audit Logs to Syslog Servers Security Recommendation: We strongly encourage you to export audit logs from Cisco DNA Center to a remote Syslog Server in your network, for more secure and easier log monitoring. You can export the audit logs from Cisco DNA Center to multiple syslog servers by subscribing to them. Before you begin You must configure the syslog servers in the System > Settings > External Services > Destinations > Syslog area. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Step 2 Click Subscribe. Step 3 Select the syslog servers that you want to subscribe to and click Save. Step 4 To unsubscribe, deselect the syslog servers and click Save. Cisco DNA Center Administrator Guide, Release 2.2.2 52 ) and choose Activity > Audit Logs. Configure System Settings Activate High Availability Activate High Availability Complete the following procedure in order to activate high availability (HA) on your Cisco DNA Center cluster: Step 1 Click the Menu icon ( ) in the Cisco DNA Center GUI and choose System > Settings > System Configuration > High Availability. Step 2 Click Activate High Availability. For more information about HA, see the Cisco DNA Center High Availability Guide. Configure Integration Settings In cases where firewalls or other rules exist between Cisco DNA Center and any third-party apps that need to reach the Cisco DNA Center platform, you will need to configure Integration Settings. These cases occur when the IP address of Cisco DNA Center is internally mapped to another IP address that connects to the internet or an external network. Important After a backup and restore of Cisco DNA Center, you need to access the Integration Settings page and update (if necessary) the Callback URL Host Name or IP Address using this procedure. Before you begin You have installed the Cisco DNA Center platform. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Step 2 Enter the Callback URL Host Name or IP Address that the third-party app needs to connect to when communicating with the Cisco DNA Center platform. Note Step 3 ) and choose System Settings > Settings > Integration Settings. The Callback URL Host Name or IP Address is the external facing hostname or IP address that is mapped internally to Cisco DNA Center. Configure the VIP address for a three-node cluster setup. Click Apply. Set Up a Login Message You can set up a message that appears to all users after they log in to Cisco DNA Center. Cisco DNA Center Administrator Guide, Release 2.2.2 53 Configure System Settings Configure the Proxy Before you begin Only a user with SUPER-ADMIN-ROLE or CUSTOM-ROLE with system management permissions can perform this procedure. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Login Message. Step 2 In the Login Message text box, enter the message's text. Step 3 Click Save. ) and choose System > Settings > System Configuration > The message appears below the Log In button on the Cisco DNA Center login page. Later, if you want to remove this message, do the following: a. Return to the Login Message settings page. b. Click Clear and then click Save. Configure the Proxy If Cisco DNA Center has a proxy server configured as an intermediary between itself and the network devices it manages or the Cisco cloud from which it downloads software updates, you must configure access to the proxy server. You configure access using the Proxy Config window in the Cisco DNA Center GUI. Note Cisco DNA Center does not support a proxy server that uses Windows New Technology LAN Manager (NTLM) authentication. Before you begin Only a user with SUPER-ADMIN-ROLE permissions can perform this procedure. For more information, see About User Roles, on page 79. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Proxy Config. Step 2 Enter the proxy server's URL address. Step 3 Enter the proxy server's port number. ) and choose System > Settings > System Configuration > For HTTP, the port number is usually 80. Step 4 (Optional) If the proxy server requires authentication, enter the username and password for access to the proxy server. Step 5 Check the Validate Settings check box to have Cisco DNA Center validate your proxy configuration settings when applying them. Review your selections and click Save. Step 6 To cancel your selection, click Reset. To delete an existing proxy configuration, click Delete. Cisco DNA Center Administrator Guide, Release 2.2.2 54 Configure System Settings Security Recommendations Note the following: • After configuring the proxy, you are able to view the configuration in the Proxy Config window. • If SSL decryption is enabled on the proxy server that is configured between Cisco DNA Center and the Cisco cloud from which it downloads software updates, or a proxy is configured between Cisco DNA Center and the devices that it manages, proceed to Step 7. • If SSL decryption is not enabled on the proxy server that is configured between Cisco DNA Center and the Cisco cloud from which it downloads software updates, you can stop here. Step 7 Import the proxy certificate into Cisco DNA Center. See Configure the Proxy Certificate, on page 58. Security Recommendations Cisco DNA Center provides many security features for itself, as well as for the hosts and network devices that it monitors and manages. You must clearly understand and configure the security features correctly. We strongly recommend that you follow these security recommendations: • Deploy Cisco DNA Center in a private internal network and behind a firewall that does not expose Cisco DNA Center to an untrusted network, such as the internet. • If you have separate management and enterprise networks, connect Cisco DNA Center's management and enterprise interfaces to your management and enterprise networks, respectively. Doing so ensures network isolation between services used to administer and manage Cisco DNA Center and services used to communicate with and manage your network devices. • If deploying Cisco DNA Center in a three-node cluster setup, verify that the cluster interfaces are connected in an isolated network. • Upgrade Cisco DNA Center with critical upgrades, including security patches, as soon as possible after a patch announcement. For more information, see the Cisco DNA Center Upgrade Guide. • Restrict the remote URLs accessed by Cisco DNA Center using an HTTPS proxy server. Cisco DNA Center is configured to access the internet to download software updates, licenses, and device software, as well as provide up-to-date map information, user feedback, and so on. Providing internet connections for these purposes is a mandatory requirement. However, provide connections securely through an HTTPS proxy server. • Restrict the ingress and egress management and enterprise network connections to and from Cisco DNA Center using a firewall, by only allowing known IP addresses and ranges and blocking network connections to unused ports. • Replace the self-signed server certificate from Cisco DNA Center with the certificate signed by your internal certificate authority (CA). • If possible in your network environment, disable SFTP Compatibility Mode. This mode allows legacy network devices to connect to Cisco DNA Center using older cipher suites. • Disable the browser-based appliance configuration wizard, which comes with a self-signed certificate. Cisco DNA Center Administrator Guide, Release 2.2.2 55 Configure System Settings Change the Minimum TLS Version and Enable RC4-SHA (Not Secure) • Upgrade the minimum TLS version. Cisco DNA Center comes with TLSv1.1 and TLSv1.2 enabled by default, and we recommend that you set the minimum TLS version to 1.2 if possible in your network environment. For more information, see Change the Minimum TLS Version and Enable RC4-SHA (Not Secure), on page 56. Change the Minimum TLS Version and Enable RC4-SHA (Not Secure) Security Recommendation: We recommend that you upgrade the minimum TLS version to TLSv1.2 for incoming TLS connections to Cisco DNA Center. Northbound REST API requests from the external network such as northbound REST API-based apps, browsers, and network devices connecting to Cisco DNA Center using HTTPS are made secure using the Transport Layer Security (TLS) protocol. By default, Cisco DNA Center supports TLSv1.1 and TLSv1.2, and does not support RC4 ciphers for SSL/TLS connections. Since RC4 ciphers have well known weaknesses, we recommend that you upgrade the minimum TLS version to TLSv1.2 if your network devices support it. Cisco DNA Center provides a configuration option to downgrade the minimum TLS version and enable RC4-SHA, if your network devices under Cisco DNA Center control cannot support the existing minimum TLS version (TLSv1.1) or ciphers. For security reasons, however, we do not recommend that you downgrade Cisco DNA Center TLS version or enable RC4-SHA ciphers. If you need to change the TLS version or enable RC4-SHA for Cisco DNA Center, you do so by logging in to the appliance and using the CLI. Note CLI commands can change from one release to the next. The following CLI example uses command syntax that might not apply to all Cisco DNA Center releases. Before you begin You must have maglev SSH access privileges to perform this procedure. Important Step 1 This security feature applies to port 443 on Cisco DNA Center. Performing this procedure may disable traffic on the port to the Cisco DNA Center infrastructure for a few seconds. For this reason, you should configure TLS infrequently and only during off-peak hours or during a maintenance period. Using an SSH client, log in to the Cisco DNA Center appliance with the IP address that you specified using the configuration wizard. The IP address to enter for the SSH client is the IP address that you configured for the network adapter. This IP address connects the appliance to the external network. Step 2 When prompted, enter your username and password for SSH access. Step 3 Enter the following command to check the TLS version currently enabled on the cluster. Example Cisco DNA Center Administrator Guide, Release 2.2.2 56 Configure System Settings Change the Minimum TLS Version and Enable RC4-SHA (Not Secure) Input $ magctl service tls_version --tls-min-version show Output TLS minimum version is 1.1 Step 4 If you want to change the TLS version on the cluster, enter the following commands. For example, you might want to change the current TLS version to a lower version if your network devices under Cisco DNA Center control cannot support the existing TLS version. Example: Change from TLS version 1.1 to 1.0 Input $ magctl service tls_version --tls-min-version 1.0 Output Enabling TLSv1.0 is recommended only for legacy devices Do you want to continue? [y/N]: y WARNING: Enabling TLSv1.0 for api-gateway deployment.extensions/kong patched Example: Change from TLS version 1.1 to 1.2 (only allowed if you haven't enabled RC4-SHA) Input $ magctl service tls_version --tls-min-version 1.2 Output Enabling TLSv1.2 will disable TLSv1.1 and below Do you want to continue? [y/N]: y WARNING: Enabling TLSv1.2 for api-gateway deployment.extensions/kong patched Note Step 5 Setting TLS version 1.2 as the minimum version is not supported when RC4-SHA ciphers are enabled. Enter the following command to enable RC4-SHA on the cluster (not secure; proceed only if needed). Enabling RC4-SHA ciphers is not supported when TLS version 1.2 is the minimum version. Example: TLS version 1.2 is not enabled Input $ magctl service ciphers --ciphers-rc4=enable kong Output Enabling RC4-SHA cipher will have security risk Do you want to continue? [y/N]: y WARNING: Enabling RC4-SHA Cipher for kong deployment.extensions/kong patched Step 6 Enter the following command at the prompt to confirm that TLS and RC4-SHA are configured. Example Input $ magctl service display kong Output containers: - env: - name: TLS_V1 value: "1.1" - name: RC4_CIPHERS value: "true" If RC4 and TLS minimum versions are set, they are listed in the env: of the magctl service display kong command. If these values are not set, they do not appear in the env:. Step 7 If you want to disable the RC4-SHA ciphers that you enabled previously, enter the following command on the cluster. Input $ magctl service ciphers --ciphers-rc4=disable kong Cisco DNA Center Administrator Guide, Release 2.2.2 57 Configure System Settings Configure the Proxy Certificate Output WARNING: Disabling RC4-SHA Cipher for kong deployment.extensions/kong patched Step 8 Log out of the Cisco DNA Center appliance. Configure the Proxy Certificate In some network configurations, proxy gateways might exist between Cisco DNA Center and the remote network it manages (containing various network devices). Common ports, such as 80 and 443, pass through the gateway proxy in the DMZ, and for this reason, SSL sessions from the network devices meant for Cisco DNA Center terminate at the proxy gateway. Therefore, the network devices located within these remote networks can only communicate with Cisco DNA Center through the proxy gateway. For the network devices to establish secure and trusted connections with Cisco DNA Center, or, if present, a proxy gateway, the network devices should have their PKI trust stores appropriately provisioned with the relevant CA root certificates or the server’s own certificate under certain circumstances. If such a proxy is in place during onboarding of devices through PnP Discovery/Services, we recommend that the proxy and the Cisco DNA Center server certificate be the same so that network devices can trust and authenticate Cisco DNA Center securely. In network topologies where a proxy gateway is present between Cisco DNA Center and the remote network it manages, perform the following procedure to import a proxy gateway certificate in to Cisco DNA Center. Before you begin • Only a user with SUPER-ADMIN-ROLE permissions can perform this procedure. For more information, see About User Roles, on page 79. • You must use the proxy gateway's IP address to reach Cisco DNA Center and its services. • You should have the certificate file that is currently being used by the proxy gateway. The certificate file contents should consist of any of the following: • The proxy gateway’s certificate in PEM or DER format, with the certificate being self-signed. • The proxy gateway’s certificate in PEM or DER format, with the certificate being issued by a valid, well-known CA. • The proxy gateway's certificate and its chain in PEM or DER format. The certificate used by the devices and the proxy gateway must be imported in to Cisco DNA Center by following this procedure. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Certificate. Step 2 In the Proxy Certificate window, view the current proxy gateway certificate data (if it exists). Note Step 3 ) and choose System > Settings > Trust & Privacy > Proxy The Expiration Date and Time is displayed as a Greenwich Mean Time (GMT) value. A system notification appears in the Cisco DNA Center GUI two months before the certificate expires. To add a proxy gateway certificate, drag and drop the self-signed or CA certificate into the Drag and Drop Here area. Cisco DNA Center Administrator Guide, Release 2.2.2 58 Configure System Settings Certificate and Private Key Support Note Only PEM or DER files (public-key cryptography standard file formats) can be imported into Cisco DNA Center using this area. Additionally, private keys are neither required nor uploaded into Cisco DNA Center for this procedure. Step 4 Click Save. Step 5 Refresh the Proxy Certificate window to view the updated proxy gateway certificate data. The information displayed in the Proxy Certificate window should have changed to reflect the new certificate name, issuer, and certificate authority. Step 6 Click the Enable button to enable the proxy gateway certificate functionality. If you click the Enable button, the controller returns the imported proxy gateway certificate when requested by a proxy gateway. If you don't click the Enable button, the controller returns its own self-signed or imported CA certificate to the proxy gateway. The Enable button is dimmed if the proxy gateway certificate functionality is used. Certificate and Private Key Support Cisco DNA Center supports the PKI Certificate Management feature, which is used to authenticate sessions (HTTPS). These sessions use commonly recognized trusted agents called CAs. Cisco DNA Center uses the PKI Certificate Management feature to import, store, and manage X.509 certificates from your internal CA. The imported certificate becomes an identity certificate for Cisco DNA Center, and Cisco DNA Center presents this certificate to its clients for authentication. The clients are the northbound API applications and network devices. You can import the following files (in either PEM or PKCS file format) using the Cisco DNA Center GUI: • X.509 certificate • Private key Note For the private key, Cisco DNA Center supports the import of RSA keys. You should not import DSA, DH, ECDH, and ECDSA key types, because they are not supported. You should also keep the private key secure in your own key management system. The private key must have a minimum modulus size of 2048 bits. Prior to import, you must obtain a valid X.509 certificate and private key issued by your internal CA and the certificate must correspond to a private key in your possession. After import, the security functionality based on the X.509 certificate and private key is automatically activated. Cisco DNA Center presents the certificate to any device or application that requests it. Northbound API applications and network devices can use these credentials to establish a trust relationship with Cisco DNA Center. Note We recommend that you do not use and import a self-signed certificate into Cisco DNA Center. We recommend that you import a valid X.509 certificate from your internal CA. Additionally, you must replace the self-signed certificate (installed in Cisco DNA Center by default) with a certificate that is signed by your internal CA for the PnP functionality to work correctly. Cisco DNA Center Administrator Guide, Release 2.2.2 59 Configure System Settings Certificate Chain Support Cisco DNA Center supports only one imported X.509 certificate and private key at a time. When you import a second certificate and private key, the latter overwrites the first (existing) imported certificate and private key values. Certificate Chain Support Cisco DNA Center is able to import certificates and private keys through its GUI. If subordinate certificates are involved in a certificate chain leading to the certificate that is to be imported into Cisco DNA Center (signed certificate), both the subordinate certificates as well as the root certificate of these subordinate CAs must be appended together into a single file to be imported. When appending these certificates, you must append them in the same order as the actual chain of certification. The following certificates should be pasted together into a single PEM file. Review the certificate subject name and issuer to ensure that the correct certificates are being imported and correct order is maintained. Ensure that all of the certificates in the chain are pasted together. • Signed Cisco DNA Center certificate: Its Subject field includes CN=<FQDN of Cisco DNA Center>, and the issuer has the CN of the issuing authority. Note If you install a certificate signed by your internal certificate authority (CA), ensure that the certificate specifies all of the DNS names (including the Cisco DNA Center FQDN) that are used to access Cisco DNA Center in the alt_names section. For more information, see "Generate a Certificate Request Using Open SSL" in the Cisco DNA Center Security Best Practices Guide. • Issuing (subordinate) CA certificate that issues the Cisco DNA Center certificate: Its Subject field has CN of the (subordinate) CA that issues the Cisco DNA Center certificate, and the issuer is that of the root CA. • Next issuing (root/subordinate CA) certificate that issues the subordinate CA certificate: Its Subject field is the root CA, and the issuer has the same value as the Subject field. If they are not the same, you must append the next issuer, and so on. Update the Cisco DNA Center Server Certificate Cisco DNA Center supports the import and storage of an X.509 certificate and private key into Cisco DNA Center. After import, the certificate and private key can be used to create a secure and trusted environment between Cisco DNA Center, northbound API applications, and network devices. You can import a certificate and a private key using the Certificates window in the GUI. Before you begin You must obtain a valid X.509 certificate that is issued by your internal CA and the certificate must correspond to a private key in your possession. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Step 2 In the System tab, view the current certificate data. Cisco DNA Center Administrator Guide, Release 2.2.2 60 ) and choose System > Settings > Trust & Privacy > Certificates. Configure System Settings Update the Cisco DNA Center Server Certificate When you first view this window, the current certificate data that is displayed is the Cisco DNA Center self-signed certificate. The self-signed certificate's expiry is set for several years in the future. The expiration date and time is displayed as a Greenwich mean time (GMT) value. A system notification appears in the Cisco DNA Center GUI two months before the certificate expires. Note The System tab displays the following fields: • Current Certificate Name: Name of the current certificate • Issuer: Name of the entity that has signed and issued the certificate • Authority: Either self-signed or the name of the CA • Expires: Expiry date of the certificate Step 3 To replace the current certificate, click Replace Certificate. The following fields appear: • Certificate: Fields to enter certificate data • Private Key: Fields to enter private key data Step 4 (Optional) Check the Use system certificate for Disaster Recovery as well check box if you want to use the same certificate for disaster recovery. Step 5 In the Certificate area, choose the file format type for the certificate that you are importing into Cisco DNA Center: • PEM: Privacy-enhanced mail file format • PKCS: Public-Key Cryptography Standard file format Step 6 If you choose PEM, perform the following tasks: • For the Certificate field, import the PEM file by dragging and dropping the file into the Drag and Drop area. Note A PEM file must have a valid PEM format extension (.pem). The maximum file size for the certificate is 10 MB. After the upload succeeds, the system certificate is validated. • For the Private Key field, import the private key by dragging and dropping the file into the Drag and Drop area. Note Private keys must have a valid private key format extension (.key). The maximum file size for the private key is 10 MB. After the upload succeeds, the private key is validated. • Choose the encryption option from the Encrypted area for the private key. • If you chose encryption, enter the password for the private key in the Password field. Step 7 If you choose PKCS, perform the following tasks: • For the Certificate field, import the PKCS file by dragging and dropping the file into the Drag and Drop area. Cisco DNA Center Administrator Guide, Release 2.2.2 61 Configure System Settings Use an External SCEP Broker A PKCS file must have a valid PKCS format extension (.pfx or .p12). The maximum file size for the certificate is 10 MB. Note After the upload succeeds, the system certificate is validated. • For the Certificate field, enter the passphrase for the certificate in the Password field. For PKCS, the imported certificate also requires a passphrase. Note • For the Private Key field, choose the encryption option for the private key. • For the Private Key field, if encryption is chosen, enter the password for the private key in the Password field. Step 8 Click Save. Note Step 9 After the Cisco DNA Center server’s SSL certificate is replaced, you are automatically logged out and you must log in again. Return to the Certificates window to view the updated certificate data. The information displayed in the System tab should have changed to reflect the new certificate name, issuer, and the certificate authority. Use an External SCEP Broker You can use your own PKI broker and certificate service for devices and Cisco DNA Center. You can also enable and disable the use of an external device PKI or deprecate the settings between one or the other. To upload an external PKI broker: Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Certificates. Step 2 In the PKI Certificates window, click the Use external SCEP broker radio button. Step 3 Use one of the following options to upload an external certificate: ) and choose System > Settings > Trust & Privacy > PKI • Choose a file • Drag and drop to upload Note Only file types such as .pem, .crt, and .cer are accepted. The file size cannot exceed 10 MB. Step 4 Click Upload. Step 5 By default, Manages Device Trustpoint is enabled, meaning Cisco DNA Center configures the sdn-network-infra-iwan trustpoint on the device. You must complete the following steps: a) Enter the enrollment URL where the device requests the certificate via SCEP. b) (Optional) Enter any optional subject fields used by the certificate, such as country, locality, state, organization, and organization unit. The common name (CN) is automatically configured by Cisco DNA Center with the device platform ID and device serial number. c) In the Revocation Check field, click the drop-down list and choose the appropriate revocation check option. d) (Optional) Check the Auto Renew check box and enter an auto enrollment percentage. Cisco DNA Center Administrator Guide, Release 2.2.2 62 Configure System Settings Switch Back to an Internal PKI Certificate If Manages Device Trustpoint is disabled, in order for devices to send wired and wireless Assurance telemetry to Cisco DNA Center, you must manually configure the sdn-network-infra-iwan trustpoint on the device and then import a certificate. See Configure the Device Certificate Trustpoint. Step 6 Click Save. The external CA certificate is uploaded. If you want to replace the uploaded external certificate, click Replace Certificate and enter the required details. Switch Back to an Internal PKI Certificate After uploading an external certificate, if you want to switch back to the internal certificate, do the following: Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Certificates. Step 2 In the PKI Certificates window, click the Use Cisco DNA Center radio button. Step 3 In the Switching back to Internal PKI Certificate alert, click Apply. ) and choose System > Settings > Trust & Privacy > PKI The Settings have been updated message appears. For more information, see Change the Role of the PKI Certificate from Root to Subordinate Export Cisco DNA Center PKI Certificate Cisco DNA Center allows you to download the device certificates that are required to set up an external entity such as a AAA (pronounced "triple A") server or Cisco ISE server to authenticate the devices. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Certificates. Step 2 Click Download CA Certificate to export the device CA and add it as the trusted CA on the external entities. ) and choose System > Settings > Trust & Privacy > PKI Certificate Management Configure the Device Certificate Lifetime Cisco DNA Center lets you change the certificate lifetime of network devices that are managed and monitored by the private (internal) Cisco DNA Center CA. The Cisco DNA Center default value for the certificate lifetime is 365 days. After the certificate lifetime value is changed using the Cisco DNA Center GUI, network devices that subsequently request a certificate from Cisco DNA Center are assigned this lifetime value. Cisco DNA Center Administrator Guide, Release 2.2.2 63 Configure System Settings Change the Role of the PKI Certificate from Root to Subordinate Note The device certificate lifetime value cannot exceed the CA certificate lifetime value. Additionally, if the remaining lifetime of the CA certificate is less than the configured device's certificate lifetime, the device gets a certificate lifetime value that is equal to the remaining CA certificate lifetime. You can change the device certificate lifetime using the PKI Certificate Management window in the GUI. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Certificate. Step 2 Click the Device Certificate tab. Step 3 Review the device certificate and the current device certificate lifetime. Step 4 In the Device Certificate Lifetime field, enter a new value, in days. Step 5 Click Save. Step 6 (Optional) Refresh the PKI Certificate Management window to confirm the new device certificate lifetime value. ) and choose System > Settings > Trust & Privacy > PKI Change the Role of the PKI Certificate from Root to Subordinate The device PKI CA, a private CA that is provided by Cisco DNA Center, manages the certificates and keys used to establish and secure server-client connections. To change the role of the device PKI CA from a root CA to a subordinate CA, complete the following procedure. When changing the private Cisco DNA Center CA from a root CA to a subordinate CA, note the following: • If you intend to have Cisco DNA Center act as a subordinate CA, it is assumed that you already have a root CA, for example, Microsoft CA, and you are willing to accept Cisco DNA Center as a subordinate CA. • As long as the subordinate CA is not fully configured, Cisco DNA Center continues to operate as an internal root CA. • You must generate a Certificate Signing Request file for Cisco DNA Center (as described in the following procedure) and have it manually signed by your external root CA. Note Cisco DNA Center continues to run as an internal root CA during this time period. • After the Certificate Signing Request is signed by the external root CA, this signed file must be imported back into Cisco DNA Center using the GUI (as described in the following procedure). After the import, Cisco DNA Center initializes itself as the subordinate CA and provides all the existing functionalities of a subordinate CA. • The switchover from the internal root CA to the subordinate CA used by managed devices is not automatically supported. Therefore, it is assumed that no devices have been configured with the internal root CA yet. If devices are configured, it is the responsibility of the network administrator to manually revoke the existing device ID certificates before switching to the subordinate CA. Cisco DNA Center Administrator Guide, Release 2.2.2 64 Configure System Settings Change the Role of the PKI Certificate from Root to Subordinate • The subordinate CA certificate lifetime, as displayed in the GUI, is just read from the certificate; it is not computed against the system time. Therefore, if you install a certificate with a lifespan of 1 year today and look at it in the GUI next July, the GUI will still show that the certificate has a 1-year lifetime. • The subordinate CA certificate must be in PEM or DER format only. • The subordinate CA does not interact with the higher CAs; therefore, it is not aware of revocation, if any, of the certificates at a higher level. Due to this, any information about certificate revocation is also not communicated from the subordinate CA to the network devices. Because the subordinate CA does not have this information, all the network devices use only the subordinate CA as the Cisco Discovery Protocol (CDP) source. You can change the role of the private (internal) Cisco DNA Center CA from a root CA to a subordinate CA using the PKI Certificate Management window in the GUI. Before you begin You must have a copy of the root CA certificate. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Step 2 Click the CA Management tab. Step 3 Review the existing root or subordinate CA certificate configuration information from the GUI: ) and choose System > Settings > PKI Certificate. • Root CA Certificate: Displays the current root CA certificate (either external or internal). • Root CA Certificate Lifetime: Displays the current lifetime value of the current root CA certificate, in days. • Current CA Mode: Displays the current CA mode (root CA or subordinate CA). • Sub CA Mode: Enables a change from a root CA to a subordinate CA. Step 4 In the CA Management tab, check the Sub CA Mode check box. Step 5 Click Next. Step 6 Review the warnings that appear: • Changing from root CA to subordinate CA is a process that cannot be reversed. • You must ensure that no network devices have been enrolled or issued a certificate in root CA mode. Network devices that have been accidentally enrolled in root CA mode must be revoked before changing from root CA to subordinate CA. • Network devices must come online only after the subordinate CA configuration process finishes. Step 7 Click OK to proceed. The PKI Certificate Management window displays the Import External Root CA Certificate field. Step 8 Drag and drop your root CA certificate into the Import External Root CA Certificate field and click Upload. The root CA certificate is uploaded into Cisco DNA Center and used to generate a Certificate Signing Request. After the upload process finishes, a Certificate Step 9 Uploaded Successfully message appears. Click Next. Cisco DNA Center Administrator Guide, Release 2.2.2 65 Configure System Settings Provision a Rollover Subordinate CA Certificate Cisco DNA Center generates and displays the Certificate Signing Request. Step 10 View the Cisco DNA Center-generated Certificate Signing Request in the GUI and perform one of the following actions: • Click the Download link to download a local copy of the Certificate Signing Request file. You can then attach this Certificate Signing Request file to an email to send to your root CA. • Click the Copy to the Clipboard link to copy the Certificate Signing Request file's content. You can then paste this Certificate Signing Request content to an email or include it as an attachment to an email and send it to your root CA. Step 11 Send the Certificate Signing Request file to your root CA. Your root CA will then return a subordinate CA file, which you must import back into Cisco DNA Center. Step 12 After receiving the subordinate CA file from your root CA, access the Cisco DNA Center GUI again and return to the PKI Certificate Management window. Step 13 Click the CA Management tab. Step 14 Click Yes for the Change CA mode button. After clicking Yes, the GUI view with the Certificate Signing Request is displayed. Step 15 Click Next. The PKI Certificate Management window displays the Import Sub CA Certificate field. Step 16 Drag and drop your subordinate CA certificate into the Import Sub CA Certificate field and click Apply. The subordinate CA certificate is uploaded into Cisco DNA Center. After the upload finishes, the GUI displays the subordinate CA mode under the CA Management tab. Step 17 Review the fields under the CA Management tab: • Sub CA Certificate: Displays the current subordinate CA certificate. • External Root CA Certificate: Displays the root CA certificate. • Sub CA Certificate Lifetime: Displays the lifetime value of the subordinate CA certificate, in days. • Current CA Mode: Displays SubCA mode. Provision a Rollover Subordinate CA Certificate Cisco DNA Center lets you apply a subordinate certificate as a rollover subordinate CA when 70 percent of the existing subordinate CA's lifetime has elapsed. Before you begin • To initiate subordinate CA rollover provisioning, you must have changed the PKI certificate role to subordinate CA mode. See Change the Role of the PKI Certificate from Root to Subordinate, on page 64. Cisco DNA Center Administrator Guide, Release 2.2.2 66 Configure System Settings Provision a Rollover Subordinate CA Certificate • Seventy percent or more of the lifetime of the current subordinate CA certificate must have expired. When this occurs, Cisco DNA Center displays a Renew button under the CA Management tab. • You must have a signed copy of the rollover subordinate CA PKI certificate. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Certificate. Step 2 Click the CA Management tab. Step 3 Review the CA certificate configuration information: ) and choose System > Settings > Trust & Privacy > PKI • Subordinate CA Certificate: Displays the current subordinate CA certificate. • External Root CA Certificate: Displays the root CA certificate. • Subordinate CA Certificate Lifetime: Displays the lifetime value of the current subordinate CA certificate, in days. • Current CA Mode: Displays SubCA mode. Step 4 Click Renew. Cisco DNA Center uses the existing subordinate CA to generate and display the rollover subordinate CA Certificate Signing Request. Step 5 View the generated Certificate Signing Request in the GUI and perform one of the following actions: • Click the Download link to download a local copy of the Certificate Signing Request file. You can then attach this Certificate Signing Request file to an email to send it to your root CA. • Click the Copy to the Clipboard link to copy the Certificate Signing Request file's content. You can then paste this Certificate Signing Request content to an email or include it as an attachment to an email and send it to your root CA. Step 6 Send the Certificate Signing Request file to your root CA. Your root CA will then return a rollover subordinate CA file that you must import back into Cisco DNA Center. The Certificate Signing Request for the subordinate CA rollover must be signed by the same root CA who signed the subordinate CA you imported when you switched from RootCA mode to SubCA mode. Step 7 After receiving the rollover subordinate CA file from your root CA, return to the PKI Certificate Management window. Step 8 Click the CA Management tab. Step 9 Click Next in the GUI in which the Certificate Signing Request is displayed. The PKI Certificate Management window displays the Import Sub CA Certificate field. Step 10 Drag and drop your subordinate rollover CA certificate into the Import Sub CA Certificate field and click Apply. The rollover subordinate CA certificate is uploaded into Cisco DNA Center. After the upload finishes, the GUI changes to disable the Renew button under the CA Management tab. Cisco DNA Center Administrator Guide, Release 2.2.2 67 Configure System Settings Configure the Device Certificate Trustpoint Configure the Device Certificate Trustpoint If Manages Device Trustpoint is disabled in Cisco DNA Center, in order for devices to send wired and wireless Assurance telemetry to Cisco DNA Center, you must manually configure the sdn-network-infra-iwan trustpoint on the device and then import a certificate. The following manual configuration is required to enroll from an external CA via SCEP. Step 1 Enter the following commands: crypto pki trustpoint sdn-network-infra-iwan enrollment url http://<SCEP_enrollment_URL_to_external_CA> fqdn <device_FQDN> subject-name CN=<device_platform_ID>_<device_serial_number>_sdn-network-infra-iwan revocation-check <crl, crl none, or none> # to perform revocation check with CRL, CRL fallback to no check, or no check rsakeypair sdn-network-infra-iwan fingerprint <CA_fingerprint> # to verify that the CA at the url connection matches the fingerprint given Step 2 (Optional, but recommended) Automatically renew the certificate and avoid certificate expiry: auto-enroll 80 regenerate Step 3 (Optional) Specify the interface that is reachable to the enrollment URL. Otherwise, the default is the source interface of the http service. source interface <interface> Renew Certificates Cisco DNA Center uses a number of certificates, such as the ones generated by Kubernetes and the ones used by Kong and Credential Manager Services. These certificates are valid for one year, which starts as soon as you install your cluster. Cisco DNA Center automatically renews these certificates for another year before they are set to expire. • We recommend that you renew certificates before they expire, not after. • You can only renew certificates that are set to expire up to 100 days from now. This procedure does not do anything to certificates that will expire later than that. • The script refreshes only self-signed certificates, not third-party/certificate authority (CA)-signed certificates. For third-party/CA-signed certificates, the script updates the internal certificates used by Kubernetes and the Credential Manager. • For self-signed certificates, the renewal process does not require you to push certificates back out to devices, because the root CA is unchanged. • The term cluster applies to both single-node and three-node Cisco DNA Center setups. Step 1 Ensure that each cluster node is healthy and not experiencing any issues. Step 2 To view a list of the certificates that are currently used by that node and their expiration date, enter the following command: sudo maglev-config certs info Cisco DNA Center Administrator Guide, Release 2.2.2 68 Configure System Settings Configure Trustpool Step 3 Renew the certificates that are set to expire soon by entering the following command: sudo maglev-config certs refresh Step 4 Repeat the preceding steps for the other cluster nodes. Step 5 For utility help, enter: $ sudo maglev-config certs --help Usage: maglev-config certs [OPTIONS] COMMAND [ARGS]... Options: --help Show this message and exit. Commands: info refresh Configure Trustpool Cisco DNA Center contains a preinstalled Cisco trustpool bundle (Cisco Trusted External Root Bundle). Cisco DNA Center also supports the import and storage of an updated trustpool bundle from Cisco. The trustpool bundle is used by supported Cisco networking devices to establish a trust relationship with Cisco DNA Center and its applications. Note The Cisco trustpool bundle is a file called ios.p7b that only supported Cisco devices can unbundle and use. This ios.p7b file contains root certificates of valid certificate authorities, including Cisco. This Cisco trustpool bundle is available on the Cisco cloud (Cisco InfoSec). The link is located at https://www.cisco.com/security/ pki/. The trustpool bundle provides you with a safe and convenient way to use the same CA to manage all your network device certificates, as well as your Cisco DNA Center certificate. The trustpool bundle is used by Cisco DNA Center to validate its own certificate as well as a proxy gateway certificate (if any), to determine whether it is a valid CA-signed certificate. Additionally, the trustpool bundle is available for upload to Network PnP-enabled devices at the beginning of their PnP workflow so that they can trust Cisco DNA Center for subsequent HTTPS-based connections. You import the Cisco trust bundle using the Trustpool window in the GUI. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Step 2 In the Trustpool window, click the Update button to initiate a new download and install of the trustpool bundle. ) and choose System > Settings > Trust & Privacy > Trustpool. The Update button becomes active only when an updated version of the ios.p7b file is available and internet access is available. After the new trustpool bundle is downloaded and installed on Cisco DNA Center, Cisco DNA Center makes this trustpool bundle available to supported Cisco devices for download. Step 3 If you want to import a new certificate file, click Import, choose a valid certificate file from your local system, and click Import in the Import Certificate window. Cisco DNA Center Administrator Guide, Release 2.2.2 69 Configure System Settings Configure the SFTP Server Step 4 Click Export to export the certificate details in CSV format. Configure the SFTP Server The SFTP server can be used as a backup of an internal file server. The local SFTP server in Cisco DNA Center supports secure ciphers. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Step 2 Configure the SFTP settings: ) and choose System > Settings > Device Settings > SFTP. • Host: Hostname or IP address of the SFTP server. • Username: Name that is used to log in to the SFTP server. The username must have read/write privileges on the working root directory on the server. • Password: Password that is used to log in to the SFTP server. • Port Number: Port number on which the SFTP server is running. • Root Location: Working root directory for file transfers. Step 3 Because some legacy wireless controller software versions support only weak ciphers (such as SHA1-based ciphers) for SFTP, Cisco DNA Center should enable SFTP compatibility mode for SFTP connections from wireless controllers for software image management and wireless assurance. You can temporarily enable support for weak ciphers on the Cisco DNA Center SFTP server for up to 90 days. To allow weak ciphers, check the Compatibility mode check box and then enter a duration (from 1 minute to 90 days). Step 4 Click Save. Step 5 Review the new SFTP settings in the SFTP window. Configure SNMP Properties You can configure retry and timeout values for SNMP. Before you begin Only a user with SUPER-ADMIN-ROLE permissions can perform this procedure. For more information, see About User Roles, on page 79. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Step 2 Configure the following fields: ) and choose System > Settings > Device Settings > SNMP. • Retries: Number of attempts allowed to connect to the device. Valid values are from 1 to 3. The default is 3. • Timeout: Number of seconds Cisco DNA Center waits when trying to establish a connection with a device before timing out. Valid values are from 1 to 300 seconds in intervals of 5 seconds. The default is 5 seconds. Cisco DNA Center Administrator Guide, Release 2.2.2 70 Configure System Settings About Product Usage Telemetry Collection Step 3 Click Save. Step 4 (Optional) To return to the default settings, click Reset and Save. About Product Usage Telemetry Collection Cisco DNA Center collects product usage telemetry and provides data about the status and capabilities of the Cisco DNA Center appliance. The data and insights enable Cisco to proactively address operational and product usage issues. The product usage telemetry data is locally collected in the Cisco DNA Center appliance and is sent to Cisco Connected DNA. All data transmitted to Cisco is through an encrypted channel. The encrypted channel is also used for other purposes such as cloud-delivered software updates. Note Product usage telemetry collection cannot be disabled. In the Cisco DNA Center GUI, click the Menu icon ( ) and choose System > Settings, and then choose Terms and Conditions > Telemetry Collection. You can review the license agreement, the privacy data, and the Cisco privacy statement from the Telemetry Collection page. The collection of product usage telemetry is enabled by default. We recommend that you contact the Cisco Technical Assistance Center (TAC) for the following: • Change telemetry settings • Any other specific questions or requests related to telemetry Configure vManage Properties Cisco DNA Center supports Cisco's vEdge deployment by using integrated vManage setups. You can save the vManage details from the Settings page before provisioning any vEdge topologies. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Step 2 Configure the vManage Properties: ) and choose System > Settings > External Services > VManage. • Host Name/IP Address: IP address of vManage. • Username: Name that is used to log in to vManage. • Password: Password that is used to log in to vManage. • Port Number: Port that is used to log in to vManage. • vBond Host Name/IP Address: IP address of vBond. Required if you are using vManage to manage NFV. • Organization Name: Name of the organization. Required if you are using vManage to manage NFV. Step 3 To upload the vManage certificate, click Select a file from your computer. Cisco DNA Center Administrator Guide, Release 2.2.2 71 Configure System Settings Account Lockout Step 4 Click Save. Account Lockout You can configure the account lockout policy to manage user login attempts, the account lockout period, and the number of login retries. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Lockout. Step 2 Click the Enforce Account Lockout toggle button so that you see a check mark. Step 3 Enter values for the following Enforce Account Lockout parameters: ) and choose System > Settings > Trust & Privacy > Account • Maximum Login Retries • Lockout Effective Periods (minutes) • Reset Login Retries after (minutes) Note Hover your cursor over Info to view details for each parameter. Step 4 Choose the Idle Session Timeout value from the drop-down list. Step 5 Click Save. If you leave the session idle, a Session Timeout dialog box appears five minutes before the session timeout. Click Stay signed in if you want to continue the session. You can click Sign out to end the session immediately. Password Expiry You can configure the password expiration policy to manage the password expiration frequency, the number of days that users are notified before their password expires, and the grace period. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Expiry. Step 2 Click the Enforce Password Expiry toggle button so that you see a check mark. Step 3 Enter values for the following Enforce Password Expiry parameters: ) and choose System > Settings > Trust & Privacy > Password • Password Expiry Period (days) • Password Expiration Warning (days) • Grace Period (days) Note Hover over Info to view details for each parameter. Cisco DNA Center Administrator Guide, Release 2.2.2 72 Configure System Settings Enable ICMP Ping Step 4 Click Save to set the password expiry settings. Enable ICMP Ping The Cisco DNA Center Internet Control Message Protocol (ICMP) pings the unreachable access points in flex connect mode every 5 minutes to enhance reachability. The following procedure describes how to enable an ICMP ping Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Step 2 From the Device Settings drop-down list, choose ICMP Ping. Step 3 Check the Enable ICMP ping for unreachable access points in FlexConnect mode check box to enable ICMP ping. Step 4 Click Save. ) and choose System > Settings > Device Settings. Configure an Image Distribution Server Image distribution server helps in storage and software distribution. You can set up one or more protocols for newly added image distribution server. The following procedure describes how to configure an image distribution server. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Step 2 From the Device Settings drop-down list, choose Image Distribution Servers. ) and choose System > Settings > Device Settings. The Image Distribution Servers table displays the Host, User Name, SFTP, SCP, Connectivity, and Action of image distribution servers. Step 3 To add a new image distribution server, click Add at the top-right corner. The Add a New Image Distribution Server slide-in pane appears. Step 4 Enter a host name in the Host name field. Step 5 Check the Use root directory for file transfers check box to use the root directory for file transfers. Step 6 Expend SFTP and SCP and enter the Username, Password, and Port Number. Step 7 Click Save. The newly added image distribution server is displayed in the Image Distribution Servers table. Step 8 In the Connectivity column, click Check Connectivity link to check the connectivity of an image distribution server. Step 9 (Optional) Use the Search field to search various image distribution servers. Note Cisco DNA Center does not allow you to edit or delete a local server. Cisco DNA Center Administrator Guide, Release 2.2.2 73 Configure System Settings Enable PNP Device Authorization Enable PNP Device Authorization The following procedure describes how to enable authorization on the device. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Step 2 From the Device Settings drop-down list, choose PNP Device Authorization. Note ) and choose System > Settings > Device Settings. By default, devices are automatically authorized. Step 3 Check the Device Authorization check box to enable authorization on the device. Step 4 Click Save. Cisco DNA Center Administrator Guide, Release 2.2.2 74 CHAPTER 3 Manage Applications • Application Management, on page 75 • Download and Update System Updates, on page 75 • Download and Install Packages and Updates, on page 76 • Uninstall a Package, on page 77 Application Management Cisco DNA Center provides many of its functions as individual applications, packaged separately from the core infrastructure. This enables you to install and run the applications that you want and uninstall those you are not using, depending on your preferences. The number and type of application packages shown in the Software Updates window will vary, depending on your Cisco DNA Center version and your Cisco DNA Center licensing level. All the application packages that are available to you are shown, whether or not they are currently installed. Some applications are so basic that they are required on nearly every Cisco DNA Center deployment. For a description of a package and whether it is required, hover over that package's name in the Updates tab. Each Cisco DNA Center application package consists of service bundles, metadata files, and scripts. Important Perform all application management procedures from the Cisco DNA Center GUI. Although you can perform many of these procedures using the CLI (after logging in to the shell), we do not recommend this. In particular, if you use the CLI to deploy or upgrade packages, you must ensure that no deploy or upgrade command is entered unless the results of the maglev package status command show all the packages as NOT_DEPLOYED, DEPLOYED, or DEPLOYMENT_ERROR. Any other state indicates that the corresponding activity in progress, and parallel deployments or upgrades are not supported. Download and Update System Updates You can perform application management procedures from the Software Updates window, including downloading and installing system updates. Cisco DNA Center Administrator Guide, Release 2.2.2 75 Manage Applications Download and Install Packages and Updates Before you begin Only a user with SUPER-ADMIN-ROLE permissions can perform this procedure. For more information, see About User Roles, on page 79. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( ) and choose System > Software Updates. Alternately, click the cloud icon and click the Go to Software Updates link. Step 2 In the Software Updates window, review the following tabs: • Updates: Shows the system and the application updates. System Update shows the system version that is installed and the system updates that are available and have been downloaded from the Cisco cloud. Application Updates shows the available applications that can be downloaded and installed from the Cisco cloud, the size of the application, and the appropriate action (Download, Install, or Update). Hover over the package to view the available version and a basic description. • Installed Apps: Shows the application packages that are currently installed. Important After you launch the Software Updates window, a connectivity check is performed and the status is displayed. If there is a connectivity issue, the Software Updates window does not show the new updates. Step 3 If a system update appears in the Software Update window, click Update to update Cisco DNA Center. During the update process, the system reboots. The Cisco DNA Center GUI is unavailable while the system reboots. Download and Install Packages and Updates Cisco DNA Center treats individual applications as separate from the core infrastructure. Specifically, individual packages for applications can be installed to run on Cisco DNA Center. Packages for applications may take time to install and deploy. Therefore, install the packages during a maintenance period for your network. Before you begin Only a user with SUPER-ADMIN-ROLE permissions can perform this procedure. For more information, see About User Roles, on page 79. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( ) and choose System > Software Updates. Alternately, click the cloud icon and click the Go to Software Updates link. Step 2 In the Software Updates window, review the following tabs: • Updates: Shows the system and the application updates. System Update shows the system version that is installed and the system updates that are available and have been downloaded from the Cisco cloud. Application Updates shows the available applications that can be downloaded and installed from the Cisco cloud, the size of the application, and the appropriate action (Download, Install, or Update). Hover over the package to view the available version and a basic description. • Installed Apps: Shows the application packages that are currently installed. Cisco DNA Center Administrator Guide, Release 2.2.2 76 Manage Applications Package Download and Upgrade Event Notifications Important After you launch the Software Updates window, a connectivity check is performed and the status is displayed. If there is a connectivity issue, the Software Updates window does not show the new updates. Step 3 Download the applications by doing one of the following: • To download all applications at once, click Download All at the top of the Application Updates field. • To download a specific application group, click Download All next to that group. Step 4 Update the applications by doing one of the following: • To update all applications at once, click Update All at the top of the Application Updates field. • To update a specific application group, click Update All next to that group. Step 5 Ensure that each application has been updated by reviewing its version on the Installed Apps tab. The application versions should be updated on this tab. Note There may be some new application packages that were not part of your previous Cisco DNA Center configuration, and for this reason have not been installed by this procedure (for example, the Test Support package listed on this page). Package Download and Upgrade Event Notifications Starting with Cisco DNA Center 2.2.2.4, you can receive a notification whenever a package download or upgrade event takes place. To configure and subscribe to these notifications, complete the steps described in the Cisco DNA Center Platform User Guide's "Work with Events" topic. When completing this procedure, ensure that you select and subscribe to the SYSTEM-SOFTWARE-UPGRADE event in the Platform > Developer Toolkit > Events table. A notification is generated and sent whenever one of the following events occur: • The download of a package upgrade failed. This typically happens because your Cisco DNA Center appliance doesn't have the necessary disk space or you're attempting to download a corrupted package. • The installation of a package upgrade failed (possibly because the service that's associated with the package is currently down). • The download or installation of a package upgrade was successful. Note A notification is sent only if the previous attempt to complete either of these operations failed. Uninstall a Package Cisco DNA Center treats individual applications as separate from the core infrastructure. Specifically, individual packages for applications can be uninstalled from Cisco DNA Center. Cisco DNA Center Administrator Guide, Release 2.2.2 77 Manage Applications Uninstall a Package You can uninstall only packages for applications that are not system critical. Before you begin Only a user with SUPER-ADMIN-ROLE permissions can perform this procedure. For more information, see About User Roles, on page 79. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( ) and choose System > Software Updates. Alternately, click the cloud icon and click the Go to Software Updates link. Step 2 Click the Installed Apps tab to view the installed applications. Step 3 Click Uninstall for the package that you want to remove. You cannot uninstall multiple packages simultaneously. After the package is uninstalled, it is removed from the Installed Apps tab. Cisco DNA Center Administrator Guide, Release 2.2.2 78 CHAPTER 4 Manage Users • About User Profiles, on page 79 • About User Roles, on page 79 • Create an Internal User, on page 80 • Edit a User, on page 80 • Delete a User, on page 81 • Reset a User Password, on page 81 • Change Your Own User Password, on page 82 • Reset a Forgotten Password, on page 82 • Configure Role-Based Access Control, on page 83 • Display Role-Based Access Control Statistics, on page 88 • Configure External Authentication, on page 88 • Two-Factor Authentication, on page 90 • Display External Users, on page 94 About User Profiles A user profile defines a user's login, password, and role (permissions). You can configure both internal and external profiles for users. Internal user profiles reside in Cisco DNA Center and external user profiles reside on an external AAA server. A default user profile with SUPER-ADMIN-ROLE permissions is created when you install Cisco DNA Center. About User Roles Users are assigned user roles that specify the functions that they are permitted to perform: • Administrator (SUPER-ADMIN-ROLE): Users with this role have full access to all of the Cisco DNA Center functions. They can create other user profiles with various roles, including those with the SUPER-ADMIN-ROLE. • Network Administrator (NETWORK-ADMIN-ROLE): Users with this role have full access to all of the network-related Cisco DNA Center functions. However, they do not have access to system-related functions, such as backup and restore. Cisco DNA Center Administrator Guide, Release 2.2.2 79 Manage Users Create an Internal User • Observer (OBSERVER-ROLE): Users with this role have view-only access to the Cisco DNA Center functions. Users with an observer role cannot access any functions that configure or control Cisco DNA Center or the devices it manages. Create an Internal User You can create a user and assign this user a role. Before you begin Only a user with SUPER-ADMIN-ROLE permissions can perform this procedure. For more information, see About User Roles, on page 79. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Step 2 Click Add. Step 3 Enter a first name, last name, email address, and username for the new user. ) and choose System > Users & Roles > User Management. The email address must meet the requirements for the standard Apache EmailValidator class. Step 4 Under Role List, choose one of the following roles: SUPER-ADMIN-ROLE, NETWORK-ADMIN-ROLE, or OBSERVER-ROLE. Step 5 Enter a password and confirm it. The password must contain: • At least eight characters • A character from at least three of the following categories: • Lowercase letter • Uppercase letter • Number • Special character Step 6 Click Save. Edit a User You can edit some user properties (but not the username). Before you begin Only a user with SUPER-ADMIN-ROLE permissions can perform this procedure. For more information, see About User Roles, on page 79. Cisco DNA Center Administrator Guide, Release 2.2.2 80 Manage Users Delete a User Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Step 2 Click the radio button next to the user that you want to edit. Step 3 Click Edit. Step 4 Edit the first or last name or email address, if needed. Step 5 Under Role List, choose a new role, if needed: SUPER-ADMIN-ROLE, NETWORK-ADMIN-ROLE, or OBSERVER-ROLE. Step 6 Click Save. ) and choose System > Users & Roles > User Management. Delete a User Before you begin Only a user with SUPER-ADMIN-ROLE permissions can perform this procedure. For more information, see About User Roles, on page 79. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Step 2 Click the radio button next to the user that you want to delete. Step 3 Click Delete. Step 4 At the confirmation prompt, click Continue. ) and choose System > Users & Roles > User Management. Reset a User Password You can reset another user's password. For security reasons, passwords are not displayed to any user, not even those with administrator privileges. Before you begin Only a user with SUPER-ADMIN-ROLE permissions can perform this procedure. For more information, see About User Roles, on page 79. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Step 2 Click the radio button next to the user whose password you want to reset. Step 3 Click Reset Password. Step 4 Enter a new password and confirm it. The new password must contain: ) and choose System > Users & Roles > User Management. • At least eight characters • A character from at least three of the following categories: Cisco DNA Center Administrator Guide, Release 2.2.2 81 Manage Users Change Your Own User Password • Lowercase letter • Uppercase letter • Number • Special character Step 5 Click Save. Change Your Own User Password Before you begin Only a user with SUPER-ADMIN-ROLE permissions can perform this procedure. For more information, see About User Roles. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Step 2 Enter information in the required fields. Step 3 Click Update. ) and choose System > Users & Roles > Change Password. Change Your Own User Password without Admin Permission The following procedure describes how to change your password without admin permission. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( ), hover your cursor over admin and choose My Profile and Settings > My Account. Step 2 Click Update Password. Step 3 In the Update Password dialog box, enter the current password, new password and confirm new password. Step 4 Click Update. Reset a Forgotten Password If you forgot your password, you can reset it through the CLI. Step 1 Enter the following command to check if the user is created in the system. magctl user display <username> The command returns the tenant-name, which can be used to reset the password. The output looks similar to the following: Cisco DNA Center Administrator Guide, Release 2.2.2 82 Manage Users Configure Role-Based Access Control User admin present in tenant TNT0 (where TNT0 is the tenant-name) Step 2 Enter the tenant-name in the following command to reset the password. magctl user password update <username> <tenant-name> You are prompted to enter a new password. Step 3 Enter a new password. You are prompted to re-enter the new password to confirm. Step 4 Enter the new password. The password is reset and you can log in to Cisco DNA Center using the new password. Configure Role-Based Access Control Cisco DNA Center supports role-based access control (RBAC), which enables a user with SUPER-ADMIN-ROLE privileges to define custom roles that permit or restrict user access to certain Cisco DNA Center functions. Use this procedure to define a custom role and then assign a user to that role. Before you begin Only a user with SUPER-ADMIN-ROLE permissions can perform this procedure. Step 1 Define a custom role. a) In the Cisco DNA Center GUI, click the Menu icon ( ) and choose System > Users & Roles > Role Based Access Control. b) Click Create a New Role. The Create a Role window appears. If this is your first iteration of RBAC, after you have created the new role, you will be asked to assign users to the new role. c) Click Let's Do it. If you want to skip this screen in the future, check the Don't show this to me again check box. The Create a New Role window appears. d) Enter a name for the role and then click Next. The Define the Access window appears with a list of options. By default, the observer role is set for all Cisco DNA Center functions. e) Click the > icon corresponding to the desired function to view the associated features. f) Set the permission level to Deny, Read, or Write for the desired features. If you set the permission level of a feature to Deny, the user to whom you assign this role cannot view this feature in the GUI. g) Click Next. The Summary window appears. h) Review the summary. If the information is correct, click Create Role. Otherwise, click Edit and make the appropriate changes. The Done, Role-Name window appears. Cisco DNA Center Administrator Guide, Release 2.2.2 83 Manage Users Cisco DNA Center User Role Permissions Step 2 To assign a user to the custom role you just created, click Add Users. The User Management > Internal Users window appears, which allows you to assign the custom role to an existing user or to a new user. • To assign the custom role to an existing user, do the following: a. In the Internal Users window, click the radio button next to the user to whom you want to assign the custom role, and then click Edit. The Update Internal User slide-in pane appears. b. From the Role List drop-down list, choose the custom role, and then click Save. • To assign the custom role to a new user, do the following: a. Click Add. The Create Internal User slide-in pane appears. b. Enter the first name, last name, and username in the fields provided. c. From the Role List drop-down list, choose the custom role to assign to the new user. d. Enter the password and then confirm it. e. Click Save. Step 3 If you are an existing user who was logged in when the administrator was making changes to your access permissions, you must log out of Cisco DNA Center and then log back in for the new permission settings to take effect. Cisco DNA Center User Role Permissions Table 4: Cisco DNA Center User Role Permissions Capability Description Assurance Assure consistent service levels with complete visibility across all aspects of your network. Monitoring and Troubleshooting Monitor and manage the health of your network with issue troubleshooting and remediation, proactive network monitoring, and insights driven by AI Network Analytics. This role lets you: • Resolve, close, and ignore issues. • Run Machine Reasoning Engine (MRE) workflows. • Analyze trends and insights. • Troubleshoot issues, including path trace, sensor dashboards, and rogue management. • Run workflows for rogue and Cisco Adaptive Wireless Intrusion Prevention System (aWIPS). These workflows include AP-allowed list, vendor-allowed list, aWIPS profile creation, assigning an aWIPS profile, and so on. Cisco DNA Center Administrator Guide, Release 2.2.2 84 Manage Users Cisco DNA Center User Role Permissions Capability Description Monitoring Settings Configure and manage issues. Update network, client, and application health thresholds. Note: You must have at least Read permission on Monitoring and Troubleshooting. Troubleshooting Tools Create and manage sensor tests. Schedule on-demand forensic packet captures (Intelligent Capture) for troubleshooting clients. Note: You must have at least Read permission on Monitoring and Troubleshooting. Network Analytics Manage network analytics-related components. Data Access Enable access to query engine APIs. Note: Do not set the permission to Deny, because all applications will fail. Network Design Advanced Network Settings Set up network hierarchy, update your software image repository, and configure network profiles and settings for managing your sites and network devices. • Update network settings such as global device credentials, authentication and policy servers, certificates, trustpool, cloud access keys, Stealthwatch, Umbrella, and data anonymization. • Export the device inventory and its credentials. Note To complete this task, you must have Read permissions on Network Settings. Image Repository Manage software images and facilitate upgrades and updates on physical and virtual network entities. Network Hierarchy Define and create a network hierarchy of sites, buildings, floors, and areas based on geographic location. Users with this role can also add CMX servers in System Settings. Network Profiles Create network profiles for routing, enterprise NFV, switching, and wireless, and assign profiles to sites. This role includes Template Editor, Tagging, Model Config Editor, and Authentication Template. Note: To create SSIDs, you must have Write permission on Network Settings. Network Settings Common site-wide network settings such as AAA, NTP, DHCP, DNS, Syslog, SNMP, and Telemetry. Users with this role can add an SFTP server and modify the Network Resync Interval in System Settings. Note: To create wireless profiles, you must have Write permission on Network Profiles. Virtual Network Manage virtual networks (VNs). Segment physical networks into multiple logical networks for traffic isolation and controlled inter-VN communication. Network Provision Configure, upgrade, provision, schedule, and manage your network devices. Compliance Manage compliance provisioning. Image Update Upgrade a software image on devices after a complete upgrade lifecycle. Cisco DNA Center Administrator Guide, Release 2.2.2 85 Manage Users Cisco DNA Center User Role Permissions Capability Description Inventory Management Discover, add, replace, or delete devices on your network while managing device attributes and configuration properties. Note: To replace a device, you must have Write permission on Network Provision > PnP. License Unified view of your software and network assets relative to license usage and compliance. The role also controls permissions for cisco.com and Smart accounts. Network Telemetry Enable or disable the collection of application telemetry from devices. Configure the telemetry settings associated with the assigned site. Configure other settings like wireless service assurance and controller certificates. Note: To enable or disable network telemetry, you must have Write permission on Provision. PnP Automatically onboard new devices, assign them to sites, and configure them with site-specific contextual settings. Provision Provision devices with the site-specific settings and policies that are configured for the network. This role includes Fabric, Application Policy, Application Visibility, Cloud, Site-to-Site VPN, Network/Application Telemetry, Stealthwatch, and Umbrella provisioning. On the main dashboards for rogue and aWIPS, you can enable or disable certain actions, including rogue containment. Note: To provision devices in sites that have network profiles attached, you must have at least Read permission on Network Profiles. Network Services Provision services in your network. App Hosting Deploy, manage, and monitor virtualized and container-based applications running on network devices. Bonjour Enable the wide-area Bonjour service across your network to enable policy-based service discovery. Stealthwatch Configure network elements to send data to Cisco Stealthwatch to detect and mitigate threats, even in encrypted traffic. To provision Stealthwatch, you must have Write permission on the following components: • Network Design > Network Settings • Network Provision > Provision • Network Provision > Scheduler • Network Services > Stealthwatch Cisco DNA Center Administrator Guide, Release 2.2.2 86 Manage Users Cisco DNA Center User Role Permissions Capability Description Umbrella Configure network elements to use Cisco Umbrella as the first line of defense against cybersecurity threats. To provision Umbrella, you must have Write permission on the following components: • Network Design > Network Settings • Network Provision > Provision • Network Provision > Scheduler • Network Services > Stealthwatch You must also have Read permission on Advanced Network Settings. Platform Open platform for accessible intent-based workflows, data exchange, notifications, and third-party app integrations. APIs Drive value by accessing Cisco DNA Center through REST APIs. Bundles Enhance productivity by configuring and activating preconfigured bundles for ITSM integration. Events Subscribe to get notified in near real time about network and system events of interest and initiate corrective actions. You can configure email and syslog logs in System Settings > Destinations. Reports Generate reports using predefined reporting templates for all aspects of your network. Generate reports for rogue devices and for aWIPS. You can configure webhooks in System Settings > Destinations. Security Manage and control secure access to the network. Group-Based Policy Manage group-based policies for networks that enforce segmentation and access control based on Cisco security group tag. This role includes Endpoint Analytics. IP-Based Access Control Manage IP-based access control lists that enforce network segmentation based on IP addresses. Security Advisories Scan the network for security advisories. Review and understand the impact of published Cisco security advisories that may affect your network. System Centralized administration of Cisco DNA Center, which includes configuration management, network connectivity, software upgrades, and more. Machine Reasoning Configure automatic updates to the machine reasoning knowledge base to rapidly identify security vulnerabilities and improve automated issue analysis. Cisco DNA Center Administrator Guide, Release 2.2.2 87 Manage Users Display Role-Based Access Control Statistics Capability Description System Management Manage core system functionality and connectivity settings. Manage user roles and configure external authentication. This role includes Integrity Verification, Proxy Config, Device EULA, HA, Integration Settings, Disaster Recovery, Debugging Logs, Telemetry Collection, System EULA, IPAM, vManage Servers, Backup & Restore, and Data Platform. Utilities One-stop-shop productivity resource for the most commonly used troubleshooting tools and services. Audit Log Detailed log of changes made via UI or API interface to network devices or Cisco DNA Center. Network Reasoner Initiate logical and automated troubleshooting for network issues while drawing on the knowledge wealth of network domain experts. Scheduler Integrated with other back-end services, scheduler lets you schedule tasks such as deploy policies, provision network devices, or upgrade. You can also schedule rogue containment. Search Search for various objects in Cisco DNA Center, such as sites, network devices, clients, applications, policies, settings, tags, menu items, and more. Display Role-Based Access Control Statistics You can display statistics that show how many users belong to each user role. You can also drill down to view the list of users who have a selected role. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Control. ) and choose System > Users & Roles > Role Based Access All default user roles and custom roles are displayed. Step 2 Click the number corresponding to each user role to view the list of users who have that role. Configure External Authentication If you are using an external server for authentication and authorization of external users, you should enable external authentication in Cisco DNA Center. Before you begin • Only a user with SUPER-ADMIN-ROLE permissions can perform this procedure. For more information, see About User Roles, on page 79. Cisco DNA Center Administrator Guide, Release 2.2.2 88 Manage Users Configure External Authentication • You must configure at least one authentication server. Note The external authentication fallback behavior has changed in this Cisco DNA Center release. In releases earlier than 2.1.x, when external authentication is enabled, Cisco DNA Center falls back to local users if the AAA server is unreachable or the AAA server rejects an unknown username. In the current release, Cisco DNA Center does not fall back to local users if the AAA server is unreachable or the AAA server rejects an unknown username. To enable external authentication fallback, SSH to the Cisco DNA Center instance and enter the following CLI command: magctl rbac external_auth_fallback enable Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Step 2 To enable external authentication in Cisco DNA Center, check the Enable External User check box. Step 3 (Optional) Configure the AAA attribute. ) and choose System > Users & Roles > External Authentication. For most cases, the default AAA attribute setting (Cisco-AVPair) is sufficient, as long as you have set the Cisco DNA Center user profile on the AAA server with Cisco-AVPair as the AAA attribute. You only have to change the default setting in Cisco DNA Center if you have a different value set in the Cisco DNA Center user profile on the AAA server. For example, you might manually define the AAA attribute as Cisco-AVPair=Role=SUPER-ADMIN-ROLE. a) In the AAA Attribute field, leave the default value of Cisco-AVPair or enter the new AAA attribute value. b) Click Update. Step 4 (Optional) Configure the AAA server or servers. Configure these settings only if you want to swap the current primary or secondary AAA servers or define different AAA servers. In the Cisco DNA Center GUI, click the Menu icon ( ) and choose System > Settings > External Services > Authentication and Policy Servers to open the Authentication and Policy Servers window. a) From the Primary AAA Server IP Address drop-down list, choose the IP address of one of the preconfigured AAA servers. b) From the Secondary AAA Server IP Address drop-down list, choose the IP address of one of the preconfigured AAA servers. c) (Optional) If you are using a Cisco ISE server, you can update the settings, if necessary. For information about Cisco ISE policies, see "Configure and Manage Policies" in the Cisco Identity Services Engine Administrator Guide. Table 5: Cisco ISE Server Settings Name Description Shared Secret Key for device authentications. The shared secret can contain up to 100 characters. Username Name that is used to log in to the Cisco ISE CLI. Password Password for the Cisco ISE CLI username. Cisco DNA Center Administrator Guide, Release 2.2.2 89 Manage Users Two-Factor Authentication Name Description FQDN Fully qualified domain name (FQDN) of the Cisco ISE server. The FQDN consists of two parts, a hostname and the domain name, in the following format: hostname.domainname.com For example, the FQDN for a Cisco ISE server might be ise.cisco.com. Subscriber Name A unique text string—for example, acme—that is used during Cisco DNA Center-to-Cisco ISE integration to set up a new pxGrid client in Cisco ISE. Virtual IP Address(es) Virtual IP address of the load balancer behind which the Cisco ISE policy service nodes (PSNs) are located. If you have multiple PSN farms behind different load balancers, you can enter a maximum of six virtual IP addresses. d) (Optional) To update advanced settings, click View Advanced Settings and update the settings, if necessary. Table 6: AAA Server Advanced Settings Name Description Protocol TACACS or RADIUS. Authentication Port Port used to relay authentication messages to the AAA server. • For RADIUS, the default is UDP port 1812. • For TACACS, the port is 49 and cannot be changed. Accounting Port Port used to relay important events to the AAA server. The information in these events is used for security and billing purposes. • For RADIUS, the default UDP port is 1813. • For TACACS, the port is 49 and cannot be changed. Retries Number of times that Cisco DNA Center can attempt to connect with Cisco ISE. Timeout Length of time that Cisco DNA Center waits for Cisco ISE to respond. The maximum timeout value is 60 seconds. e) Click Update. Two-Factor Authentication Two-factor authentication, also known as 2FA, adds another layer of security to user verification by using an identifier method in addition to a user's name and password. The identifier method is generally something that only the actual intended user possesses (such as a phone app or keyfob) and is intentionally separated from the original login method. Cisco DNA Center Administrator Guide, Release 2.2.2 90 Manage Users Prerequisites for Two-Factor Authentication The Cisco DNA Center implementation of two-factor authentication supports the use of a token client (that generates single-use token codes after the appropriate PIN is entered), a token server (that validates token codes), and an authentication server to manage user access. Authentication can be handled using either the RADIUS or TACACS+ protocol. The topics in this section describe: • The requirements that need to be in place in order to implement two-factor authentication. • The necessary configuration settings you need to make. • The Cisco DNA Center login procedure using two-factor authentication. Prerequisites for Two-Factor Authentication The following prerequisites must be in place in order to set up two-factor authentication for use with Cisco DNA Center: • An authentication server that is able to return attribute-value pairs to convey RBAC role authorizations for authenticated Cisco DNA Center users. In our example, we use Cisco Identity Services Engine (Cisco ISE) 2.3 Patch 1. • A two-factor token server that you will integrate with your authentication server. In our example, we use RSA Authentication Manager 7.2. • A token card application on the client’s machine that generates software tokens. In our example, we use RSA SecurID Software Token. Two-Factor Authentication Workflow Here is a summary of what happens when a user logs in to a Cisco DNA Center appliance on which two-factor authentication has been configured: 1. In an RSA SecurID token client, a user enters their PIN to get a token code. 2. In the Cisco DNA Center login page, they enter their username and token code. 3. Cisco DNA Center sends the login request to Cisco ISE using either the RADIUS or TACACS+ protocol. 4. Cisco ISE sends the request to the RSA Authentication Manager server. 5. RSA Authentication Manager validates the token code and informs Cisco ISE that the user has been authenticated successfully. 6. Cisco ISE matches the authenticated user with their configured authorization profile and returns the role=NETWORK-ADMIN-ROLE attribute-value pair. 7. Cisco DNA Center grants access to the features and pages associated with the user's role-based access control (RBAC) role. Configure Two-Factor Authentication To configure two-factor authentication on your Cisco DNA Center appliance, complete the following procedure. Cisco DNA Center Administrator Guide, Release 2.2.2 91 Manage Users Configure Two-Factor Authentication Step 1 Integrate RSA Authentication Manager with Cisco ISE: a) In RSA Authentication Manager, create two users: cdnac_admin (for the Admin user role) and cdnac_observer (for the Observer role). For more information, see the "Add a User to the Internal Database" topic in the RSA Self-Service Console Help. To access this topic, do the following: 1. Open the RSA Self-Service Console Help. 2. In the Search help field, enter Add a User to the Internal Database and then click Search help. b) Create a new authentication agent. For more information, see the "Add an Authentication Agent" topic in the RSA Self-Service Console Help. c) Generate the Authentication Manager agent configuration file (sdconf.rec): 1. From the RSA Security Console, choose Access > Authentication Agents > Generate Configuration File. The Configure Agent Timeout and Retries tab opens. 2. For the Maximum Retries and Maximum Time Between Each Retry fields, use the default values. 3. Click Generate Configuration File. The Download Configuration File tab opens. 4. Click the Download Now link. 5. When prompted, click Save to Disk to save a local copy of the zip file. 6. Unzip the file and use this version of the sdconf.rec file to overwrite the version that is currently installed on the agent. d) Generate a PIN for the cdnac_admin and cdnac_observer users you created in Step 1a. For more information, see the "Create My On-Demand Authentication PIN" topic in the RSA Self-Service Console Help. e) Start Cisco ISE, choose Administration > Identity Management > External Identity Sources > RSA SecurID, and then click Add. f) In the RSA SecurID Identity Sources page, click Browse, choose the sdconf.rec file you downloaded, and then click Open. g) Check the Reauthenticate on Change PIN check box, then click Submit. Step 2 Create two authorization profiles, one for the Admin user role and one for the Observer user role. a) In Cisco ISE, choose Policy > Policy Elements > Results > Authorization > Authorization Profiles. b) For both profiles, enter the following information: • Name field: Enter the profile's name. • Access Type field: Choose ACCESS_ACCEPT. • Advanced Attributes Settings area: Choose Cisco:cisco-av-pair from the first drop-down list. If you are creating an authorization profile for the Admin user role, choose Role=NETWORK-ADMIN-ROLE from the second drop-down list. Cisco DNA Center Administrator Guide, Release 2.2.2 92 Manage Users Enable Two-Factor Authentication Using RADIUS If you are creating an authorization profile for the Observer user role, choose Role=OBSERVER-ROLE from the second drop-down list. Step 3 Create an authentication policy for your Cisco DNA Center appliance. In the Cisco Identity Services Engine Administrator Guide, Release 2.3, see the "Configure Authentication Policies" topic. Step 4 Create two authorization policies, one for the Admin user role and one for the Observer user role. In the Cisco Identity Services Engine Administrator Guide, Release 2.3, see the "Configure Authorization Policies" topic. Step 5 In the RSA Authentication Manager Security Console, verify that software tokens have been assigned to both users. For more information, see the "View a Token" topic in the RSA Self-Service Console Help. Note If you need to assign tokens, complete the steps described in the "Assign a Software Token to a User" topic. Enable Two-Factor Authentication Using RADIUS To enable two-factor authentication that uses a Cisco ISE server configured for RADIUS, complete the following procedure: Step 1 Integrate Cisco ISE with Cisco DNA Center. In the Cisco DNA Center Installation Guide, see the "Integrate Cisco ISE with Cisco DNA Center" topic. Step 2 Configure Cisco DNA Center to use your Cisco ISE server for authentication. See Configure External Authentication. Important Ensure that you specify the same shared secret for both Cisco ISE and Cisco DNA Center. Enable Two-Factor Authentication Using TACACS+ To enable two-factor authentication that uses a Cisco ISE server configured for TACACS+, complete the following procedure: Step 1 In Cisco ISE, choose Administration > Network Resources > Network Devices to open the Network Devices window. Step 2 Click TACACS Authentication Settings to view its contents and ensure that a shared secret has already been configured for the Cisco DNA Center device you added previously. Step 3 Choose Work Centers > Device Administration > Policy Elements to open the TACACS Profiles window. Step 4 Create TACACS+ profiles for the cdnac_admin and cdnac_observer user roles: a) Click Add. b) Complete the following tasks: • Enter the profile's name. Cisco DNA Center Administrator Guide, Release 2.2.2 93 Manage Users Log In Using Two-Factor Authentication • After clicking the Raw View tab, enter the following text into the Profile Attributes text box: • For the cdnac_admin user role, enter Cisco-AVPair=ROLE=NETWORK-ADMIN-ROLE • For the cdnac_observer user role, enter Cisco-AVPair=ROLE=OBSERVER-ROLE c) Click Save. Step 5 Integrate Cisco ISE with Cisco DNA Center. In the Cisco DNA Center Installation Guide, see the "Integrate Cisco ISE with Cisco DNA Center" topic. Step 6 Configure Cisco DNA Center to use your Cisco ISE server for authentication. See Configure External Authentication. Important Ensure that you specify the same shared secret for both Cisco ISE and Cisco DNA Center. Log In Using Two-Factor Authentication To log in to Cisco DNA Center using two-factor authentication, complete the following procedure: Step 1 From the Cisco DNA Center login page, enter the appropriate username. Step 2 Open the RSA SecurID token client and enter the PIN you configured previously to generate a one-time token. Step 3 Copy this token and paste it in to the Cisco DNA Center login page's Password field. Step 4 Click Log In. Display External Users You can view the list of external users who have logged in through RADIUS/TACACS for the first time. The information that is displayed includes their usernames and roles. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Step 2 Scroll to the bottom of the window, where the External Users area lists the external users. Cisco DNA Center Administrator Guide, Release 2.2.2 94 ) and choose System > Users & Roles > External Authentication. CHAPTER 5 Manage Licenses This chapter contains the following topics: • License Manager Overview, on page 95 • Integration with Cisco Smart Accounts, on page 99 • Set Up License Manager, on page 99 • Visualize License Usage and Expiration, on page 100 • View License Details, on page 101 • Change License Level, on page 102 • Export License Information, on page 103 • Auto Registration of Smart License-Enabled Devices, on page 103 • Day 0 Configuration for Smart License-Enabled Devices, on page 103 • Apply Specific License Reservation or Permanent License Reservation to Devices, on page 104 • Cancel SLR or PLR Applied to Devices, on page 106 • Install the Authorization Code and Enable the High Security License, on page 106 • Disable High Security License, on page 107 • Upload Resource Utilization Details to CSSM, on page 108 • Change Device Throughput, on page 108 • Transfer Licenses Between Virtual Accounts, on page 109 • Manage Customer Tags to Smart License-Enabled Devices, on page 109 • Modify License Policy, on page 110 License Manager Overview The Cisco DNA Center License Manager feature helps you visualize and manage all of your Cisco product licenses, including Smart Account licenses. In the Cisco DNA Center GUI, click the Menu icon ( ) and choose Tools > License Manager. The License Manager window contains tabs with the following information: • Overview: • Switch: Shows purchased and in-use license information for all switches. • Router: Shows purchased and in-use license information for all routers. • Wireless: Shows purchased and in-use license information for all wireless controllers and access points. Cisco DNA Center Administrator Guide, Release 2.2.2 95 Manage Licenses License Manager Overview • ISE: Shows purchased and in-use license information for devices managed by Cisco Identity Services Engine (ISE). • All License: The License Summary shows the total licenses purchased from Cisco Smart Software Management (CSSM), number of licenses that are about to expire, and out-of-compliance details for all types of licenses for all Cisco devices. • Reporting and Compliance: The License Summary shows the total licenses purchased from CSSM, number of licenses that are about to expire, and out-of-compliance details for all types of licenses for all Cisco devices. The Smart License Readiness shows the steps to take before devices can be updated to the simplified model. The Smart License Compliance card allows you to launch the Smart License Update workflow. • Notifications: Shows notifications such as CSSM Connectivity, Connection Mode, Device App Over Usage, Upload Usage Report, and so on. To manage licenses, you can use the controls shown above the table listings in each tab. The following table describes each of the controls. Note Not all controls are available in every tab. Table 7: License Management Controls Control Description Filter Click Filter to specify one or more filter values and then click Apply, You can apply multiple filters. To remove a filter, click the x icon next to the corresponding filter value. Change Cisco DNA License Select one or more licenses and choose Actions > Change Cisco DNA License to change the level of a selected Cisco DNA Center license to Essential or Advantage. You can also use this control to remove a Cisco DNA Center license. For more information, see Change License Level, on page 102. Change Virtual Account Select one or more licenses and choose Actions > Change Virtual Account to specify the Virtual Account used to manage these licenses. Manage Smart License > Register Select one or more Smart License-enabled devices and choose Actions > Manage Smart License > Register to register the Smart License-enabled devices. Manage Smart License > Deregister Select one or more Smart License-enabled devices and choose Actions > Manage Smart License > Deregister to unregister the Smart License-enabled devices. Manage License Reservation > Enable License Reservation Choose the device for which you want to apply Specific License Reservation (SLR) or Permanent License Reservation (PLR), then choose Actions > Manage License Reservation > Enable License Reservation. Cisco DNA Center Administrator Guide, Release 2.2.2 96 Manage Licenses License Manager Overview Control Description Manage License Reservation > Update License Reservation The device must be in SLR registered state. You can update the SLR applied to a wireless device or switches with a wireless controller package. Choose the device for which you want to update SLR, then choose Actions > Manage License Reservation > Update License Reservation. Manage License Reservation > Choose the device and choose Actions > Manage License Reservation > Cancel/Return Cancel/Return License Reservation License Reservation to cancel or return the SLR or PLR applied to the device. Manage License Reservation > Factory License Reservation Choose the device and choose Actions > Manage License Reservation > Factory License Reservation to enable the factory-installed SLR on the device. Recent Tasks Click Recent Tasks to see a list of all 50 of the most recently performed Cisco DNA Center tasks. Use the drop-down at the top of the list to narrow the list to show only those tasks that ended in Success or Failure, or those that are still In Progress. License Usage Click License Usage to see the license utilization percentage for all types of licenses. Refresh Click this control to refresh the window. Export Click to export the list of displayed licenses as a CSV file. For more information, see Export License Information, on page 103. Find Enter a search term in the Find field to find all licenses in the list that have that term in any column. Use the asterisk (*) character as a wildcard anywhere in the search string. Show Entries Select the total number of entries to display in each page of the table. The Licenses table displays the information shown for each device. All of the columns support sorting. Click the column header to sort the rows in ascending order. Click the column header again to sort the rows in descending order. Note Not all columns are used in every tab. Additionally, some of the columns are hidden in the default column view setting, which can be customized by clicking the More icon ( ) at the right end of the column headings. Table 8: License Usage Information Column Description Device Type: Device Series Name of the device product series (for example, Catalyst 3850 Series Ethernet Stackable Switch). Click this link to view the license details window. For more information, see View License Details, on page 101. Device Type: Total Devices The total number of devices in this product series that are under active management by Cisco DNA Center. Purchased Licenses The total number of purchased Cisco DNA Center subscription licenses for the devices in this product series. Cisco DNA Center Administrator Guide, Release 2.2.2 97 Manage Licenses License Manager Overview Column Description Purchased Licenses: Network/Legacy The total number of purchased Network (or Legacy) perpetual licenses for the devices in this product series. Used Licenses The total number of Cisco DNA Center subscription licenses applied to the devices in this product series. Used Licenses: Network/Legacy The total number of Network perpetual licenses for the devices in this product series. Feature Licenses (applicable only for The number of licenses purchased for specific features like security, AVC, and so on. Routers) Table 9: All License Information Column Description Device Name Name of the device. Click this link to view the license details window. For more information, see View License Details, on page 101. Device Family The category of device as defined by Cisco DNA Center (for example, Switches and Hubs). IP Address IP address of the device. Device Series The full name of the Cisco product series to which the listed device belongs (for example, Cisco Catalyst 3850 Series Ethernet Stackable Switch). Cisco DNA License The Cisco DNA Center license level. Cisco DNA License Expiry The date the Cisco DNA Center license expires. License Mode The Cisco DNA Center license mode. Network License The type of network license. Virtual Account The name of the Cisco Virtual Account managing the license for this device. Site The Cisco DNA Center site where the device is located. Registration Status The registration status of the device. Authorization Status The authorization status of the device. Reservation Status The reservation status of the device. Last Updated Time Last time this entry in the table was updated. MAC Address The MAC address of the licensed device. Term The total term during which the Cisco DNA Center subscription license is in effect. Days to Expiry The number of days remaining until the Cisco DNA Center license term expires. Software Version The version of the network operating system currently running on the device. Cisco DNA Center Administrator Guide, Release 2.2.2 98 Manage Licenses Integration with Cisco Smart Accounts Integration with Cisco Smart Accounts Cisco DNA Center supports Cisco Smart Accounts, an online Cisco service that provides simplified, flexible, automated software- and device-license purchasing, deployment, and management across your organization. You can add multiple Cisco Smart Accounts. When there are multiple Cisco Smart Accounts, one account is designated as the default, which the License Manager uses for visualization and licensing operations (such as registration, license level changes, and so on). After changing the default Cisco Smart Account, it takes several minutes to retrieve the data from CSSM and display it on the License Manager Overview and All License windows. You can delete any Cisco Smart Accounts, except for the default account. If you already have a Cisco Smart Account, you can use Cisco DNA Center to: • Track your license consumption and expiration • Apply and activate new licenses, without intervention • Promote each device's license level from Essentials to Advantage (or vice versa) and reboot the device with the newly changed level of feature licensing • Identify and reapply unused licenses You can accomplish this automatically, without leaving Cisco DNA Center. Set Up License Manager You must set up access to your Cisco Smart Account before you can use the Cisco DNA Center License Manager tools. Before you begin • Ensure that you have SUPER-ADMIN-ROLE permissions and the appropriate RBAC scope to perform this procedure. • Collect the Cisco user ID and password for your Smart Account. • If you have multiple Smart Accounts, choose the Smart Account that you want to use with Cisco DNA Center, and collect that account's user ID and password. • To enable a Smart Account, Cisco DNA Center must have reachability to tools.cisco.com. • To apply licenses to a device in Cisco DNA Center, the device must be present in Inventory, must have a site assigned to it, and must have reachability to tools.cisco.com. • Ensure that all allowed ports, FQDNs, and URLs listed in the Cisco DNA Center Installation Guide are allowed on any firewall or proxy. Step 1 Log in using a Cisco DNA Center system administrator username and password. Cisco DNA Center Administrator Guide, Release 2.2.2 99 Manage Licenses Visualize License Usage and Expiration Step 2 In the Cisco DNA Center GUI, click the Menu icon ( Step 3 Under Cisco.com Credentials, enter the username and password for your cisco.com account. Step 4 In the Cisco DNA Center GUI, click the Menu icon ( Step 5 Under Smart Account, click Add and enter the username and password for your Smart Account. Step 6 Click Save. Step 7 If you have multiple Smart Accounts, click Add and enter your additional accounts. Step 8 If you have multiple Smart Accounts, choose one account to be the default. The License Manager uses the default account for visualization and licensing operations. To change the default Smart Account: a) Click Change next to the selected Smart Account name. b) Change the active Smart Account and choose a Smart Account to be the default. c) Click Apply. After changing the default account, it takes several minutes to retrieve the data from CSSM and display it on the License Manager Overview and All License windows. Step 9 To edit a Smart Account, click the three dots in the Actions column and choose Edit. Step 10 To delete a nondefault Smart Account, click the three dots in the Actions column and choose Delete. Step 11 To access your Smart Account using a virtual or subordinate Smart Account name and password, under Link Your Smart Account, choose: ) and choose System > Settings > Cisco.com Credentials. ) and choose System > Settings > Smart Account. • Use Cisco.com user ID if your cisco.com and Smart Account credentials are the same. • Use different credentials if your cisco.com and Smart Account credentials are different, and then enter your Smart Account credentials. Step 12 Click View all virtual accounts to view all virtual Smart License Accounts. What to do next Register the Cisco DNA Center controller as a controller for Cisco Plug and Play Connect in a Cisco Smart Account, for redirection services. This also allows you to synchronize the device inventory from the Cisco Plug and Play Connect cloud portal to Cisco DNA Center Plug and Play. For more information, see "Register or Edit a Virtual Account" in the Cisco DNA Center User Guide. Visualize License Usage and Expiration Cisco DNA Center can display graphical representations of your purchased licenses, how many of them are in use (that is, assigned to devices), and their duration. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Step 2 Select the type of device category whose license usage you want to see: Switches, Routers, Wireless, ISE, All Licenses, or Reporting and Compliance. ) and choose Tools > License Manager. The License Usage pie chart at the top of the window displays the aggregate number of purchased licenses and the number of licenses currently in use for the device category you selected. The graphs also indicate the proportion of Essentials versus Advantage licenses within each total. Cisco DNA Center Administrator Guide, Release 2.2.2 100 Manage Licenses View License Details Under the graphs, the License Usage table shows subtotals for used and unused licenses, listed alphabetically by product family name. Step 3 To see detailed comparisons for a particular product family, click the name of the product family in the Device Series column. Cisco DNA Center displays details about the product family you selected. Step 4 To see a graphical representation of license duration, scroll down to the License Timeline section. The timeline graph for each product family is a visual representation of when the licenses in the configured Smart Account will expire for that product family. View License Details There are many ways to find and view license details in Cisco DNA Center. For example, you can click the license usage and term graphs displayed in the Switches, Routers, Wireless, ISE, or All Licenses tabs in the License Manager window. Each graph displays pop-ups with aggregated facts about licenses for each of these product families. The simplest method for getting the most comprehensive license details for a single device is to use the License Manager's All Licenses table, as explained in the following steps. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( ) and choose Tools > License Manager > All Licenses. The License Manager window displays a table listing all of your discovered devices and their licenses. Information in the table includes only basic device and license information, such as device type, license expiration dates, and so on. Step 2 Scroll through the table to find the device whose license details you want to see. If you are having trouble finding the device you want, you can: • Filter: Click and then enter your filter criteria in the appropriate field. (For example, enter all or part of the device name in the Device Name field.) You can enter filter criteria in multiple fields. When you click Apply, the table displays only the rows displaying information that matches your filter criteria. If you want to view the devices that belong to a particular site, navigate to the site in the left pane, and click the site. The devices are filtered accordingly. A site marker indicating the site hierarchy is displayed at the top of the page. • Find: Click in the Find field and enter the text you want to find in any of the table columns. When you press Enter, the table scrolls to the first row with text that matches your entry in the Find field. • Customize: Click and select the columns you want displayed in the table. For example, deselect Device Model or select Days to Expiry. When you click Apply, the table displays only the columns you selected. Step 3 When you find the device you want, click the Device Name link in the row for that device. Cisco DNA Center displays the License Details window with complete license details and license history for the device you selected. Actions displays actions that can be performed on the device or its licenses. When you are finished, click to close the License Details window. Cisco DNA Center Administrator Guide, Release 2.2.2 101 Manage Licenses Change License Level Change License Level You can upgrade or downgrade the feature level of your device licenses. You can do this with Cisco DNA Center (subscription) licenses. Your feature level choices are either the basic Essentials level or the comprehensive Advantage level. (Note that network license conversion is available for products in the Cisco Catalyst 9000 device family only and network license conversion is handled implicitly when the Cisco DNA Center license level is changed.) Whenever you change a device's license level, Cisco DNA Center automatically downloads and applies your licenses behind the scenes, using your Smart Account. Because applying a license level change requires a device reboot, License Manager prompts you to confirm that you want to reboot the device as soon as the license level change is complete. You can choose not to reboot with the license change, but you will need to schedule the reboot at a later time, or your license level change will not be applied. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( ) and choose Tools > License Manager > All Licenses. The License Manager window displays a table listing all of your discovered devices and their licenses. Step 2 Use Find or scroll through the table to find the devices whose license level you want to change. If you are having trouble finding the device you want, or want to select multiple devices, follow the tips in View License Details, on page 101 to change the table to display only the devices you want. Step 3 Check the check box next to each device for which you want to change the license level, then choose Actions > Change Cisco DNA License. Cisco DNA Center displays a Change License Level window appropriate for the license type you want to change. Step 4 Click the license level you want for these devices: Essentials or Advantage. To remove the license from the device, click Remove. Step 5 Click Next. Cisco DNA Center asks if you want the change to be applied right away or at a later time. You also must choose whether you want to reboot the device as soon as its license status is updated. To continue: • If you are not ready to make the change: Click Back to change your License Level selection, or click window and cancel the change. to close the • If you are ready to make the change immediately: Click Now, then click Confirm. The device using this license will reboot as soon as the change is applied. • If you want the change to be applied later: Click Later, enter a name for the scheduled task, and specify the date and time when you want the change to be applied. If you want the change to take place as scheduled in the time zone of the site where the device is located, click Site Settings. When you are finished specifying the schedule parameters, click Confirm. Cisco DNA Center Administrator Guide, Release 2.2.2 102 Manage Licenses Export License Information Export License Information You can quickly export license information from Cisco DNA Center to backup PDF or Microsoft Excel files. These license backup files are intended to assist your organization's accounting and reporting needs. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Step 2 Click All Licenses. Cisco DNA Center displays a list of all your currently assigned licenses. Step 3 Click Export. Cisco DNA Center displays the Export Licenses window. Step 4 Choose the destination file format. Step 5 (Optional) Check the check box next to each type of license information that you want to exclude or include in the export. Check the check box at the bottom to save your choices as the default for later exports. Step 6 Click Export and specify the location and filename for the exported license file. Step 7 Click OK to complete the export. ) and choose Tools > License Manager. Auto Registration of Smart License-Enabled Devices You can enable auto registration of Smart License (SL)-enabled devices. When auto registration is enabled, any SL-enabled devices added to Cisco DNA Center are automatically registered to the chosen virtual account. Step 1 Log in using a Cisco DNA Center system administrator username and password. Step 2 In the Cisco DNA Center GUI, click the Menu icon ( Account. Step 3 Click License. Step 4 Check the Auto register smart license enabled devices check box. Step 5 Choose a virtual account. Step 6 Click Apply. ) and choose System > Settings > Cisco Accounts > Smart Day 0 Configuration for Smart License-Enabled Devices Devices that are already added to Cisco DNA Center before enabling auto registration are not automatically registered. You can view the Smart License-enabled devices that are not registered in the All License page. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( ) and choose Tools > License Manager > All License. The License Manager window displays a banner message with the number of SL-enabled devices that are not auto registered and a table listing all of your discovered devices and their licenses with a link to set up auto registration. Alternatively, you can filter the unregistered devices by using the Registration Status column. Cisco DNA Center Administrator Guide, Release 2.2.2 103 Manage Licenses Apply Specific License Reservation or Permanent License Reservation to Devices Step 2 Choose the SL-enabled devices that you want to register and choose Actions > Manage Smart License > Register. Step 3 Choose the virtual account and click Continue. Step 4 To register the devices: • If you want to register the devices immediately, choose Now and click Confirm. • If you want to register the devices later, choose Later and specify a date and time. When you are finished specifying the schedule parameters, click Confirm. Apply Specific License Reservation or Permanent License Reservation to Devices Smart Licensing requires a smart device instance to regularly sync with Cisco Smart Software Management (CSSM) so that the latest license status is refreshed and compliance is reported. Some customers have devices that are within highly secured networks with limited internet access. In these types of networks, devices cannot regularly sync with CSSM and show out of compliance. To support these customer environments, Specific License Reservation (SLR) and Permanent License Reservation (PLR) have been introduced. The License Manager enables Cisco DNA Center customers to reserve licenses securely from CSSM using an API-based workflow. In Cisco DNA Center, it requires a one-time connectivity to CSSM in the staging environment, then the devices never need to connect to Cisco in SLR or PLR mode. If no connectivity to CSSM or staging is possible, you can resort to the manual SLR/PLR workflow available in CSSM. SLR lets you install a node-locked license file (SLR authorization code) on a product instance. This license file enables individual (specific) licenses (entitlement tags). PLR lets you install an authorization code that enables all licensed features on the product. Both SLR and PLR require preapproval at the Smart Account level. Contact [email protected] for support. To enable SLR or PLR when both the device and Cisco DNA Center are connected to CSSM, see Enable SLR/PLR When the Devices and Cisco DNA Center Are Connected to CSSM, on page 104. To enable SLR or PLR when the device and Cisco DNA Center do not have connectivity to CSSM, see Enable SLR/PLR When the Devices and Cisco DNA Center Are Not Connected to CSSM, on page 105. Enable SLR/PLR When the Devices and Cisco DNA Center Are Connected to CSSM Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Step 2 Select the devices for which you want to apply SLR or PLR, and choose Actions > Manage License Reservation > Enable License Reservation. Step 3 Choose Specific License Reservation (SLR) or Permanent License Reservation (PLR) and click Continue to obtain the request codes for the selected devices. Step 4 After the request codes are generated for the selected devices, click Continue. Step 5 Choose a virtual account from which you want to reserve licenses and click Continue to generate the authorization codes for the selected devices. Cisco DNA Center Administrator Guide, Release 2.2.2 104 ) and choose Tools > Licenses > All Licenses. Manage Licenses Enable SLR/PLR When the Devices and Cisco DNA Center Are Not Connected to CSSM Step 6 After the authorization codes are generated, do any of the following: • To apply SLR immediately, choose the devices and click Continue. • To apply SLR at a later time, click Apply Later. Step 7 Click Confirm to apply SLR/PLR to the selected device. You can now view the updated status of the devices under Reservation Status on the All Licenses page. Enable SLR/PLR When the Devices and Cisco DNA Center Are Not Connected to CSSM Use this procedure to enable SLR/PLR for the devices that are not connected to CSSM. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Step 2 Select the devices for which you want to apply SLR or PLR, and choose Actions > Manage License Reservation > Enable License Reservation. Step 3 Choose Specific License Reservation (SLR) or Permanent License Reservation (PLR) and click Continue to obtain the request codes for the selected devices. ) and choose Tools > Licenses > All Licenses. You also can connect to the device through Telnet to obtain the request code. Step 4 After the request codes are generated for the selected devices, click Export. This downloads the requestcodes.csv file, which contains the IP address, serial number of the device, and the request code. Step 5 Save the file to your preferred location. Step 6 Obtain the authorization code for each device from CSSM and update it in the CSV file. See Generate the Authorization Code from CSSM. Step 7 Click the Upload CSV link. Step 8 Click the Select a file from your computer link to select the saved CSV file. Step 9 Click Continue. Step 10 Choose a virtual account from which you want to reserve licenses and click Continue. SLR or PLR is applied to the selected devices. You can now view the updated status of the devices under Reservation Status on the All Licenses page. Generate the Authorization Code from CSSM Before you begin You must have Smart Account credentials to log in to CSSM. Step 1 Log in to CSSM. Cisco DNA Center Administrator Guide, Release 2.2.2 105 Manage Licenses Cancel SLR or PLR Applied to Devices Step 2 Choose Inventory > Licenses > License Reservation. The Smart License Reservation wizard appears. The License Reservation button is visible on the Licenses tab only if you have specific license reservation enabled for your Smart Account. Step 3 In the Step 1: Enter Request Code tab, enter the request code in the Reservation Request Code field and click Next. Step 4 In the Step 2: Select Licenses tab, check the Reserve a specific license check box. Step 5 In the Quantity to Reserve field, enter the number of licenses that you want to reserve and click Next. Step 6 In the Step 3: Review and Confirm tab, click Generate Authorization Code. Step 7 Obtain the authorization code from the Step 4: Authorize Code tab. Cancel SLR or PLR Applied to Devices You can cancel or return the SLR or PLR that is applied to a device. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Step 2 Click the device and choose Actions > Manage License Reservation > Cancel/Return License Reservation. Step 3 Click Cancel to return the licenses. ) and choose Tools > Licenses > All Licenses. You can view the updated status of the devices under Reservation Status on the All Licenses page. Install the Authorization Code and Enable the High Security License Cisco offers a throughput of 250 Mbps be default. To increase the device throughput more than 250 Mbps, you must get the authorization code from Cisco. You can install the authorization code and enable the High Security (HSEC) license in a single workflow or in separate workflows, as required. Before you begin Ensure that the device is running Cisco IOS-XE software release 17.3.2 or later. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Step 2 Click the Reporting and Compliance tab. Step 3 Click the Smart License Compliance card. Step 4 In the Smart License Update window, click Let's Do It. ) and choose Tools > License Manager. To skip this window in the future, check Don't show this to me again. Step 5 In the Select Smart Account window, choose Smart Account and Virtual Account from the drop-down list. Step 6 Click Next. Cisco DNA Center Administrator Guide, Release 2.2.2 106 Manage Licenses Disable High Security License Step 7 In the Choose Sites and Devices window, choose the devices on which you want to install the authorization code and click Next. Step 8 In the Policy Settings window, review the CSSM policies and click Next. Step 9 In the Choose Device Features window, do the following: a) b) c) d) Choose the devices. From the Auth Codes drop-down list, choose Install. From the HSEC drop-down list, choose Enable. Click Next. Step 10 In the Review Device Features window, click Next. Step 11 In the Installing Device Features window, view the authorization code and HSEC installation status and click Next. Step 12 In the Sync Data with Cisco window, click Next. Step 13 The Summary window displays the authorization code and HSEC installation status. Step 14 Click Finish. Disable High Security License You can disable the HSEC license from a device if you don't want to consume the HSEC license unnecessarily. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Step 2 Click the Reporting and Compliance tab. Step 3 Click the Smart License Compliance card. Step 4 In the Smart License Update window, click Let's Do It. ) and choose Tools > License Manager. To skip this window in the future, check Don't show this to me again. Step 5 In the Select Smart Account window, choose Smart Account and Virtual Account from the drop-down list. Step 6 Click Next. Step 7 In the Choose Sites and Devices window, choose the devices from which you want to disable the High Security license and click Next. Step 8 In the Policy Settings window, click Next. Step 9 In the Choose Device Features window, do the following: a) Choose the devices. b) From the HSEC drop-down list, choose Disable. c) Click Next. Step 10 In the Review Device Features window, click Next. Step 11 In the Installing Device Features window, view the HSEC disable operation status and click Next. Step 12 In the Sync Data with Cisco window, click Next. Step 13 The Summary window displays the HSEC disable operation status. Step 14 Click Finish. Cisco DNA Center Administrator Guide, Release 2.2.2 107 Manage Licenses Upload Resource Utilization Details to CSSM Upload Resource Utilization Details to CSSM You can upload resource utilization details to CSSM instantly or schedule an uploading event. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Step 2 Click the Reporting and Compliance tab. Step 3 Click the Smart License Compliance card. Step 4 In the Smart License Update window, click Let's Do It. ) and choose Tools > License Manager. To skip this window in the future, check Don't show this to me again. Step 5 In the Select Smart Account window, choose Smart Account and Virtual Account from the drop-down list. Step 6 Click Next. Step 7 In the Choose Sites and Devices window, choose the devices from which you want to retrieve the resource utilization details and click Next. Step 8 To upload the resource utilization details instantly, click Next in the Modify Policy window. To modify the scheduled reporting frequency, do the following: a) Under Policy Settings, click Modify corresponding to the Reporting Interval field. b) In the Change Reporting Interval window, enter the value. The reporting interval (in days) denotes the frequency of scheduled upload of resource utilization details from Cisco DNA Center to CSSM. The frequency of uploads can be increased but cannot be reduced below the minimum reporting frequency. c) Click Save. Step 9 In the Sync Data with Cisco window, click Next. The Summary window shows the status of operations that are performed in this workflow. Step 10 Click Finish. After successful synchronization of data with CSSM, Cisco DNA Center sends an acknowledgment to the devices. Change Device Throughput You can change the throughput of Smart License-enabled routers. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Step 2 Click the Reporting and Compliance tab. ) and choose Tools > License Manager. The Reporting and Compliance window displays a table listing all your Smart License-enabled devices and their licenses. Step 3 Choose the device that you want to change. Step 4 Click More Actions and choose Change Throughput. Cisco DNA Center Administrator Guide, Release 2.2.2 108 Manage Licenses Transfer Licenses Between Virtual Accounts Step 5 In the Choose Throughput window, choose the throughput value and click Next. Step 6 In the Apply Throughput window, click Next. Step 7 Click the Recent Tasks link to launch the Recent Tasks window. You can view the Change Throughput task status in the Recent Task window. Transfer Licenses Between Virtual Accounts You can transfer licenses between virtual accounts. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( ) and choose Tools > License Manager. The License Manager window displays a table listing all your discovered devices and their licenses. Step 2 Click the down arrow next to Device View and choose License View. Step 3 Choose the licenses that you want to transfer and click Transfer Licenses. Step 4 In the Transfer Licenses window, choose the virtual account. Step 5 Enter the Transfer License Count for each of the chosen licenses and click Transfer. Step 6 Click the Recent Tasks link to launch the Recent Tasks window. You can view the License Transfer task status in the Recent Task window. Manage Customer Tags to Smart License-Enabled Devices You can add a maximum of four customer tags to a Smart License-enabled device to help identify telemetry data for a product instance. You can also update and delete the customer tags. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Step 2 Click the Reporting and Compliance tab. ) and choose Tools > License Manager. The Reporting and Compliance window displays a table listing all Smart License-enabled devices and their licenses. Step 3 Choose the devices on which you want to add customer tags. Step 4 Click More Actions and choose Manage Free Form Fields to add, update, or delete customer tags. Step 5 To add or update customer tags, do the following in the Free Form Fields window: a) Enter the customer tags. b) Click Save. Step 6 To delete customer tags, do the following in the Free Form Fields window: a) Click the delete icon for the customer tags that you want to delete. b) Click Save. c) In the Warning window, click Continue. Cisco DNA Center Administrator Guide, Release 2.2.2 109 Manage Licenses Modify License Policy Step 7 Click the Recent Tasks link to launch the Recent Tasks window. You can view the Manage Customer Tags task status in the Recent Task window. Modify License Policy You can modify the reporting interval at which the network devices will report their feature usage to CSSM. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Step 2 Click Reporting and Compliance tab. Step 3 In the Smart License table, click Modify Policy. ) and choose Tools > License Manager. The Modify Policy window shows the policy settings and CSSM policy details. Step 4 Under Policy Settings, click Modify. Step 5 In the Change Reporting Interval window, enter the reporting interval value. Step 6 Click Save. Cisco DNA Center Administrator Guide, Release 2.2.2 110 CHAPTER 6 Backup and Restore • About Backup and Restore, on page 111 • Backup Server Requirements, on page 113 • Backup Storage Requirements, on page 115 • Example of NFS Server Configuration—Ubuntu, on page 116 • Example of NFS Server Configuration—CentOS, on page 117 • Configure Firewall Rules to Allow NFS, on page 118 • Configure Backup Servers, on page 119 • Back Up Data Now, on page 120 • Schedule Data Backups, on page 121 • Restore Data from Backups, on page 122 About Backup and Restore You can use the backup and restore functions to create backup files to restore to a different appliance (if required for your network configuration). Backup You can back up automation data only or both automation and Assurance data. Automation data consists of Cisco DNA Center databases, credentials, file systems, and files. The automation backup is a full backup. The Assurance data consists of network assurance and analytics data. The first backup of Assurance data is a full backup. After that, backups are incremental. Important Do not modify the backup files. If you do, you might not be able to restore the backup files to Cisco DNA Center. Cisco DNA Center creates the backup files and posts them to a remote server. Each backup is uniquely stored using the UUID as the directory name. For information about the remote server requirements, see Backup Server Requirements, on page 113. Only a single backup can be performed at a time. Performing multiple backups at once is not supported. Cisco DNA Center Administrator Guide, Release 2.2.2 111 Backup and Restore Backup and Restore Event Notifications When a backup is being performed, you cannot delete the files that have been uploaded to the file service, and changes that you make to these files might not be captured by the backup process. We recommend the following: • Perform a daily backup to maintain a current version of your database and files. • Perform a backup after making changes to your configuration, for example, when changing or creating a new policy on a device. • Perform a backup only during a low-impact or maintenance period. You can schedule weekly backups on a specific day of the week and time. Restore You can restore the backup files from the remote server using Cisco DNA Center. When you restore the backup files, Cisco DNA Center removes and replaces the existing database and files with the backup database and files. While a restore is being performed, Cisco DNA Center is unavailable. You cannot take a backup from one version of Cisco DNA Center and restore it to another version of Cisco DNA Center. You only can restore a backup to an appliance that is running the same Cisco DNA Center software version, applications, and application versions as the appliance and applications from which the backup was taken. To view the current applications and versions on Cisco DNA Center, choose System > Software Updates. You can restore a backup to a Cisco DNA Center appliance with a different IP address. This situation could happen if the IP address is changed on Cisco DNA Center and you need to restore from an older system. Important After a backup and restore of Cisco DNA Center, you need to access the Integration Settings page and update (if necessary) the Callback URL Host Name or IP Address. For more information, see Configure Integration Settings. Backup and Restore Event Notifications Starting with Cisco DNA Center 2.2.2.4, you can receive a notification whenever a backup or restore event takes place. To configure and subscribe to these notifications, complete the steps described in the Cisco DNA Center Platform User Guide's "Work with Events" topic. When completing this procedure, ensure that you select and subscribe to the SYSTEM-BACKUP and SYSTEM-RESTORE events in the Platform > Developer Toolkit > Events table. A notification is generated and sent whenever one of the events listed in the following table occur: Cisco DNA Center Administrator Guide, Release 2.2.2 112 Backup and Restore Backup Server Requirements Operation Event Backup The process to create a backup file for your system has started. A backup file was successfully created for your system. A backup file could not be created for your system. This typically happens because: • The necessary disk space is not available on remote storage. • You are unable to fetch the status of your system's NFS server, which is a precheck for the backup operation. • You encountered connectivity issues and/or latency while creating a backup file on your system's NFS server. Restore The process to restore a backup file has started. The restoration of a backup file was successful. The restoration of a backup file failed. This typically happens because: • The backup file has become corrupted. • You encountered connectivity issues and/or latency while creating a backup file on your system's NFS server. Backup Server Requirements The backup server must run one of the following operating systems: • RedHat Enterprise (or CentOS) 7 or later • Ubuntu 16.04 (or Mint, etc) or later Server Requirements for Automation Data Backup To support automation data backups, the server must meet the following requirements: • Must use SSH (port22)/remote sync (rsync). Cisco DNA Center does not support using FTP (port 21) when performing a backup. • The Linux rsync utility must be installed. • The C.UTF-8 locale must be installed. To confirm whether C.UTF-8 is installed, enter: # localectl C.utf8 en_SC.utf8 list-locales | grep -i c.utf • The backup user must own the destination folder for the backup or have read-write permissions for the user's group. For example, assuming the backup user is backup and the user's group is staff, the following sample outputs show the required permissions for the backup directory: • Example 1: Backup directory is owned by backup user: Cisco DNA Center Administrator Guide, Release 2.2.2 113 Backup and Restore Backup Server Requirements $ ls -l drwxr-xr-x /srv/ 4 backup root 4096 Apr 10 15:57 acme • Example 2: backup user's group has required permissions: $ ls -l /srv/ drwxrwxr-x. 7 root staff 4096 Jul 24 2017 acme • SFTP subsystem must be enabled. The following line must be uncommented and present in the SSHD configuration: Subsystem sftp /usr/libexec/openssh/sftp-server The file where you need to uncomment the preceding line is usually located in /etc/ssh/sshd_config. Note You cannot use an NFS-mounted directory as the Cisco DNA Center backup server directory. A cascaded NFS mount adds a layer of latency and is therefore not supported. Server Requirements for Assurance Backup To support Assurance data backups, the server must be a Linux-based NFS server that meets the following requirements: • Support NFS v4 and NFS v3. (To verify this support, from the server, enter nfsstat -s.) • Have read and write permissions on the NFS export directory. • Have a stable network connection between Cisco DNA Center and the NFS server. • Have sufficient network speed between Cisco DNA Center and the NFS server. • Have the C.UTF-8 locale installed. To confirm whether C.UTF-8 is installed, enter: # localectl C.utf8 en_SC.utf8 Note list-locales | grep -i c.utf You cannot use an NFS-mounted directory as the Cisco DNA Center backup server directory. A cascaded NFS mount adds a layer of latency and is therefore not supported. Requirements for Multiple Cisco DNA Center Deployments If your network includes multiple Cisco DNA Center clusters, you cannot use the same backup location for automation and Assurance backups. For multiple Cisco DNA Center deployments, the best practice is to separate the backup directory structure for each Cisco DNA Center cluster. The following example configuration shows how to separate your backup directory structure. Resource Example Configuration Cisco DNA Center clusters 1. cluster1 2. cluster2 Cisco DNA Center Administrator Guide, Release 2.2.2 114 Backup and Restore Backup Storage Requirements Resource Example Configuration Backup server hosting automation and Assurance backups The example directory is /data/, which has ample space to host both types of backups. Automation backup directory structure cluster1: /data/automation/cluster1 cluster2: /data/automation/cluster2 Directory ownership and permissions Earlier in this section, see "Server Requirements for Automation Data Backup." Assurance backup directory structure cluster1: /data/assurance/cluster1 cluster2: /data/assurance/cluster2 Directory ownership and permissions Earlier in this section, see "Server Requirements for Assurance Backup." NFS export configuration The content of the /etc/exports file: /data/assurance/cluster1 *(rw,sync,no_subtree_check,all_squash) /data/assurance/cluster2 *(rw,sync,no_subtree_check,all_squash) Requirements When Migrating to New Cisco DNA Center Hardware If you upgrade your Cisco DNA Center cluster to new hardware or you replace your existing cluster hardware as part of the return materials authorization (RMA) process, use a different directory structure for the backup after restoring from the existing backup location. Note If you replace one or two nodes from an existing three-node cluster, there is no need to change the backup directory structure. Backup Storage Requirements Cisco DNA Center stores backup copies of Assurance data on an external NFS device and automation data on an external remote sync (rsync) target location. You must allocate enough external storage for your backups to cover the required retention. We recommend the following storage. Appliance NFS Storage (14 Days Incremental) Rsync Storage (Daily Full) DN2-HW-APL 1.7 TB 50 GB DN2-HW-APL-L 3 TB 100 GB DN2-HW-APL-XL 8.4 TB 300 GB Additional notes: Cisco DNA Center Administrator Guide, Release 2.2.2 115 Backup and Restore Example of NFS Server Configuration—Ubuntu • The preceding table assumes fully loaded appliance configurations that support the maximum number of access points and network devices for each appliance. • Only unique data is backed up to NFS. Therefore, single- and three-node HA configurations create backups of approximately equal sizes. • NFS storage is the only available destination type for Assurance data backups. • NFS backups are incremental after the first full backup. The preceding table assumes that the first day you run an Assurance data backup, a full backup is generated. Then, each subsequent day generates an incremental backup. • Rsync storage is the only available destination type for automation data backups. • The rsync backup sizing is estimated for one daily backup. If you want to retain backups for additional days, multiply the required storage by the additional number of days. For example, if you have a DN2-HW-APL appliance and you want to store five copies of automation data backups generated once each day, the total storage required is 5 * 50 GB = 250 GB. Example of NFS Server Configuration—Ubuntu The remote share for backing up an Assurance database (NDP) must be an NFS share. If you need to configure an NFS server, use the following procedure (Ubuntu distribution) as an example. Step 1 Enter the sudo apt-get update command to access and update the advanced packaging tool (APT) for the NFS server. For example, enter a command similar to the following: $ Step 2 sudo apt-get update Enter the sudo apt-get install command to install the advanced packaging tool for NFS. For example, enter a command similar to the following: $ Step 3 sudo apt-get install -y nfs-kernel-server Enter the sudo mkdir -p command to create nested directories for the NFS server. For example, enter a command similar to the following: $ Step 4 sudo mkdir -p /var/nfsshare/ Enter the sudo chown nobody:nogroup command to change the ownership of the group to nobody and nogroup. For example, enter a command similar to the following: $ Step 5 sudo chown nobody:nogroup /var/nfsshare Enter the sudo vi /etc/exports command to add the following line to the end of /etc/exports: sudo vi /etc/exports /var/nfsshare *(rw,all_squash,sync,no_subtree_check) $ Step 6 Enter the sudo exportfs -a command to export the file systems for the NFS server. For example, enter a command similar to the following: Cisco DNA Center Administrator Guide, Release 2.2.2 116 Backup and Restore Example of NFS Server Configuration—CentOS $ Step 7 sudo exportfs -a Enter the sudo systemctl start nfs-server command to restart the NFS server. For example, enter a command similar to the following: $ sudo systemctl start nfs-server Example of NFS Server Configuration—CentOS The following procedure shows an example NFS server configuration for CentOS. Step 1 Enter the sudo yum check-update command to access and update the Yellowdog Updater Modified (YUM) for the NFS server. For example, enter a command similar to the following: $ Step 2 sudo yum check-update Enter the sudo apt-get install command to install the advanced packaging tool for NFS. For example, enter a command similar to the following: $ Step 3 Enable and start the NFS server. $ $ Step 4 sudo yum install -y nfs-utils sudo systemctl enable nfs-server sudo systemctl start nfs-server Enter the sudo mkdir -p command to create nested directories for the NFS server. For example, enter a command similar to the following: $ Step 5 sudo mkdir -p <your_NFS_directory> Enter the sudo chown nfsnobody command to change the ownership of the group. For example, enter a command similar to the following: $ Step 6 sudo chown nfsnobody:nfsnobody /var/nfsshare Enter the sudo vi /etc/exports command to add the following line to the end of /etc/exports: sudo vi /etc/exports /var/nfsshare *(rw,all_squash,sync,no_subtree_check) $ Step 7 Enter the sudo exportfs -a command to export the file systems for the NFS server. For example, enter a command similar to the following: $ Step 8 sudo exportfs -a Enter the sudo systemctl start nfs-server command to restart the NFS server. For example, enter a command similar to the following: Cisco DNA Center Administrator Guide, Release 2.2.2 117 Backup and Restore Configure Firewall Rules to Allow NFS $ sudo systemctl start nfs-server Configure Firewall Rules to Allow NFS By default, firewall is disabled on Debian/Ubuntu distributions but enabled on RedHat/CentOS distributions. Check whether firewall is enabled on Debian/Ubuntu distributions and if it is, add firewall rules. Configure Firewall Rules—Debian/Ubuntu For Debian/Ubuntu, do the following: Step 1 Enter the following command to check whether firewall is enabled or disabled: $ sudo ufw status If firewall is disabled, the output shows: Status: inactive If firewall is enabled, the output shows: Status: active Step 2 If firewall is enabled, set the static port for the mountd process to allow for easy firewall rule creation. To set the static port for mountd, change the following line to add --port 32767 to /etc/default/nfs-kernel-server: RPCMOUNTDOPTS="--manage-gids Step 3 --port 32767" Enter the following commands to add firewall rules to allow NFS: sudo ufw allow portmapper sudo ufw allow nfs sudo ufw allow mountd Configure Firewall Rules—RedHat/CentOS For RedHat/CentOS, do the following: Step 1 Add the mountd port to services and to nfs.conf. Note RedHat/CentOS-based distributions use a different port for mountd than Debian-based distributions. RedHat/CentOS distributions use port 20048 for mountd in the /etc/service file. Add the following lines to /etc/nfs.conf if they don't exist: [mountd] manage-gids = 1 port = 20048 Step 2 Enter the following command to restart the NFS services and firewall: Cisco DNA Center Administrator Guide, Release 2.2.2 118 Backup and Restore Configure Backup Servers sudo systemctl restart nfs-server rpcbind nfs-mountd Step 3 Enter the following commands to add firewall rules to allow NFS: sudo firewall-cmd --permanent --add-service={nfs,rpc-bind,mountd} sudo firewall-cmd --reload Configure Backup Servers If you plan to back up automation data only, you need to configure the Cisco DNA Center Core System server. If you plan to back up both automation and Assurance data, you need to configure the Cisco DNA Center core system backup server and the NFS backup server. This procedure shows you how to set up both servers. Before you begin Make sure the following requirements have been met: • Only a user with SUPER-ADMIN-ROLE permissions can perform this procedure. For more information, see About User Roles, on page 79. • The server that you plan to use for data backups must meet the requirements described in Backup Server Requirements, on page 113. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Step 2 To configure the core system backup server, do the following: a) Define the following settings: ) and choose System > Backup & Restore > Configure. Field Description SSH IP Address IP address of the remote server that you can SSH into. SSH Port Port address of the remote server that you can SSH into. Server Path Path to the folder on the server where the backup files are saved. Username Username used to protect the encrypted backup. Password Password used to protect the encrypted backup. Encryption Passphrase Passphrase used to encrypt the security-sensitive components of the backup. These security-sensitive components include certificates and credentials. This is a required passphrase for which you will be prompted and that must be entered when restoring the backup files. Without this passphrase, backup files are not restored. b) Click Apply. Step 3 To configure the NFS backup server, click the NFS tab and define the following settings: Cisco DNA Center Administrator Guide, Release 2.2.2 119 Backup and Restore Back Up Data Now Step 4 Field Description Host IP address or host name of the remote server that you can SSH into. Server Path Path to the folder on the server where the backup files are saved. Click Apply. Back Up Data Now You can choose to back up one of the following data sets: • Automation data only. • Both automation and Assurance data. When you perform a backup, Cisco DNA Center copies and exports the data to the location on the remote server that you configured. Note Data is backed up using SSH/rsync. Cisco DNA Center does not support using FTP (port 21) when performing a backup. Before you begin Make sure the following requirements have been met: • Only a user with SUPER-ADMIN-ROLE permissions can perform this procedure. For more information, see About User Roles, on page 79. • Backup servers meet the requirements described in Backup Server Requirements, on page 113. • Backup servers have been configured in Cisco DNA Center. For information, see Configure Backup Servers, on page 119. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Note Step 2 ) and choose System > Backup & Restore > Backups. If you have not yet configured a backup server, Cisco DNA Center requires that you configure one before proceeding. Click Configure Settings and see Configure Backup Servers, on page 119. Click Add. The Create Backup pane appears. Step 3 In the Backup Name field, enter a unique name for the backup. Step 4 Click Create now to perform the backup immediately. Step 5 Define the scope of the backup: Cisco DNA Center Administrator Guide, Release 2.2.2 120 Backup and Restore Schedule Data Backups • Click Cisco DNA Center (All data) to back up automation and Assurance data. • Click Cisco DNA Center (without Assurance data) to back up only automation data. Step 6 Click Create. Note You can view the current backup status and the history of previous backups in the Activity tab. You can create a new backup only when there is no backup job in progress. You can view the successfully completed backup jobs in the Backup tab. During the backup process, Cisco DNA Center creates the backup database and files. The backup files are saved to the specified location on the remote server. You are not limited to a single set of backup files, but can create multiple backup files that are identified with their unique names. You receive a Backup done! notification when the process is finished. Note If the backup process fails, there is no impact to the appliance or its database. Cisco DNA Center displays an error message stating the cause of the backup failure. The most common reason for a failed backup is insufficient disk space. If your backup process fails, make sure that there is sufficient disk space on the remote server and attempt another backup. Schedule Data Backups You can schedule recurring backups and define the day of the week and the time of day when they will occur. Before you begin Make sure the following requirements have been met: • Only a user with SUPER-ADMIN-ROLE permissions can perform this procedure. For more information, see About User Roles, on page 79. • Backup servers meet the requirements described in Backup Server Requirements, on page 113. • Backup servers have been configured in Cisco DNA Center. For information, see Configure Backup Servers, on page 119. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Step 2 Click Add. Step 3 In the Backup Name field, enter a unique name for the backup. Step 4 Click Schedule weekly. Step 5 Choose the days and time for scheduling the backup. Step 6 Define the scope of the backup: ) and choose System > Backup & Restore > Schedule. • Click Cisco DNA Center (All data) to back up automation and Assurance data. • Click Cisco DNA Center (without Assurance data) to back up automation data only. Step 7 Click Schedule. Cisco DNA Center Administrator Guide, Release 2.2.2 121 Backup and Restore Restore Data from Backups You can view the scheduled backup jobs in the Schedule tab. After the backup starts, you can view backup status in the Activity tab. Note You can create a new backup only when there is no backup job in progress. You can view the successfully completed backup jobs in the Backup tab. During the backup process, Cisco DNA Center creates the backup database and files. The backup files are saved to the specified location on the remote server. You are not limited to a single set of backup files, but can create multiple backup files that are identified with their unique names. You receive a Backup done! notification when the process is finished. If the backup process fails, there is no impact to the appliance or its database. Cisco DNA Center displays an error message stating the cause of the backup failure. The most common reason for a failed backup is insufficient disk space. If your backup process fails, make sure that there is sufficient disk space on the remote server and attempt another backup. Note Restore Data from Backups When you restore data from a backup file, Cisco DNA Center removes and replaces the existing database and files with the backup database and files. The data that is restored depends on what is on the backup: • Automation data backup: Cisco DNA Center restores the full automation data. • Automation and Assurance data backup: Cisco DNA Center restores the full automation data and the Assurance data as far back as the date that you choose. Caution The Cisco DNA Center restore process only restores the database and files. The restore process does not restore your network state and any changes made since the last backup, including any new or updated network policies, passwords, certificates, or trustpool bundles. Note • You cannot do a backup from one version of Cisco DNA Center and restore it to another version of Cisco DNA Center. You can only restore a backup to an appliance that is running the same Cisco DNA Center software version, applications, and application versions as the appliance and applications from which the backup was taken. To view the current apps and versions, choose System > Software Updates. • If multiple clusters share the same Cisco AI Network Analytics configuration and are active at the same time, restoring a backup that includes the AI Network Analytics configuration on a different Cisco DNA Center cluster might result in data inconsistency and service disruption. Therefore, the AI Network Analytics configuration must be active on a single cluster. To uninstall the AI Network Analytics package from any inactive cluster, choose System > Software Updates > Installed Apps > AI Network Analytics > Uninstall. Cisco DNA Center Administrator Guide, Release 2.2.2 122 Backup and Restore Restore Data from Backups Before you begin Make sure the following requirements have been met: • Only a user with SUPER-ADMIN-ROLE permissions can perform this procedure. For more information, see About User Roles, on page 79. • You have backups from which to restore data. When you restore data, Cisco DNA Center enters maintenance mode and is unavailable until the restore process is done. Make sure you restore data at a time when Cisco DNA Center can be unavailable. If you restore from a backup (on either the Cisco ISE or Cisco DNA Center side), Group-Based Access Control policy data does not synchronize automatically. You must run the policy migration operation manually to ensure that Cisco ISE and Cisco DNA Center are synchronized. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( ) and choose System > Backup & Restore. The Backup & Restore window displays the following tabs: Backups, Schedule, and Activity. If you already successfully created a backup on a remote server, it appears in the Backups tab. Step 2 In the Backup Name column, locate the backup that you want to restore. Step 3 In the Actions column, choose Restore. The Cisco DNA Center restore process restores the database and files. The restore process does not restore your network state and any changes made since the last backup, including any new network policies that have been created, any new or updated passwords, or any new or updated certificates and trustpool bundles. During a restore, the backup files remove and replace the current database. During the restore process, Cisco DNA Center goes into maintenance mode. Wait until Cisco DNA Center exits maintenance mode before proceeding. Step 4 Click the Backups tab to view the results of a successful restore. Cisco DNA Center Administrator Guide, Release 2.2.2 123 Backup and Restore Restore Data from Backups Cisco DNA Center Administrator Guide, Release 2.2.2 124 CHAPTER 7 Implement Disaster Recovery • Overview, on page 125 • Prerequisites, on page 129 • Add the Disaster Recovery Certificate, on page 134 • Configure the Witness Site, on page 135 • Configure Disaster Recovery, on page 137 • Failovers: An Overview, on page 146 • Pause Your Disaster Recovery System, on page 150 • Rejoin Your System, on page 151 • Backup and Restore Considerations, on page 153 • Disaster Recovery Event Notifications, on page 154 • Troubleshoot Your Disaster Recovery System, on page 156 Overview Disaster recovery adds another layer of redundancy to safeguard against network downtime. It responds to a cluster failure by handing off network management duties to a connected cluster (referred to as a site going forward). Cisco DNA Center's disaster recovery implementation consists of three components: the main site, the recovery site, and the witness site. At any given time, the main and recovery sites are operating in either the active or standby role. The active site manages your network while the standby site maintains a continuously updated copy of the active site's data and managed services. Whenever an active site goes down, Cisco DNA Center automatically initiates a failover, completing the tasks necessary to designate the former standby site as the new active site. Refer to the topics in this chapter for a description of how to set up and use disaster recovery in your production environment. Key Terms The following terms are key for understanding Cisco DNA Center's disaster recovery implementation: • Main Site: The first site you configure when setting up your disaster recovery system. By default, it operates as the active site that manages your network. For information on how to configure the sites in your system, see Configure Disaster Recovery, on page 137. • Recovery Site: The second site you configure when setting up your disaster recovery system. By default, it acts as your system's standby site. Cisco DNA Center Administrator Guide, Release 2.2.2 125 Implement Disaster Recovery Key Terms • Witness Site: The third site you configure when setting up your disaster recovery system. This site, which resides on a virtual machine or separate server, is not involved with the replication of data or managed services. Its role is to give the current active site the quorum it needs to carry out disaster recovery tasks. In the event that a site fails, this prevents the split brain scenario from taking place. This scenario can occur in a two-member system when the sites cannot communicate with each other. Each site believes that it should become active, creating two active sites. Cisco DNA Center uses the witness site to arbitrate between the active and standby sites, allowing only one active site at any given time. For a description of witness site requirements, see Prerequisites, on page 129. • Register: To add a site to a disaster recovery system, you must first register it with the system by providing information such as your main site's VIP. When registering your recovery or witness site, you will also need to provide the token that is generated when you register your main site. For more information, see Configure Disaster Recovery, on page 137. • Configure Active: The process of establishing a site as the active site, which involves tasks such as exposing the appropriate managed service ports. • Active site: The site that is currently managing your network. Cisco DNA Center continuously replicates its data to your standby site. • Configure Standby: The process of establishing a site as the standby site, which involves tasks such as configuring the replication of the active site's data and disabling the services which manage the network on the standby site. • Standby Ready: When an isolated site meets the prerequisites to become a standby site, Cisco DNA Center moves it to this state. To establish this site as your system's standby site, click Rejoin in the Action area. • Standby site: The site that maintains an up-to-date copy of your active site's data and managed services. In the event that your active site goes down, your system initiates a failover and your standby site takes over as the active site. Note After a failover, Assurance restarts and processes a fresh set of data on the new active site. Historical Assurance data from the former active site is not migrated over. • Failover: Cisco DNA Center supports two types of failover: • System-triggered: As soon as Cisco DNA Center recognizes that your active site has gone down, it automatically carries out the tasks required to establish your standby site as the new active site. You can monitor these tasks from the Monitor the Event Timeline. • Manual: You can initiate a manual failover to designate the current standby site as the new active site. For more information, see Initiate a Manual Failover, on page 147. • Isolate: During a failover, the former active site is separated from the disaster recovery system. Cisco DNA Center suspends its services and stops advertising its virtual IP address (VIP). From here, Cisco DNA Center completes the tasks necessary to establish the former standby site as the new active site. • Pause: Temporarily suspend your disaster recovery system in order to separate the sites that make up your system and stop data and service replication. For more information, see Pause Your Disaster Recovery System, on page 150. Cisco DNA Center Administrator Guide, Release 2.2.2 126 Implement Disaster Recovery Navigate the Disaster Recovery GUI • Rejoin: From the Disaster Recovery > Monitoring tab, click this button in the Action area in order to add a Standby Ready or Paused site back into a disaster recovery system as the new standby site (after a failover has taken place). You would also click this button in order to restart a disaster recovery system that is currently paused. • Activate DR: User-initiated operation that creates your system's active and standby sites. This operation entails setting up intracluster communication, verifying that the sites meet disaster recovery prerequisites, and replicating data between the two sites. • Deregister: Click this button in the Action area to remove the three sites you have configured for your disaster recovery system. You must do so in order to make changes to any of the site settings you have entered previously. • Retry: In the Action area, click this button in order to reinitiate any action that failed previously. Navigate the Disaster Recovery GUI The following table describes the components that make up Cisco DNA Center's disaster recovery GUI and their function. Callout 1 Description Monitoring tab: Click to do the following: • View a topology of the sites that make up your system. • Determine the current status of your system. • Perform disaster recovery tasks. • View a listing of the tasks that have been completed to date. 2 Show Detail Information link: Click to open the Disaster Recovery System slide-in pane. See View Disaster Recovery System Status, on page 128 for more information. Cisco DNA Center Administrator Guide, Release 2.2.2 127 Implement Disaster Recovery View Disaster Recovery System Status Callout 3 Description Topology: Displays either a logical or physical topology of your system that indicates the current status of your sites and their members. • In both the logical and physical topologies, a blue box indicates the site that's currently acting as your system's active site. • In the logical topology, a blue line indicates that the IPSec tunnel connecting two sites is operational, and a red line indicates that the tunnel is currently down. • To view a description of the possible site states, see System and Site States, on page 143. 4 Event Timeline: Lists every disaster recovery task that is currently in progress or has been completed for your system. For more information, see Monitor the Event Timeline, on page 141. 5 Configure tab: Click to enter the settings necessary to establish a connection between your disaster recovery system's sites. See Configure Disaster Recovery, on page 137 for more information. 6 Logical and Physical tabs: Click the appropriate tab to toggle between a logical and physical topology of your system. 7 Status area: Indicates the current status of your system. To view a description of the possible system states, see System and Site States, on page 143. 8 Legend: Indicates what the topology icons represent. To view the legend, click right corner of the Disaster Recovery page. 9 Action area: Displays the disaster recovery tasks that are currently available for you to initiate. The tasks you can choose from vary, depending on whether you have configured your sites and your system's status. in the bottom View Disaster Recovery System Status The topology provides a graphical representation of your disaster recovery system's current status. If you want to view this information in a tabular format, you can do so in the Disaster Recovery System slide-in pane. To open this pane, do one of the following: • Click the Show Detail Information link. Then expand the site whose status you want to view in the slide-in pane. • In the topology, place your cursor over a site's Enterprise virtual IP address or a particular node's icon. In the popup window that opens, click the link in the bottom right-hand corner of the window. Cisco DNA Center Administrator Guide, Release 2.2.2 128 Implement Disaster Recovery Prerequisites The slide-in pane opens with the relevant site's information displayed. Prerequisites Before you enable disaster recovery in your production environment, ensure that the following prerequisites have been met. Cisco DNA Center Administrator Guide, Release 2.2.2 129 Implement Disaster Recovery Prerequisites Important If you plan to upgrade to the latest Cisco DNA Center 2.2.2.x release, you must complete several steps to ensure that disaster recovery works properly after the upgrade. See Configure Disaster Recovery After an Upgrade, on page 133 for more information. General Prerequisites • Cisco DNA Center supports two disaster recovery setups: • 1+1+1 setup: One Cisco DNA Center appliance functions as your Main Site, a second appliance serves as your Recovery Site, and a third system (residing on a virtual machine) acts as your Witness Site. The following appliances and versions support this setup: • DN1-HW-APL/DN2-HW-APL (44-Core appliance): Cisco DNA Center 2.2.2.x and later • DN2-HW-APL-L (56-Core appliance): Cisco DNA Center 2.2.1.x and later • DN2-HW-APL-XL (112-Core appliance): Cisco DNA Center 2.2.1.x and later • 3+3+1 setup: One three-node Cisco DNA Center cluster functions as your Main Site, a second three-node cluster serves as your Recovery Site, and a third system (residing on a virtual machine) acts as your Witness Site. The following appliances and versions support this setup: • DN1-HW-APL/DN2-HW-APL (44-Core appliance): Cisco DNA Center 2.2.2.x and later • DN2-HW-APL-L (56-Core appliance): Cisco DNA Center 2.1.2.x and later • DN2-HW-APL-XL (112-Core appliance): Cisco DNA Center 2.1.2.x and later • You have configured a VIP for the Enterprise port interface on your Cisco DNA Center appliances. This is required because disaster recovery uses the Enterprise network for intrasite communication. In the Cisco DNA Center Second-Generation Appliance Installation Guide, refer to the following: • For more information about the Enterprise port, see the "Interface Cable Connections" topic. • For more information about Enterprise port configuration, see either the "Configure the Primary Node Using the Maglev Wizard" or "Configure the Primary Node Using the Expert Configuration Wizard" topic. • You have assigned a super-admin user to carry out disaster recovery tasks. Only users with this privilege level can access this functionality. • You have confirmed that the links connecting the following sites are one GB links with 350 ms RTT latency (at most). • Main and recovery sites • Main and witness sites • Recovery and witness sites • You have generated one third-party certificate and installed this certificate on both the main and recovery sites. Otherwise, site registration will fail. Cisco DNA Center Administrator Guide, Release 2.2.2 130 Implement Disaster Recovery Prerequisites Note Cisco DNA Center copies this certificate to the witness site automatically during the registration process. Ensure that all of the IP addresses and fully qualified domain names (FQDN) that the main and recovery sites use are included in this certificate. Also ensure that nonRepudiation and digitalSignature are specified for the certificate's keyUsage parameter. For a description of how to generate a third-party certificate, see Generate a Certificate Request Using Open SSL in the Cisco DNA Center Security Best Practices Guide. • You have opened all of the ports listed in the Cisco DNA Center Security Best Practices Guide's "Disaster Recovery Ports" topic. Main and Recovery Site Prerequisites • Both your main and recovery site must consist of the same number of nodes. Cisco DNA Center will not allow you to register and activate a disaster recovery system that does not meet this requirement. • Both your main and recovery site must consist of Cisco DNA Center appliances that have the same number of cores. This means that one site cannot consist of 56-core second-generation appliances while the other site consists of 112-core appliances. The following table lists the appliances that support disaster recovery and their corresponding Cisco part number: Supported Cisco DNA Center Appliances Cisco Part Numbers First and second generation 44-core appliance • DN1-HW-APL • DN1-HW-APL-U • DN2-HW-APL • DN2-HW-APL-U Second generation 56-core appliance • DN2-HW-APL-L • DN2-HW-APL-L-U Second generation 112-core appliance • DN2-HW-APL-XL • DN2-HW-APL-XL-U Also ensure that your main and recovery site are running the same Cisco DNA Center version. • You have configured and enabled high availability (HA) on both your main and recovery site. Otherwise, the registration of these sites will fail. For more information, see the latest Cisco DNA Center High Availability guide. Important This is applicable to three-node setups only. Cisco DNA Center Administrator Guide, Release 2.2.2 131 Implement Disaster Recovery Prerequisites • If you want to use Border Gateway Protocol (BGP) to advertise your system's virtual IP address routes, you need to configure your system's Enterprise virtual IP address on each of the main and recovery site's neighbor routers. The configuration you need to enter will look similar to one the following examples: Interior BGP (iBGP) Configuration Example router bgp 64555 bgp router-id 10.30.197.57 neighbor 172.25.119.175 remote-as 64555 neighbor 172.25.119.175 update-source 10.30.197.57 neighbor 172.25.119.175 next-hop-self where: • 64555 is the neighbor router's local and remote AS number. • 10.30.197.57 is the neighbor router's IP address. • 172.25.119.175 is your system's Enterprise virtual IP address. Exterior BGP (eBGP) Configuration Example router bgp 62121 bgp router-id 10.30.197.57 neighbor 172.25.119.175 remote-as 64555 neighbor 172.25.119.175 update-source 10.30.197.57 neighbor 172.25.119.175 next-hop-self neighbor 172.25.119.175 ebgp-multihop 255 where: • 62121 is the neighbor router's local AS number. • 64555 is the neighbor router's remote AS number. • 10.30.197.57 is the neighbor router's IP address. • 172.25.119.175 is your system's Enterprise virtual IP address. • If you enable BGP route advertisement (as described in the previous bullet), we recommend that you filter routes towards Cisco DNA Center in order to improve its performance. To do so, enter the following configuration: neighbor system's-Enterprise-virtual-IP-address route-map DENY_ALL out ! ip prefix-list DENY_ALL seq 5 deny 0.0.0.0/0 le 32 ! route-map DENY_ALL permit 10 match ip address prefix-list DENY_ALL Witness Site Prerequisites • You have confirmed that the virtual machine that hosts your witness site is running (at a minimum) VMware ESXi hypervisor version 6.0 or later with a 2.1-GHz core and two virtual CPUs, 4 GB of RAM, and 10 GB of hard drive space. • Witness site deployment in a public cloud is not supported. • You have set up your witness site in a different location than your main and recovery sites and confirmed that it is reachable from both of these sites. Cisco DNA Center Administrator Guide, Release 2.2.2 132 Implement Disaster Recovery Configure Disaster Recovery After an Upgrade • You have configured an NTP server that is accessible by the witness site. You must synchronize this NTP server with the NTP servers that are used by the main and recovery sites. Configure Disaster Recovery After an Upgrade To successfully configure disaster recovery after upgrading your system to the latest Cisco DNA Center 2.2.2.x version, complete the steps that are applicable to your situation: Scenario 1 In this scenario, the first Cisco DNA Center version installed on your appliances was a version previous to 2.1.x. Now you want to upgrade to the latest 2.2.2.x version from 2.1.x. Complete the following steps to ensure that disaster recovery functions properly after the upgrade: Step 1 On your appliances, upgrade from your current Cisco DNA Center version to the latest 2.2.2.x version (see the Cisco DNA Center Upgrade Guide). Step 2 Back up your data (see Back Up Data Now, on page 120). Ensure that your backup file resides on a remote server, as the next step will completely erase the data on your appliances and virtual machine. Step 3 Install the latest Cisco DNA Center 2.2.2.x ISO image onto your appliances (see the "Reimage the Appliance" topic in the Cisco DNA Center Second-Generation Appliance Installation Guide. Step 4 Restore the data from your backup file (see Restore Data from Backups, on page 122). Step 5 Proceed with the configuration of your disaster recovery system. Scenario 2 In this scenario, the first Cisco DNA Center version installed on your appliances was an earlier 2.1.x version and now you want to upgrade to the latest 2.2.2.x version. Complete the following steps: Step 1 Configure the Witness Site, on page 135. Step 2 Configure Disaster Recovery, on page 137. Upgrade a Disaster Recovery System In this scenario, the first Cisco DNA Center version installed on your appliances was an earlier 2.1.x version and now you want to upgrade to the latest 2.2.2.x version. Also, disaster recovery is enabled and operational on these appliances. Complete the following steps to complete the upgrade: Step 1 Place Your System on Pause, on page 150. Step 2 Upgrade the appliances at your main and recovery sites to the latest 2.2.2.x version. In the Cisco DNA Center Upgrade Guide, see the "Upgrade to Cisco DNA Center 2.2.2.x" chapter. Cisco DNA Center Administrator Guide, Release 2.2.2 133 Implement Disaster Recovery Add the Disaster Recovery Certificate Step 3 Replace the Current Witness Site, on page 140. Step 4 Rejoin Your System, on page 151. Add the Disaster Recovery Certificate Cisco DNA Center supports the import and storage of an X.509 certificate and private key into Cisco DNA Center. The disaster recovery certificate is used for intracluster communications. You must obtain a valid X.509 certificate that is issued by your internal CA and the certificate must correspond to a private key in your possession. Note If you want your disaster recovery system to use the same certificate that Cisco DNA Center uses, you can skip this procedure. When you configure the certificate, make sure that you check the Use system certificate for Disaster Recovery as well check box (see Update the Cisco DNA Center Server Certificate, on page 60). Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Certificates > Disaster Recovery. Step 2 In the Add Certificate area, choose the file format type for the certificate that you are importing into Cisco DNA Center: ) and choose System > Settings > Trust & Privacy > • PEM: Privacy-enhanced mail file format • PKCS: Public-Key Cryptography Standard file format Step 3 If you chose PEM, perform the following tasks: • For the Certificate field, import the PEM file by dragging and dropping the file into the Drag and Drop area. Note A PEM file must have a valid PEM format extension (.pem). The maximum file size for the certificate is 10 MB. After the upload succeeds, the system certificate is validated. • For the Private Key field, import the private key by dragging and dropping the file into the Drag and Drop area. Note Private keys must have a valid private key format extension (.key). The maximum file size for the private key is 10 MB. After the upload succeeds, the private key is validated. • Choose the encryption option from the Encrypted area for the private key. • If you chose encryption, enter the password for the private key in the Password field. Step 4 If you chose PKCS, perform the following tasks: • For the Certificate field, import the PKCS file by dragging and dropping the file into the Drag and Drop area. Cisco DNA Center Administrator Guide, Release 2.2.2 134 Implement Disaster Recovery Configure the Witness Site A PKCS file must have a valid PKCS format extension (.pfx or .p12). The maximum file size for the certificate is 10 MB. Note After the upload succeeds, the system certificate is validated. • For the Certificate field, enter the passphrase for the certificate in the Password field. For PKCS, the imported certificate also requires a passphrase. Note • For the Private Key field, choose the encryption option for the private key. • For the Private Key field, if encryption is chosen, enter the password for the private key in the Password field. Step 5 Click Save. After the Cisco DNA Center server’s SSL certificate is replaced, you are automatically logged out and you must log in again. Configure the Witness Site Complete the following procedure to configure the virtual machine that will serve as the witness site for your disaster recovery system. Step 1 Download the OVF package that's specific to the Cisco DNA Center version that the witness site is running: a) Open https://software.cisco.com/download/home/286316341/type. Note You need a Cisco.com account to access this URL. See the following page for a description of how to create an account: https://www.cisco.com/c/en/us/about/help/registration-benefits-help.html b) In the Select a Software Type area, click the Cisco DNA Center software link. The Software Download page updates, listing the software that's available for the latest Cisco DNA Center release. c) Do one of the following: • If the OVF package (*.ova) you need is already listed, click its Download icon. • Enter the relevant version number in the Search field, click its link in the navigation pane, and then click the Download icon for that version's OVF package. Step 2 Copy this package to a local machine running VMware vSphere 6.0 or 6.5. Step 3 Step 4 From the vSphere client, choose File > Deploy OVF Template. Complete the Deploy OVF Template wizard: a) Do the following in the wizard's Source screen: 1. Click Browse. 2. Navigate to the witness site's OVF package (.ova). 3. Click Open. Cisco DNA Center Administrator Guide, Release 2.2.2 135 Implement Disaster Recovery Configure the Witness Site 4. In the Deploy from a file or URL field, verify that the package's path is displayed and then click Next >. The wizard's OVF Template Details screen opens. b) Click Next >. c) Do the following in the wizard's Name and Location screen: • In the Name field, enter the name you want to set for the package. • In the Inventory Location field, select the folder that you want the package to reside in. • Click Next >. The wizard's Host/Cluster screen opens. d) Click the host or cluster on which you want to run the deployed template and then click Next >. The wizard's Storage screen opens. e) Click the storage drive that the virtual machine files will reside on and then click Next >. The wizard's Disk Format screen opens. f) Click the Thick Provision radio button and then click Next >. g) Do the following in the wizard's Network Mapping screen and then click Next >: 1. Click the IP address that is listed in the Destination Networks column. 2. In the resulting drop-down list, choose the network that the deployed template should use. The wizard's Ready to Complete screen opens, displaying all of the settings that you have entered. h) Check the Power on after deployment check box and then click Finish. i) When the Deployment Completed Successfully dialog box appears, click Close. Step 5 Enter the network settings for your witness site: a) Open a console to the virtual machine you just created by doing one of the following: • Right-click the virtual machine from the vSphere Client list and choose Open Console. • Click the Open Console icon in the vSphere Client menu. The Witness User Configuration window appears. b) Enter and confirm the desired password for the admin user (maglev), then press N to proceed. c) Enter the following settings, then press N to proceed: • Its IP address • The netmask associated with the virtual machine's IP address • The IP address of your default gateway • (Optional) The IP address of the preferred DNS server d) Enter one or more NTP server addresses or hostnames (separated by spaces), then press S to submit your settings and begin the configuration of the witness site. At least one NTP address or hostname is required. Cisco DNA Center Administrator Guide, Release 2.2.2 136 Implement Disaster Recovery Configure Disaster Recovery e) Verify that configuration has completed by using SSH port 2222 to log in to the IP address you configured for the witness site. Configure Disaster Recovery To configure your disaster recovery system for use, complete the tasks described in the following procedure. Note When configuring your system, you have a couple of options: • You can specify a virtual IP address that uses Border Gateway Protocol (BGP) route advertising. • You can choose to not configure a virtual IP address. If you choose this option, you must enable device controllability so that a site's virtual IP address can be reconfigured after a failover occurs. For more information, see Device Controllability, on page 42. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Recovery page. ) and choose System > Disaster Recovery to open the Disaster The Monitoring tab is selected, by default. Step 2 Register your main site: Note At any point before Step 2d, you can click Reset to clear all of the settings that you have entered. You will then need to repeat Step 2 and enter the correct settings before you register the main site. a) Click the Configure tab. The Main Site radio button should already be selected. b) Enter the following information in the Setting up this cluster area: • Main Site VIP: The virtual IP address that manages traffic between the active site's cluster nodes and your Enterprise network. Choose the Enterprise virtual IP address for the main site from the drop-down list. • Recovery Site VIP: The Enterprise virtual IP address that manages traffic between the recovery site's cluster nodes and your Enterprise network. • Witness Site IP: The IP address that manages traffic between the witness site's virtual machine and your Enterprise network. Important Ensure that the addresses you enter are currently reachable. Otherwise, the registration of your system's sites will fail. c) Enter the following information in the Additional Protocols area: • Routing Protocol: Specify whether you want to use BGP to advertise your system's virtual IP address routes. Cisco DNA Center Administrator Guide, Release 2.2.2 137 Implement Disaster Recovery Configure Disaster Recovery • Border Gateway Protocol Type: If you clicked the Border Gateway Protocol (BGP) radio button, specify whether your BGP peers will establish exterior (Exterior BGP (eBGP)) or interior (Interior BGP (iBGP)) sessions with one another. • Enterprise VIP for Disaster Recovery: When configured, this floating virtual IP address automatically moves to and operates on the site that is currently acting as your network's active site. This address manages traffic between your disaster recovery system and your Enterprise network. Note You must enter a value for this field if you selected the Border Gateway Protocol (BGP) option. • Main Site Router Settings: If you selected the Border Gateway Protocol (BGP) option, enter the IP address of your main site's remote router, as well as its local and remote autonomous system (AS) numbers. Click the Add (+) icon if you want to configure additional remote routers. Note When the iBGP option is selected, Cisco DNA Center will automatically set the local AS number to the value you enter as the remote AS number. • Recovery Site Router Settings: If you selected the Border Gateway Protocol (BGP) option, enter the IP address of your recovery site's remote router, as well as its local and remote AS numbers. Click the Add (+) icon if you want to configure additional remote routers. Note When the iBGP option is selected, Cisco DNA Center will automatically set the local AS number to the value you enter as the remote AS number. • (Optional) Management VIP for Disaster Recovery: When configured, this floating virtual IP address automatically moves to and operates on the site that is currently acting as your network's active site. This address manages traffic between your disaster recovery system and your Management network. Note If you configure a Management virtual IP address and selected the Border Gateway Protocol (BGP) option, you must enter the appropriate remote router information (like you did for the Enterprise virtual IP address). d) From the Action area, click Register. The Disaster Recovery Registration dialog opens. e) Click Continue. The token that your recovery and witness sites need to use in order to register with your main site is generated. Step 3 In the Supplement area, click Copy Token. Step 4 Register your recovery site: At any point before Step 4d, you can click Reset to clear all of the settings that you have entered. You will then need to repeat Step 4 and enter the correct settings before you register the recovery site. Note a) From the Supplement area, right-click the Recovery Site link and open the resulting page in a new browser tab. b) If necessary, enter the appropriate username and password to log in to your recovery site. The Disaster Recovery page's Configure tab opens, with the Recovery Site radio button already selected. Note If the Enterprise VIP you configured in Step 2c is not reachable from a browser, update the URL that is provided by replacing the Enterprise VIP with your recovery site's Management VIP and open the resulting URL. Cisco DNA Center Administrator Guide, Release 2.2.2 138 Implement Disaster Recovery Configure Disaster Recovery c) Enter the following information: • Main Site VIP: The virtual IP address that manages traffic between the active site's cluster nodes and your Enterprise network. • Recovery Site VIP: The virtual IP address that manages traffic between the recovery site's cluster nodes and your Enterprise network. Choose the recovery site's Enterprise virtual IP address from the drop-down list. • The registration token you generated in Step 2. • The username and password configured for the your active site's super-admin user. d) From the Action area, click Register. The Disaster Recovery Registration dialog opens. e) Click Continue. The topology updates the status for the main and recovery sites after they have been connected. Step 5 Register your witness site: a) Return to the main site's browser tab. b) From the Supplement area, click Copy Witness Login Cmmd. c) Open an SSH console to the witness site, paste the command you just copied, and then run it to log in. d) When prompted, enter the default (maglev) user's password. e) Return to the Supplement area and click Copy Witness Register Cmmd. f) In the SSH console, paste the command you just copied. g) Replace <main_admin_user> with the super-admin user's username and then run the command. h) When prompted, enter the super-admin user's password. Step 6 Verify that your main, recovery, and witness sites have been registered successfully: a) Return to the main site's browser tab and click Monitoring to view the Disaster Recovery Monitoring tab. b) In the Logical Topology area, confirm that the three sites are displayed and their status is Registered. c) In the Event Timeline area, confirm that the registration of each site is listed as an event and that each task completed successfully. Step 7 In the Action area, click Activate. A dialog appears, indicating that all of the data that currently resides in your recovery site will be erased. Cisco DNA Center Administrator Guide, Release 2.2.2 139 Implement Disaster Recovery Replace the Current Witness Site Step 8 To begin the configuration of your disaster recovery system and the replication of your main site's data to the recovery site, click Continue. Note Step 9 The activation process may take some time to complete. View the Event Timeline in order to monitor its progress. After Cisco DNA Center has completed the necessary tasks, verify that your system is operational: a. View its topology and confirm that the following status is displayed for your respective sites: • Main site: Active • Recovery site: Standby • Witness site: Up b. View the Event Timeline and confirm that the Activate DR task completed successfully. c. Verify that your sites are reachable by pinging them from the main site. Replace the Current Witness Site Complete the following procedure if you need to upgrade or replace your current witness site. Step 1 Log in to the current witness site: a) Open an SSH console to the witness site and run the ssh -p 2222 maglev@witness-site's-IP-address command. b) Enter the default (maglev) user's password. Step 2 Run the witness reset command. Step 3 Delete the current witness site's virtual machine. Step 4 Install the new witness site's virtual machine, as described in Configure the Witness Site, on page 135. Step 5 Log in to the new witness site: Cisco DNA Center Administrator Guide, Release 2.2.2 140 Implement Disaster Recovery Deregister Your System a) Open an SSH console to the witness site and run the ssh -p 2222 maglev@witness-site's-IP-address command. b) Enter the default (maglev) user's password. Step 6 Run the witness reconnect -w witness-site's-IP-address -m system's-virtual-IP-address -u admin-username command. To view all of the available options for this command, run the witness reconnect --help command. Deregister Your System After your disaster recovery system has been activated, you may need to update the settings that you entered for a particular site. If you find yourself in this situation, complete the following procedure. Before you proceed, note that the settings that are currently set for all of the sites in your system will be cleared. Step 1 From the Action area, click Pause DR to suspend the operation of your system. See Place Your System on Pause, on page 150 for more information. Step 2 From the Action area, click Deregister. Cisco DNA Center deletes all of the settings that you configured previously for your system's sites. Step 3 Complete the tasks described in Configure Disaster Recovery, on page 137 in order to enter the appropriate settings for your sites, reregister them, and reactivate your system. Monitor the Event Timeline From the Event Timeline, you can track the progress of disaster recovery tasks that are currently running and confirm when these tasks have completed. To view the timeline, do the following: 1. In the Cisco DNA Center GUI, click the Menu icon ( open the Disaster Recovery page. ) and choose System > Disaster Recovery to The Monitoring tab is selected, by default. 2. Scroll to the bottom of the page. Every task that is in progress or has completed for your system is listed here (in descending order based on their completion timestamp), starting with the most recent task. Cisco DNA Center indicates whether each task was initiated by the system ( ) or a user ( ). Cisco DNA Center Administrator Guide, Release 2.2.2 141 Implement Disaster Recovery Monitor the Event Timeline Say you want to monitor the restoration of your system after it was paused. Cisco DNA Center updates the Event Timeline as each task in the restoration process is started and then completed. To view a summary of what took place during a particular task, click >. If the View Details link is displayed for a task, click it to view a listing of the relevant subtasks that were completed. As with tasks, you can click > to view summary information for a particular subtask. Cisco DNA Center Administrator Guide, Release 2.2.2 142 Implement Disaster Recovery System and Site States See Troubleshoot Your Disaster Recovery System, on page 156 for a description of the issues you may encounter while monitoring the Event Timeline and how to remedy them. System and Site States The following tables explain the various states you may see for your system in the Status area or your sites in the Topology. Table 10: Disaster Recovery System States State Description Unconfigured Newly installed system. Disaster recovery has not been configured yet. Registered The active, standby, and witness sites have been registered and all registration validation checks have completed successfully. The three sites can communicate with one another. Configuring This state can indicate any of the following situations: • Activate DR was clicked in the Action area, which initiates a number of workflows in both the active and standby sites. If any of these workflows fail, this site reverts back to the Registered state. • The tasks that run prior to the configuration of your system's active and standby sites have completed successfully. Cisco DNA Center Administrator Guide, Release 2.2.2 143 Implement Disaster Recovery System and Site States State Description Up This state can indicate any of the following situations: • Disaster recovery has been configured and system-triggered failover is available. • Disaster recovery has been configured. However, system-triggered failover is not available because either the witness site has not been configured or the witness site is down. • The standby system is unavailable and data replication is not taking place. • Either a system-triggered or manual failover completed successfully. Up (with no Failover) The system enters this state when either: • The active and standby sites lose connectivity with the witness site. • The active and witness sites lose connectivity with the standby site. Down The disaster recovery system detected that the active site is down and initiated a failover, but the failover failed. When your system is in this state, resolve the issue and then initiate a manual failover. Failover in progress After detecting that the active site is down, the disaster recovery system triggered a failover. Deregistering Deregistration is in progress. After this process completes, all registration information and related network settings are reset. Deregistered The main, recovery, and witness sites have been deregistered from your disaster recovery system. Pausing Disaster Recovery System The disaster recovery system is temporarily being paused for maintenance or other activities. Disaster Recovery System Paused The disaster recovery system has been paused. The main and recovery sites are currently operating as two standalone clusters that are not replicating data between each other. To restart the system and resume data replication, click Rejoin. Pausing Disaster Recovery Failed Errors occurred while pausing your disaster recovery system. User intervention required Both the main and recovery sites went offline and then restarted. However, the disaster recovery system remains in a disconnected state. Pause and then restart your system to see if that resolves the issue. Table 11: Active Site States State Description Unconfigured Newly installed site. Disaster recovery information is not available yet. Registered This site was designated as the active site. Also, the validation checks and registration have completed successfully. Configuring Active The workflows that run before a site is configured as the active site are in progress. Cisco DNA Center Administrator Guide, Release 2.2.2 144 Implement Disaster Recovery System and Site States State Description Active The workflows that run before a site is configured as either the active or standby site have completed successfully. Failed to Configure Unable to complete the workflows that run before a site is configured as the active site. Active This site was successfully configured as the active site. Isolating Indicates that the isolation of this site from the disaster recovery system is in progress. This is triggered after you initiate a manual failover and the site that was previously acting as the active site comes back online. Isolated This site was successfully isolated from the disaster recovery system. Isolate Failed Unable to isolate this site from the disaster recovery system. Down Either the automated health monitor recognizes that the witness system is down or the system has not provided a health update within the configured threshold time. Pausing Active The active site is temporarily being paused for maintenance or other activities. Active Paused The active site has been paused. The active and standby sites are currently operating as two standalone clusters that are not replicating data between each other. To restart the system and resume data replication, click Rejoin. Pausing Active Failed Errors occurred while pausing your active site. Table 12: Standby Site States State Description Unconfigured Newly installed site. Disaster recovery information is not available yet. Registered This site was designated as the standby site and the validation checks have completed successfully. Configuring Standby The workflows that run before a site is configured as the standby site are in progress. Standby The workflows that run before a site is configured as the standby site have completed successfully. Failed to Configure Unable to complete the workflows that run before a site is configured as the standby site. Passive This site was successfully configured as the standby site. Activating passive Indicates that a system-triggered or manual failover is in progress, which will convert your standby site into the new active site. Failover success A system-triggered or manual failover completed successfully and the disaster recovery system is ready to operate. Failover failed A system-triggered or manual failover did not complete successfully. Standby ready The site previously acting as the active site is ready to be configured as the new standby site. Cisco DNA Center Administrator Guide, Release 2.2.2 145 Implement Disaster Recovery Failovers: An Overview State Description Down Either the automated health monitor recognizes that the witness system is down or the system has not provided a health update within the configured threshold time. Pausing Standby The standby site is temporarily being paused for maintenance or other activities. Standby Paused The standby site has been paused. The active and standby sites are currently operating as two standalone clusters that are not replicating data between each other. To restart the system and resume data replication, click Rejoin. Pausing Standby Failed Errors occurred while pausing your standby site. Table 13: Witness Site States State Description Unconfigured Newly installed site. Disaster recovery information is not available yet. Registered This site has been designated as the witness site and the validation checks have completed successfully. Up Configuration of the witness site has completed successfully. Down Either the automated health monitor recognizes that the witness site is down or the witness site has not provided a health update within the configured threshold time. Up and Replicating The disaster recovery system is up and running. Replication is in progress. Up (Manual failover) The disaster recovery system is running without the quorum that the witness site provides. System-triggered failover is not currently available. Failover in progress Failover is in progress. After resolving any issues on the new standby site (if any), click Rejoin after failover completes. Failover in progress (User initiated) A manually-initiated failover is in progress. The witness site is not currently reachable. Up (No failover) The configuration and activation of the disaster recovery system have been completed. However, the witness site is not reachable, so failover is not currently available. Down (User intervention required) Failover did not complete successfully. The witness system is not reachable. Pause and then restart your system to see if that resolves the issue. Failovers: An Overview A failover takes place when your disaster recovery system's standby site takes over the responsibilities of the former active site and becomes the new active site. Cisco DNA Center supports two types of failover: • System-triggered: Occurs when your system's active site experiences an issue that brings it offline (such as a hardware failure or network outage). When Cisco DNA Center recognizes that the active site has not been able to communicate with the rest of the Enterprise network (as well as the standby and witness Cisco DNA Center Administrator Guide, Release 2.2.2 146 Implement Disaster Recovery Initiate a Manual Failover sites) for seven minutes, it completes the tasks necessary for your standby site to assume its role so that network operations can continue without interruption. • Manual: Occurs when a super-admin user instructs Cisco DNA Center to swap the roles that are currently held by your system's active and standby sites. You would typically do this before you update the Cisco DNA Center software that is installed on a site's appliances or perform routine site maintenance. After either type of failover has taken place and the former active site has come back online, your disaster recovery system automatically moves the site to the Standby Ready state. To establish this site as the new standby site, click Rejoin in the Action area of the Monitoring tab. Initiate a Manual Failover When you manually initiate a failover, you instruct Cisco DNA Center to swap the roles that are currently assigned to your disaster recovery system's main and recovery site. This is handy if you know that the current active site is experiencing issues and you want to proactively designate the standby site as the new active site. Complete the following procedure to initiate a manual failover. Note Step 1 You cannot initiate a manual failover from your witness site. You can only do so from the current active site. In the Cisco DNA Center GUI, click the Menu icon ( Recovery page. ) and choose System > Disaster Recovery to open the Disaster The Monitoring tab is selected, by default, and displays your disaster recovery system's topology. In the following example, the user is logged in to the current active site. Step 2 In the Action area, click Manual Failover. The Disaster Recovery Manual Failover dialog opens, indicating that the standby site will assume the Active role. Cisco DNA Center Administrator Guide, Release 2.2.2 147 Implement Disaster Recovery Initiate a Manual Failover Step 3 Click Continue to proceed. A message appears in the bottom right corner of the page, indicating that the failover process has started. The site previously acting as the active site is isolated from the system and enters the Standby Ready state. At this point, the main and recovery sites are not connected and data replication is not taking place. If the former active site is experiencing issues, now is a good time to resolve those issues. A subsequent failover (initiated by either the system or a user) cannot take place until you add the former active site back to your disaster recovery system. Step 4 Reconnect the main and recovery sites and reconfigure your disaster recovery system: a. Log in to your recovery site. b. In the Action area, click Rejoin. A dialog opens, indicating that data on the standby site will be erased. Step 5 Click Continue to proceed and restart data replication. After Cisco DNA Center completes the relevant workflows, the manual failover completes. The main site, which was currently serving as the active site, is now the standby site. Cisco DNA Center Administrator Guide, Release 2.2.2 148 Implement Disaster Recovery Initiate a Manual Failover Step 6 Confirm that your disaster recovery system is operational again: a. In the top right corner of the Monitoring tab, verify that its status is listed as Up and Running. b. In the Event Timeline, verify that the Rejoin task completed successfully. Cisco DNA Center Administrator Guide, Release 2.2.2 149 Implement Disaster Recovery Pause Your Disaster Recovery System Pause Your Disaster Recovery System By pausing your main and recovery sites, you are effectively breaking up your disaster recovery system. The sites will no longer be connected and instead will act as standalone clusters. You would want to pause your system to temporarily disable the replication of data from the active site to the standby site if you plan to break up your system for an extended period of time. You would also pause your system if you need to perform any administrative tasks, such as installing additional packages. By pausing your disaster recovery system, you can protect Cisco DNA Center from known network disruptions or disable disaster recovery without deleting your system's settings. Place Your System on Pause To temporarily pause your disaster recovery system, which you would typically do before performing maintenance on a system component, complete the following procedure: Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Recovery page. ) and choose System > Disaster Recovery to open the Disaster The Monitoring tab is selected, by default, and displays your disaster recovery system's topology. Step 2 In the Action area, click Pause DR. Step 3 In the resulting dialog, click Continue to proceed. A message appears in the bottom right corner of the page, indicating that the process to pause your system has started. To pause your system, Cisco DNA Center disables data and service replication. It also reinstates the services that were suspended on your recovery site. As this is taking place, the status for your main and recovery sites is set to Pausing in the topology. After Cisco DNA Center completes the necessary tasks, the topology updates and sets the status for your main, recovery, and witness sites as Paused. Cisco DNA Center Administrator Guide, Release 2.2.2 150 Implement Disaster Recovery Rejoin Your System Step 4 Confirm that your disaster recovery system has been paused: a. In the top right corner of the Monitoring tab, verify that its status is listed as Disaster Recovery System Paused. b. In the Event Timeline, verify that the Pause DR task completed successfully. Rejoin Your System Complete the following procedure in order to restart a disaster recovery system that is currently on pause. Cisco DNA Center Administrator Guide, Release 2.2.2 151 Implement Disaster Recovery Rejoin Your System Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Recovery page. ) and choose System > Disaster Recovery to open the Disaster The Monitoring tab is selected, by default, and displays your disaster recovery system's topology. Step 2 In the Action area, click Rejoin. A dialog opens, indicating that all of the data on your standby site will be erased. Step 3 Click Continue to proceed. A message appears in the bottom right corner of the page, indicating that the process to reconnect your main, recovery, and witness sites has started. As this is taking place, the status for your main and recovery sites is set to Configuring in the topology. Cisco DNA Center Administrator Guide, Release 2.2.2 152 Implement Disaster Recovery Backup and Restore Considerations After Cisco DNA Center completes the necessary tasks, the topology updates the status for your main, recovery, and witness sites. Step 4 Confirm that your disaster recovery system is operational again by verifying that its status is listed as Up and Running in the top right corner of the Monitoring tab. Backup and Restore Considerations Keep the following points in mind when backing up and restoring your disaster recovery system: Cisco DNA Center Administrator Guide, Release 2.2.2 153 Implement Disaster Recovery Disaster Recovery Event Notifications • A backup can only be scheduled from your system's active site. • You cannot restore a backup file when disaster recovery is enabled. You must first pause your system temporarily. See Place Your System on Pause, on page 150 for more information. • You should only restore a backup file on the site that was the active site prior to pausing your system. After you restore the backup file, you then need to rejoin your system's sites. Doing so will reinstate disaster recovery and initiate the replication of the active site's data to the standby site. See Rejoin Your System, on page 151 for more information. • You can only restore a backup file on cluster nodes that have the same Cisco DNA Center version installed as the other nodes in your system. For more information on backing up and restoring your disaster recovery system, see Backup and Restore, on page 111. Disaster Recovery Event Notifications You can configure Cisco DNA Center to send a notification whenever a disaster recovery event takes place. See the "Work with Events" topic in the Cisco DNA Center Platform User Guide for a description of how to configure and subscribe to these notifications. When completing this procedure, ensure that you select and subscribe to the SYSTEM-DISASTER-RECOVERY event in the Platform > Developer Toolkit > Events table. After you subscribe, Cisco DNA Center sends a notification indicating that the IPsec session is down because the system's certificate has expired. Do the following to update this certificate: 1. Place Your System on Pause, on page 150. 2. On both your main and recovery site, replace the current system certificate. In the Cisco DNA Center GUI, click the Menu icon ( ) and choose System > Settings > Trust & Privacy > Certificates > System. 3. Rejoin Your System, on page 151. Supported Events The following table lists the disaster recovery events that Cisco DNA Center generates notifications for when they take place. System Health Status Event Notification OK The disaster recovery system is operational. Activate DR (Disaster Recovery Setup Sucessful) OK Failover to either the main or recovery site has completed successfully. Failover Successful OK Registration of the main site has completed successfully. Successfully Registered Main Site Cisco DNA Center Administrator Guide, Release 2.2.2 154 Implement Disaster Recovery Supported Events System Health Status Event Notification OK Registration of the recovery site has completed successfully. Successfully Registered Recovery Site OK Registration of the witness site has completed successfully. Successfully Registered Witness Site OK The disaster recovery system has been paused successfully. DR Pause Success OK The standby site is operational. Standby Site Up OK The witness site is operational. Witness Site Up OK The disaster recovery system has been unregistered successfully. Unregister Success Degraded Failover to either the main or recovery site has failed. Failover Failed Degraded Automated failover is not available because the standby site is currently down. Standby Cluster Down Degraded Automated failover is not available because the witness site is currently down. Witness Cluster Down Degraded Unable to place the disaster recovery system on pause. Pause Failure Degraded BGP route advertisement failed. BGP Failure Degraded The IPsec tunnel connecting your system's sites is operational. IPsec Up Degraded The IPsec tunnel connecting your system's sites is currently down. IPsec Down NotOk Disaster recovery system configuration failed. Activate DR Failure NotOk The site that is currently in the Standby Ready state is unable to rejoin the disaster recovery system. Activate DR Failure NotOk Unregistration of the disaster recovery system failed. Unregistration Failed NotOk Registration of the main site failed. Main Registration Failed NotOk Registration of the recovery site failed. Recovery Registration Failed NotOk Registration of the witness site failed. Witness Registration Failed Cisco DNA Center Administrator Guide, Release 2.2.2 155 Implement Disaster Recovery Troubleshoot Your Disaster Recovery System Troubleshoot Your Disaster Recovery System The following table describes the issues that your disaster recovery system may present and how to deal with them. Note If a disaster recovery operation fails or times out, click Retry to perform the operation again. If the problem persists and its solution is not provided in the following table, contact Cisco TAC for assistance. Table 14: Disaster Recovery System Issues Error Code Message Solution SODR10007 Token does not match. The token provided during recovery site registration does not match the token generated during main site registration. From the main site's Disaster Recovery > Configuration tab, click Copy Token to ensure that you copy the correct token. SODR10048 Packages (package names) are mandatory and not installed on the main site. Install the listed packages before registering the system. SODR10056 Invalid credentials. Confirm that you entered the correct credentials for the main site during recovery and witness site registration. SODR10062 () site is trying to () with invalid IP address. Expected is (); actual is (). The main site IP address provided during recovery and witness site registration is different from the IP address that was provided during main site registration. SODR10067 Unable to connect to (recovery or witness site). Verify that the main site is up. SODR10072 All the nodes are not up for (main or recovery site). Check whether all three of the site's nodes are up. Cisco DNA Center Administrator Guide, Release 2.2.2 156 Implement Disaster Recovery Troubleshoot Your Disaster Recovery System Error Code Message Solution SODR10076 High availability should be enabled on (main or recovery) site cluster. Enable high availability (HA): 1. Log in to the site you need to enable HA on. 2. In the Cisco DNA Center GUI, click the Menu icon ( ) and choose System > Settings > System Configuration > High Availability. 3. Click Activate High Availability. SODR10100 (Main or recovery) site has no third party certificate. Replace the default certificate that Cisco DNA Center is currently using with a third-party certificate. See Update the Cisco DNA Center Server Certificate, on page 60 for more information. SODR10118 Appliance mismatch between main () and recovery (). Different appliances are used by the main and recovery sites. To successfully register disaster recovery, both sites must use the same 56 or 112 core appliance. SODR10121 Failed to advertise BGP. Reason: (). See Troubleshoot BGP Route Advertisement Issues, on page 162 for more information. SODR10122 Failed to stop BGP advertisement. Reason: (). See Troubleshoot BGP Route Advertisement Issues, on page 162 for more information. SODR10123 Failed to establish secure connection between main () and ()(). No solution is available for this issue. Please contact Cisco TAC for assistance. SODR10124 Cannot ping VIP: (main, recovery, or witness site's VIP or IP address). Do the following: • Verify that the address specified is correct. • Check whether the address is reachable from the other addresses. SODR10129 Unable to reach main site. () Check whether the Enterprise virtual IP address configured for the main site is reachable from the recovery and witness sites. Cisco DNA Center Administrator Guide, Release 2.2.2 157 Implement Disaster Recovery Troubleshoot Your Disaster Recovery System Error Code Message Solution SODR10132 Unable to check IP addresses are on the same interface. Retry the operation. () Retry the operation you just attempted. SODR10133 The disaster recovery enterprise VIP () and the IP addresses () are not configured or reachable via the same interface. Check the gateway or static routes configuration. Communication between a disaster recovery system's sites relies on the Enterprise network. The main and recovery site's Enterprise virtual IP address, as well as the witness site's IP address, need to be reachable via the Enterprise interface. This error indicates that the IP address/virtual IP address configured for one or multiple sites uses an interface other than the Enterprise interface for communication. SODR10134 The disaster recovery management VIP (VIP address) and the IPs (IP addresses) are configured/reachable via same interface. It should be configured/reachable via management interface. Check the gateway or static routes' configuration. The disaster recovery system's Management virtual IP address needs to be configured on the Management interface. This error indicates that the virtual IP address is currently configured on an interface where the Management cluster's virtual IP address has not been configured. Add a /32 static route to the Management virtual IP address that's configured on the Management interface. SODR10136 Certificates required to establish IPsec session not found. From the System Certificate page (System > Settings > Trust & Privacy > Certificates > System), try uploading the third-party certificate again and then retry registration. If the problem persists, contact Cisco TAC for assistance. SODR10138 Self-signed certificate is not allowed. Upload a third-party certificate and retry. — Cisco DNA Center Administrator Guide, Release 2.2.2 158 Implement Disaster Recovery Troubleshoot Your Disaster Recovery System Error Code Message Solution SODR10139 Disaster recovery requires first non-wildcard DNS name to be same in main and recovery. {} in {} site certificate is not same as {} in {} site certificate. The third-party certificate installed on your main and recovery sites has different DNS names specified for your disaster recovery system. Generate a third-party certificate that specifies a DNS name for your system and upload this certificate to both sites. Note SODR10140 Disaster recovery requires at least one non-wildcard DNS name. No DNS name found in certificate. The third-party certificate installed on your main and recovery sites does not specify a DNS name for your disaster recovery system. Cisco DNA Center uses this name to configure the IPsec tunnel that connects your system's sites. Generate a third-party certificate that specifies a DNS name for your system and upload this certificate to both sites. Note — — Ensure that the DNS name does not use a wildcard. Ensure that the DNS name does not use a wildcard. When all three of your system's sites are not connected due to network partitioning or another condition, Cisco DNA Center sets the status of the sites to Isolated. Contact Cisco TAC for help with completing the appropriate recovery procedure. Cisco DNA Center Administrator Guide, Release 2.2.2 159 Implement Disaster Recovery Troubleshoot Your Disaster Recovery System Error Code Message Solution — External postgres services does not exists to check service endpoints. Do the following: 1. Log in to the site that the error occurred on. 2. Run the following commands: • Kubectl get sep -A • kubectl get svc -A | grep external 3. In the resulting output, search for external-postgres. 4. If present, run the following command: kubectl delete sep external-postgres -n fusion 5. Retry the operation that failed previously. — Success with errors. If you see this message after initiating a failover or pausing your disaster recovery system, it indicates that the operation completed successfully even though one or multiple services encountered minor errors. You can go ahead and click Rejoin to restart your system. These errors will be resolved after you do so. — Failed. This message indicates that a disaster recovery operation failed because one or multiple services encountered a critical error. To troubleshoot the failure, we recommend that you view the Event Timeline and drill down to the relevant error. When you see this message, click Retry to perform the operation again. — Cannot ping VIP: (VIP address). Verify that the Enterprise VIP address configured for your system is reachable. — VIP drop-down list is empty. Confirm that your system's VIP addresses and intracluster link are configured properly. Cisco DNA Center Administrator Guide, Release 2.2.2 160 Implement Disaster Recovery Troubleshoot Your Disaster Recovery System Error Code Message Solution — Cannot perform (disaster recovery operation) due to ongoing workflow: BACKUP. Please try again at a later time. A disaster recovery operation was triggered while a scheduled backup was running. Retry the operation after the backup finishes. — The GUI indicates that the standby site is still down after it has come back online. If the standby site goes down and Cisco DNA Center's first attempt to isolate it from your disaster recovery system fails, it may not automatically initiate a second attempt. When this happens, the GUI will indicate that the site is down, even if it is operational again. In addition, you will not be able to restart your system as the standby site is stuck in maintenance mode. To restore the standby site, do the following: 1. In an SSH client, log in to the standby site. 2. Run the maglev maintenance disable command to take the site out of maintenance mode. 3. Log in to Cisco DNA Center. 4. In the GUI, click the Menu icon ( ) and choose System > Disaster Recovery. The Monitoring tab is selected, by default. 5. In the Action area, click Rejoin in order to restart your disaster recovery system. — Multiple services exists for MongoDB to check node-port label. For debugging, the MongoDB node port is exposed as a service. Run the following commands to identify this port and hide it: • kubectl get svc --all-namespaces | grep mongodb • magctl service unexpose mongodb <port-number> Cisco DNA Center Administrator Guide, Release 2.2.2 161 Implement Disaster Recovery Troubleshoot BGP Route Advertisement Issues Error Code Message Solution — Multiple services exist for Postgres to check node-port label. For debugging, the Postgres node port is exposed as a service. Run the following commands to identify this port and hide it: • kubectl get svc --all-namespaces | grep postgres • magctl service unexpose postgres <port-number> Troubleshoot BGP Route Advertisement Issues If you receive a BGP route advertisement error, complete the following procedure in order to troubleshoot the cause. Step 1 From the Cisco DNA Center cluster, validate the BGP session's status: a) In the Event Timeline, confirm whether the Starting BGP advertisement task completed successfully (Activate DR > View Details > Configure active). If the task failed, do the following before proceeding to Step 1b: 1. Check whether the neighbor router indicated in the error message is up. 2. Confirm whether the neighbor router has connectivity with Cisco DNA Center. If it doesn't, restore connectivity and then retry activating the new disaster recovery system or restarting an existing system that was paused. b) In the Cisco DNA Center GUI, view the disaster recovery system's Logical Topology and determine whether the neighbor router is currently active. If it's down, check whether the Cisco DNA Center cluster is configured as a BGP neighbor from the router's perspective. If it's not, configure the cluster as a neighbor and then retry activating the new disaster recovery system or restarting an existing system that was paused. c) Check the status of the BGP session between Cisco DNA Center and its neighbor router by running the following command: etcdctl get /maglev/config/network_advertisement/bgp/address1_address2 | jq where: • address1 is the Cisco DNA Center cluster's virtual IP address. • address2 is the neighbor router's IP address. If Established is listed in the state field, this indicates that the session is active and functioning properly. d) Run the following commands to view the bgpd and bgpmanager log files: • sudo vim /var/log/quagga/bgpd.log Cisco DNA Center Administrator Guide, Release 2.2.2 162 Implement Disaster Recovery Troubleshoot BGP Route Advertisement Issues • magctl service logs -rf bgpmanager | lql When viewing the log files, look for error messages. If you can't find any, this indicates that the BGP session is functioning properly. e) Check the status of the BGP session between Cisco DNA Center and its neighbor router by running the following command: echo admin-password| sudo VTYSH_PAGER=more -S -i vtysh -c 'show ip bgp summary' In the command output, look for the neighbor router's IP address. At the end of the same line, confirm that the router's connection state is listed as 0. If this is the case, this indicates that the BGP session is active and functioning properly. Step 2 From the neighbor router indicated in the error message, validate the BGP session's status: a) Run the show ip bgp summary command. b) In the command output, look for the Cisco DNA Center cluster's virtual IP address. At the end of the same line, confirm that the cluster's connection state is listed as 0. If this is the case, this indicates that the BGP session is active and functioning properly. c) Run the show ip route command. d) View the command's output and confirm whether the disaster recovery sytem's Enterprise virtual IP address is being advertised. For example, say your system's Enterprise virtual IP address is 10.30.50.101. If this is the first IP address that you see in the output, this confirms that it is being advertised. Cisco DNA Center Administrator Guide, Release 2.2.2 163 Implement Disaster Recovery Troubleshoot BGP Route Advertisement Issues Cisco DNA Center Administrator Guide, Release 2.2.2 164
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Related manuals
Download PDF
advertisement