User Guide for the Cisco Network Analysis Module Virtual Service Blades, 4.2
Setting Up the Application
Downloads: This chapterpdf (PDF - 1.09MB) The complete bookPDF (PDF - 8.44MB) | Feedback

Setting Up the Application

Table Of Contents

Setting Up the Application

Managed Device Parameters

Setting Up NBAR Protocol Discovery

Data Sources

VLAN Data Sources

Using a VLAN Data Source

Deleting a VLAN Data Source

NetFlow

Understanding NetFlow Interfaces

Understanding NetFlow Flow Records

Configuring NetFlow on Devices

Managing NetFlow Devices

Creating Custom Data Sources

Selecting a NetFlow Device

Selecting the Interfaces

Using the Listening Mode

Understanding Wide Area Application Services

ART Monitoring from WAAS Data Sources

Managing WAAS Devices

Adding a WAAS Device

Configuring WAAS Data Sources

Deleting a WAAS Data Source

Auto-Config New WAAS Devices

Managing a WAAS Monitored Server

Adding a WAAS Monitored Server

Deleting a WAAS Monitored Server

Setting Up a WAAS Analysis Report

Understanding Nexus 1000V

ERSPAN

Sending ERSPAN Data Directly to the NAM Management Interface

Monitoring

Monitoring Core Data

Enabling Mini-RMON Collection

Monitoring Response Time Data

Setting Up Response Time Configuration

Setting Up Response Time Data Monitoring

Creating a Response Time Monitoring Collection

Editing a Response Time Monitoring Collection

Deleting Response Time Data Collections

Understanding DiffServ

Monitoring DiffServ Data

Setting Up the DiffServ Profile

Creating a DiffServ Profile

Editing a DiffServ Profile

Deleting a DiffServ Profile

Protocol Directory

Individual Applications

Creating a New Protocol

Editing a Protocol

Deleting a Protocol

Setting Up Encapsulation

Setting Up Application Groups

Creating an Application Group

Editing an Application Group

Deleting an Application Group

Setting Up Autolearned Protocols

Setting Up Alarm Events and Thresholds

Setting Up Alarm Events

Setting Alarm Thresholds

Alarm Thresholds - Selecting a Variable

Alarm Thresholds - Selecting Parameters

Editing an Alarm Threshold

Deleting a NAM MIB Threshold

Setting Up the NAM Syslog

Setting Managed Device Thresholds

Creating Managed Device Thresholds

Editing Managed Device Thresholds

Deleting Managed Device Thresholds

Setting NAM Trap Destinations

Creating a NAM Trap Destination

Editing a NAM Trap Destination

Deleting a NAM Trap Destination

Setting NAM Alarm Mail

Setting Global Preferences


Setting Up the Application


Use the Setup window, Figure 3-1, to set up and configure the NAM application. Set up the NAM application in the sequence shown.

Figure 3-1 Setup Window


Note The Setup window does not support IPv6 except for the setting of alarm events and thresholds.


This chapter contains the following sections:

Managed Device Parameters

Data Sources

Monitoring

Protocol Directory

Setting Up Alarm Events and Thresholds

Setting Global Preferences

Managed Device Parameters

A managed device should be the router or switch being monitored by NAM. The NAM VSB connects to the managed device using SNMP to monitor managed device information such as NBAR, interface statistics, and to enable and disable NBAR.

To view or set up managed device parameters:


Step 1 Click Setup > Managed Device Parameters.

The Managed Device Parameters window appears. The Managed Device Information displays the following from the managed device's configuration:

Managed Device Name

Hardware type

Managed Device Software Version

System Uptime

Location

Contact Person

Figure 3-2 shows an example of the Managed Device Parameters window.

Figure 3-2 Managed Device Parameters Window

Step 2 Enter the Managed Device IP address in the Managed Device IP Address field.

Enter the same IP address that was configured on the managed device.

Step 3 Enter the SNMP Read-Write Community String.

Enter the same read-write community string that was configured on the managed device or the NAM cannot communicate via SNMP with the managed device.

Step 4 Enter the SNMP Read-Write Community String again in the Verify String field.

Step 5 Click Apply to store the information, or click Reset to clear the dialog of any characters you entered or restore the previous settings.


Note It is a good idea to click Test Connectivity to test the configuration you have entered or modified.



Setting Up NBAR Protocol Discovery


Note NBAR is supported only on switches with the Catalyst 6500 Supervisor Engine 32 Programmable Intelligent Services Accelerator (PISA) running IOS 12.2(18)ZY (or later).


From the Managed Device Parameter window, you can view the NBAR Status information and enable or disable NBAR on all interfaces.

To set up NBAR protocol discovery:


Step 1 Choose Setup > Managed Device Parameters > NBAR Protocol Discovery.


Note If your switch does not support NBAR, a message displays indicating that NBAR is not supported on your switch.


The NBAR Status window appears with the following options:

Details—Click to display the NBAR Interface Details.

Save—Click to save the device's running configuration.

Enable—Click to enable NBAR on all available interfaces.

Disable—Click to disable NBAR on all interfaces.


Note The Save button is only available on switches running Cisco IOS. Changes occur immediately on switches running Catalyst OS.


The NBAR Interfaces window displays. Figure 3-3 shows an example of the NBAR Interfaces window.

Figure 3-3 NBAR Interfaces Window

The NBAR Interfaces window lists known interfaces by name and type. Check its check box to enable an interface.

You must enable the NBAR Interfaces feature for the NAM to provide information about ethernet ports on the Monitor > NBAR window. Select the ports you want to enable, then click Submit to turn on NBAR for those ports.

The All check box affects only the ports displayed on the current screen. Check the All check box to select all ports displayed on the current window. Clear the All check box to deselect all ports displayed on the current window. The Reset button resets the any changes you might have made to the NBAR window and it reverts to its previous settings.

To view details on an individual Port Stat, click on the Port Name. A Port Statistics detail window displays with the following information:

Alias—User defined port name

Description—Description of the port

Type—Type of port

Mtu—Maximum packet size, in bytes, that the port can handle

Speed—Speed of the port in bits per second

Physical Address—Physical address of the port in the switch

Operational Status—Current operational status of the port

Admin Status—Current administrative status of the port



Tip To view data for a specific Interface (NBAR) Details table, enter the port name or port type in the text box, then click Filter.



Note The Save button is only available on switches running Cisco IOS. Changes occur immediately on switches running Catalyst OS.


Table 3-1 NBAR Interface Details

Field / Operation
Description

NBAR Enabled

Check indicates that NBAR is enabled.

Interface

Name of the interface.

Depending on the IOS running on the Supervisor, port names are displayed differently. Earlier versions of CatOS displayed port names as 2/1 and 3/1 meaning module 2, port 1 and module 3 port 1.

Newer versions of IOS software display a port name as Gi2/1 to represent a Gigabit port on module 2 port 1.

In the Virtual Switch software (VSS), a port name might be displayed as Gi1/2/1to represent a Gigabit port on switch 1, module2, port 1.

Interface Description

Description of the interface.




Tip To view data for a specific interface name or interface type in the Interface Details table, enter the interface name or interface type in the text box, then click Filter. To clear the Filter text box, click Clear.


Data Sources

The Cisco NAM Virtual Service Blade (VSB) has the ability to process performance data from a variety of data sources.

On the WAAS appliances, the NAM VSB can utilize the WAAS Flow Agent as a data source. WAAS Flow Agent is an embedded part of the WAAS software, which provides information about packet streams of interest traversing through both the LAN and WAN interfaces. You can also use the WAAS NAM to monitor NetFlow data sources. Before you can monitor data, you must direct specific traffic flowing through a switch or router to the NAM for monitoring purposes. For NetFlow Data Export (NDE), you monitor NDE records directly from remote switches or routers. You must configure the NDE source to the NAM from a local switch or remote router, using the switch CLI.

On the Nexus 1000V NAM VSB, you can direct ERSPAN packets to the NAM using the NAM management interface. ERSPAN supports source ports, source VLANs, and destination ports on different routers, which provides remote monitoring of multiple routers across your network.
The Nexus 1000V NAM VSB also supports NetFlow Data Export (NDE). NDE can be configured on select virtual and physical interfaces on the Nexus 1000V switch to provide insight into traffic behavior in the virtual machine network.

This section discusses the following:

VLAN Data Sources

NetFlow

Creating Custom Data Sources

Understanding Wide Area Application Services

Understanding Nexus 1000V

ERSPAN

VLAN Data Sources


Note This section applies only to the Cisco Nexus 1010 Virtual Services Appliance.


Unlike NAM-1 and NAM-2 devices where you can choose VLAN data sources from a drop-down menu, you must create VLAN data sources for the Cisco Nexus 1010 Virtual Services Appliance to monitor.

You must create the VLAN data sources here first or they will not be available in the Data Source drop-down menu on the Setup > Monitor > Core Monitoring window.

To create a VLAN data source:


Step 1 Choose Setup > Data Sources.

The Active SPAN Sessions Dialog displays.

Step 2 Click ERSPAN VLANs.

The VLAN Data Sources window displays.

Figure 3-4 VLAN Data Sources

Step 3 Click Create.

The VLAN Data Sources window displays.

Figure 3-5 VLAN Data Sources

Step 4 Enter a data source name and a VLAN ID in the dialog box and click Submit to create a VLAN data source. The window displays your new data source.

Figure 3-6 Newly Created Data Source


Using a VLAN Data Source

To use the new data source you have just created, you will need to enable it from the Setup menu:


Step 1 Choose Setup > Monitor. The Core Monitoring window appears.

Step 2 Choose the new VLAN data source from the drop-down menu.

Figure 3-7 List of Data Sources

Step 3 Check the check boxes for the display functions you would like to see. Typically, you will want to check all boxes. Click Apply.

Step 4 To display the ERSPAN data for your VLAN, choose Monitor > Apps, Monitor > Hosts, or Monitor > Conversations. The newly created VLAN data source will show in the dialog box by default and display the data for that VLAN.


Deleting a VLAN Data Source

To delete a VLAN data source:


Step 1 Choose Setup > Data Sources.

The Active SPAN Sessions Dialog displays.

Step 2 Click VLANs.

The VLAN Data Sources window displays and lists VLAN data sources available on the NAM appliance.

Step 3 Check the check box of a VLAN data source and click Delete.


NetFlow

Understanding NetFlow Interfaces

To use a managed device as an NDE data source for the NAM, you must configure the managed device itself to export NDE packets to UDP port 3000 on the NAM. You might need to configure the device itself on a per-interface basis. An NDE device is identified by its IP address. By default the switch's local supervisor engine is always available as an NDE device.

You can define additional NDE devices by specifying the IP addresses and (optionally) the community strings. Community strings are used to upload convenient text strings for interfaces on the managed devices that are monitored in NetFlow records.

Distinguishing among different interfaces on the remote NDE devices is a feature in this release that allows you to arbitrarily bundle groups of interfaces on each remote NDE device into a conceptual data source instead of simply grouping all flows into the same collections.

If you try to distinguish every interface on every managed device (potentially in both directions separately), this action could result in a large, unmanageable number of data sources. By using conceptual data sources, you have complete flexibility to group all interfaces in all directions into a single conceptual data source.

You could also choose to create a separate conceptual data source for each interface on the device. In general, you can combine any number of "simple flow paths" to form a conceptual data source. Each simple flow path can consist of a single interface in the input direction, the output direction, or both directions.

The following restrictions apply to creating conceptual data sources and assigning flow paths to them.

Any interface that is specified as an input interface for a flow path cannot be specified as an input interface in another conceptual data source for the same device. It also cannot be specified as a bidirectional interface in another flow path for the same conceptual data source.

Any interface that is specified as an output interface for a flow path cannot be specified as an output interface in another conceptual data source for the same device. It also cannot be specified as a bidirectional interface in another flow path for the same conceptual data source.

Any interface that has been specified as a bidirectional interface for a flow path cannot be specified as a bidirectional interface in another conceptual data source for the same device. It also cannot be specified as an input or output interface in another flow path for the same conceptual data source.

Understanding NetFlow Flow Records

An NDE packet contains multiple flow records. Each flow record has two fields:

Input SNMP ifIndex

Output SNMP ifIndex


Note This information might not be available because of NDE feature incompatibility with your Cisco IOS or Catalyst OS version or because of an NDE flow-mask configuration. For more information on flow-mask compatibility, see the "NDE Flow Masks and V8 Aggregation Caches" section on page 4-4.


In most cases, turning on NetFlow on an interface populates the NetFlow cache in the device with flows that are in the input direction of the interface. As a result, the input SNMP ifIndex field in the flow record has the ifIndex of the interface on which NetFlow was turned on. Sample NetFlow Network, Figure 3-8, shows a sample network configuration with a NetFlow router.

Figure 3-8 Sample NetFlow Network

The Reporting Flow Records table (Table 3-2) lists the reported flows if NetFlow is enabled on interface a.

Table 3-2 Reporting Flow Records

Input Interface
Output Interface
Are Flows Reported?

a

b

Yes

a

c

Yes

b

c

No

b

a

No

c

a

No

c

b

No


Configuring NetFlow on Devices

The configuration commands for NetFlow devices to export NDE packets to the NAM are platform and device specific. The example configuration commands provided here are the ones most commonly found for devices running Cisco IOS. For more detailed information, see your device documentation.

For Devices Running Cisco IOS


Step 1 Select the interface on which you wish to turn on routed flow cache.

Prompt# configure terminal
Prompt(config)# interface <type slot/port> 

Prompt(config-if)# ip route-cache flow 

Step 2 Export routed flow cache entries to UDP port 3000 of the NAM.

Prompt(config)# ip flow-export destination <NAM IP address> 3000 


For Devices Supporting Multi-Layer Switching Cache Running Cisco IOS


Step 1 Select the version of NDE.

Prompt(config)# mls nde sender version <version-number> 


Note The NAM supports NDE versions 1, 5, 6, 7, 8, and 9 aggregation caches.


Step 2 Select NDE flow mask.

Prompt(config)# mls flow ip full 

Step 3 Enable NetFlow export.

Prompt(config)# mls nde sender

Step 4 Export NetFlow to UDP port 3000 of the NAM.

Prompt(config)# ip flow-export destination <NAM IP address> 3000 


For Devices Supporting NDE v8 Aggregations Running Cisco IOS


Step 1 Select a v8 aggregation.

Prompt(config)# ip flow-aggregation cache <aggregation-type> 

Where aggregation-type can be:

destination-prefix

source-prefix

protocol-port

prefix

Step 2 Enable the aggregation cache.

Prompt(config-flow-cache)# enable 

Step 3 Export the flow entries in the aggregation cache to NAM UDP port 3000.

Prompt(config-flow-cache)#export destination <NAM address> 3000 


For Devices That Support NDE Export From Bridged-Flows Statistics


Step 1 Enable bridged-flows statistics on the VLANs.

Prompt>(enable) set mls bridged-flow-statistics enable <vlan-list> 

Step 2 Export the NDE packets to UPD port 3000 of the NAM

Prompt>(enable) set mls nde <NAM address> 3000 


Managing NetFlow Devices

Before you can monitor NetFlow data, you must add the NetFlow devices to be monitored. The remote NDE device must also be configured to export NDE packets to the NAM. For more information on configuring NetFlow on devices, see the "Configuring NetFlow on Devices" section or your accompanying device documentation. The following topics help you set up and manage the devices used for NetFlow monitoring:

Adding NetFlow Devices

Editing NetFlow Devices

Deleting NetFlow Devices

Testing NetFlow Devices

Creating Custom Data Sources

Using the Listening Mode

Adding NetFlow Devices

After you add a NetFlow device, NetFlow data sources are automatically created for that device. You can use the Listening Mode to verify that NDE packets are active on these data sources. For more information on using the Listening Mode, see the "Using the Listening Mode" section.

To create a device:


Step 1 Click Setup > Data Sources.

The Active SPAN Sessions table displays.

Step 2 In the contents, click Netflow --Devices.

The NetFlow Devices table displays.

Step 3 Click Add.

The New Device dialog box appears.

Step 4 Enter the device name and community string.

Step 5 To create a NetFlow custom data source, check the Create Data Source check box.

When the check box is checked, a data source will be automatically created with a name like NDE-ip address. You can edit or delete the automatically created data source by going to the Setup > Data Sources > NetFlow > Custom Data Sources window.

Step 6 To save the changes, click OK.

Otherwise, click Reset to clear the entries in the dialog box, or click Cancel to leave the entries unchanged.


Editing NetFlow Devices


Note You cannot edit the local switch.


To edit a NetFlow device:


Step 1 Click the Setup tab, then click Data Sources.

The Active SPAN Sessions table displays.

Step 2 In the contents, click Devices.

The NetFlow Devices table displays.

Step 3 Select the device you wish to edit from the table and click Edit.

The Edit Device window appears.

Step 4 Make the desired changes and do one of the following:

To save the changes, click OK.

To restore the original entries, click Reset,

To leave the configuration unchanged, click Cancel.


Deleting NetFlow Devices

To delete a NetFlow device:


Step 1 Click Setup > Data Sources.

The Active SPAN Sessions table displays.

Step 2 In the contents, click Devices.

The NetFlow Devices table displays.

Step 3 Select the device you wish to delete from the Devices dialog box, then click Delete.


Note All custom NetFlow data sources that are related to the device will be deleted.



Testing NetFlow Devices

You can test the SNMP community strings for the devices in the Devices table. To test a device, select it from the Devices table, then click Test. The Device System Information Dialog Box (Table 3-3) displays.

Table 3-3 Device System Information Dialog Box 

Field
Description

Name

Name of the device.

Hardware

Hardware description of the device.

Device Software Version

The current software version running on the device.

System Uptime

Total time the device has been running since the last reboot.

Location

Location of the device.

Contact

Contact information for the device.

SNMP read from device

SNMP read test result. For the local device only.


If the device is sending NetFlow Version 9 (V9) and the NAM has received the NDE templates, then a V9 Templates button appears below the Device System Information window.


Note NetFlow V9 templates do not appear in all NDE packets. When there are no templates, the V9 Templates button does not appear.


To view the NetFlow V9 templates, click the V9 Templates button. For more information, see Table 3-6 in Using the Listening Mode.

Creating Custom Data Sources

NetFlow data sources are automatically learned when you create a device in the Devices section. For more information on creating NetFlow devices, see the "Adding NetFlow Devices" section. This option allows you to create custom data sources on NetFlow devices with specific interface information.

To create a custom data source:


Step 1 Click Setup > Data Sources.

Step 2 From the contents menu, choose Custom Data Sources.

The NetFlow Data Sources table displays.

Step 3 Click Create.

The following table shows the wizard used to create or edit a NetFlow data source.

 
Wizard Page
References

Step 1 

Device Selection

"Selecting a NetFlow Device" section

Step 2 

Interface Selection

"Selecting the Interfaces" section

Step 3 

Summary

"Verifying NetFlow Data Source Information" section


Selecting a NetFlow Device

To select a NetFlow device:


Step 1 Select the NetFlow device from the list.

Step 2 Enter the data source name. If none is entered, a default name will be created.

Step 3 Click Next.


Selecting the Interfaces

To select an interface:


Step 1 Select the data flow direction.

Step 2 Select the interfaces you want to add from the Available Interfaces section.


Tip Use Ctrl+Click to select multiple interfaces.


If no interfaces are listed, manually enter them in the Interface Index text box.

Step 3 Click Add.

The selected interfaces are displayed in the Selected Interfaces section.

To remove interfaces, select them from the Selected Interfaces section, then click Remove.

To remove all interfaces from the Selected Interfaces section, click Remove All.

Step 4 Click Next.


Special (0) Interface

NDE packets sometimes have NetFlow records reporting either (or both) input if-index and output if-index fields as being 0. This could be a result of one or more of the following reasons:

Flows are terminated at the device.

Configurations of the device.

Unsupported NetFlow feature of the platform at the device.

For more information, see the accompanying documentation for your NetFlow device.

Verifying NetFlow Data Source Information

To verify NetFlow data source information:


Step 1 Verify the information is correct.

Step 2 Do one of the following:

To save the configuration, click Finish.

To cancel any changes and go back to the NetFlow Data Sources table, click Cancel.


Editing a Custom Data Source

To edit a custom data source:


Step 1 Choose Setup > Data Sources.

Step 2 Click Custom Data Sources.

The NetFlow Data Sources table displays.

Step 3 Select the data source you wish to edit, then click Edit.

The wizard used to edit NetFlow data sources displays.

Step 4 Make the desired changes and do one of the following:

To accept the changes, click Finish.

To cancel the changes, click Cancel.


Deleting a Custom Data Source

To delete a data source, select it from the NetFlow Data Source table, then click Delete.


Note You cannot delete the default data sources.


Using the Listening Mode

The Listening Mode of the NAM allows you to view the IP addresses of devices sending NDE packets to the NAM, the number of NDE packets, and time that the last NDE packet was received. The NetFlow Listening Mode table only lists devices that the NAM currently receives NDE packets from.

To use listening mode:


Step 1 Choose Setup > Data Sources.

Step 2 In the contents, click Listening Mode.

The NetFlow Listening Mode Table (Table 3-4) displays.

Table 3-4 NetFlow Listening Mode Table 

Field
Description

Start Time

The timestamp of when the Start button was clicked.

Address

IP address of the learned device.

# Received NDE Packets

Number of NetFlow data export (NDE) packets received.

Last Packet Received

Time stamp the last NDE packet was received.


Step 3 Click Start.

Step 4 To clear the table and stop monitoring, click Stop.


Note Learning will automatically be disabled after 1 hour.



Viewing Details from the NetFlow Listening Mode Table

Select the device from the table, then click Details.

The Device Details Window (Table 3-5) displays.

Table 3-5 Device Details Window

Field
Description

Device Added

Indicates if the device was added to the NAM
device table.

Interfaces Reported
in NDE Packets

Lists the interfaces that NDE packets were seen on.

For example:

Special (0) (Output)

(1) (Input/Output)

(2) (Input/Output


Note Protocol-Prefix NDE packets do not have interfaces information.



If the device is sending NetFlow Version 9 (V9) and the NAM has received the NDE templates, then a V9 Templates button appears below the Device Details window. For more information, see:

http://www.cisco.com/en/US/products/sw/iosswrel/ps5187/products_feature_guide09186a00801b0696.html


Note NetFlow V9 templates do not appear in all NDE packets. If there are no templates, the V9 Templates button does not appear.


To view the NetFlow V9 templates, click the V9 Templates button.

The V9 Templates Window (Figure 3-9) displays (see example below).

Figure 3-9 V9 Templates Window

The V9 Templates Table (Table 3-6) describes the template data.

Table 3-6 V9 Templates Table

Field
Description

Type

Type of template data.

Length (Bytes)

Length of template data in bytes.



Adding a Device To Monitor

To add a device to monitor:


Step 1 Select the device from the table, then click Add.

The New Device Window displays.

Step 2 Enter the device information and click OK.

The new device is added to the NetFlow Devices table.


Understanding Wide Area Application Services

Cisco Wide Area Application Services (WAAS) software optimizes the performance of TCP-based applications operating in a wide area network (WAN) environment and preserves and strengthens branch security. The WAAS solution consists of a set of devices called Wide Area Application Engines (WAEs) that work together to optimize WAN traffic over your network.

When client and server applications attempt to communicate with each other, the network devices intercepts and redirects this traffic to the WAEs to act on behalf of the client application and the destination server.

WAE flow agents provide information about packet streams traversing through both LAN and WAN interfaces of WAAS WAEs. Traffic of interest can include specific servers and types of transaction being exported. The WAAS NAM processes the data exported from WAAS flow agents and performs application response time calculations and enters the data into reports you set up.

The WAEs examine the traffic and using built-in application policies to determine whether to optimize the traffic or allow it to pass through your network not optimized.

You can use the WAAS Central Manager GUI to centrally configure and monitor the WAEs and application policies in your network. You can also use the WAAS Central Manager GUI to create new application policies so that the WAAS system will optimize custom applications and less common applications.

Cisco WAAS helps enterprises to meet the following objectives:

Provide branch office employees with LAN-like access to information and applications across a geographically distributed network.

Migrate application and file servers from branch offices into centrally managed data centers.

Minimize unnecessary WAN bandwidth consumption through the use of advanced compression algorithms.

Provide print services to branch office users. WAAS allows you to configure a WAE as a print server so you do not need to deploy a dedicated system to fulfill print requests.

Improve application performance over the WAN by addressing the following common issues:

Low data rates (constrained bandwidth)

Slow delivery of frames (high network latency)

Higher rates of packet loss (low reliability)

For more information about WAAS and configuring the WAAS components, see the document:

Cisco Wide Area Application Services Configuration Guide, OL-16376-01
http://www.cisco.com/en/US/docs/app_ntwk_services/waas/waas/v4019/configuration/guide/
waas4cfg.html

ART Monitoring from WAAS Data Sources

The WAAS NAM processes the TCP flow data exported from WAAS Flow Agents and performs application response time (ART) calculations and reports. You use the WAAS NAM GUI to create a data source to monitor WAAS traffic statistics. In addition to ART, the WAAS NAM monitors and reports other traffic statistics of the WAAS data sources including application, host, and conversation information.

The WAAS NAM provides different ART metrics by collecting data at different points as packets flow along their paths. The WAAS NAM provides five different collection points, four represented by a WAAS data source. Figure 3-10 shows an example of the data collection points. The solid line represents data exported from a WAAS device and/or directly monitored traffic like SPAN. The broken line represents data exported from a WAAS device only.

Figure 3-10 WAAS Data Sources (Data Collection Points)

You can use the WAAS NAM GUI to configure data sources at the following locations in the network:

Client—This setting configures the WAE device to export the original (LAN side) TCP flows originated from its clients to the WAAS NAM for monitoring. To monitor this point, configure a Client data source.

Client WAN— This setting configures the WAE device to export the optimized (WAN side) TCP flows originated from its clients to WAAS NAM for monitoring. To monitor this point, configure a Client WAN data source.

Server WAN—This setting configures the WAE device to export the optimized (WAN side) TCP flows from its servers to WAAS NAM for monitoring. To monitor this point, configure a Server WAN data source.

Server—This setting configures the WAE device to export the original (LAN side) TCP flows from its servers to WAAS NAM for monitoring. To monitor this point, configure a Server data source.

You can also configure a data source to use Export Passthrough data. For more information about configuring WAAS data sources, see Configuring WAAS Data Sources.

Monitoring Client Data Sources

By monitoring the TCP connections between the client and the WAE device (Client segment in Figure 3-10), you can measure the following ART metrics:

Total Delay (TD) as experienced by the client

Total Transaction Time as experienced by the client

Bandwidth usage (bytes/packets) before optimization

Number of transactions and connections.

Network Delay broken down into two segments: client-edge and edge-server

Monitoring WAN Data Sources

By monitoring the TCP connections between the edge and core WAE devices (Client WAN and Server WAN segments in Figure 3-10), you can measure the following:

Bandwidth usage (bytes/packets) after optimization

Network Delay of the WAN segment

Monitoring Server Data Sources

By monitoring the TCP connections between the core WAE devices and the servers (Server segment in Figure 3-10), you can measure the following ART metrics:

Application (Server) Delay (without proxy acceleration/caching server)

Network Delay between the core WAE device and the servers


Note The WAAS NAM measures Network Delay (ND) by monitoring the TCP three-way handshake between the devices.


Managing WAAS Devices

Before you can monitor WAAS traffic, you must first configure the WAAS device to export WAAS flow record data to the NAM using the WAAS command-line interface (CLI) flow monitor command like the following:

flow monitor tcpstat-v1 host <nam IP address>

flow monitor tcpstat-v1 enable

After you enable flow export to the WAAS NAM using CLI commands like those above, WAAS devices will be detected and automatically added to the Cisco NAM VSB WAAS device list.

You must then configure which WAAS segments you want to monitor as WAAS data sources: Client, Client WAN, Server WAN, and/or Server. See Configuring WAAS Data Sources, for more detailed information.

You can also use the Central Manager (CM) to centrally to issue WAAS CLI commands to configure a large number of WAEs at one time.


Note In addition to configuring the WAAS devices, you must specify which application servers you want to monitor among the servers being optimized by WAAS devices. See Managing a WAAS Monitored Server, for more detailed information.


For more information about WAAS and configuring the WAAS components, see the document:

Cisco Wide Area Application Services Configuration Guide, OL-16376-01
http://www.cisco.com/en/US/docs/app_ntwk_services/waas/waas/v4019/configuration/guide/
waas4cfg.html

This section contains the following topics:

Adding a WAAS Device

Configuring WAAS Data Sources

Deleting a WAAS Data Source

Adding a WAAS Device


Note This step is not usually necessary because export-enabled WAAS devices are detected and added automatically. See Managing WAAS Devices, for more information about how to enable WAAS export to the NAM.


To manually add a WAAS device to the list of devices monitored by the NAM:


Step 1 Click Setup > Data Sources.

Step 2 From the contents menu, choose WAAS > Devices.

The WAAS Custom Data Sources table displays. Figure 3-11 shows an example of the WAAS Custom Data Source table.

Figure 3-11 WAAS Custom Data Sources Table

Step 3 Click Add.

The New Device dialog box displays. Figure 3-12 shows an example of the Add New WAAS Device window.

Figure 3-12 Add New WAAS Device

Step 4 Enter the device IP address in the Device field, and click to choose the type of WAAS data sources from this device to monitor.

See Configuring WAAS Data Sources, for more information.

Step 5 Click Submit to add the new WAAS custom data source.


Configuring WAAS Data Sources

The WAAS NAM uses data sources to monitor traffic collected from different WAAS segments: Client, Client WAN, Server WAN, and Server. Each WAAS segment is represented by a data source. You can set up the WAAS NAM to monitor and report other traffic statistics of the WAAS data sources such as application, host, and conversation information in addition to the monitored ART metrics.

To configure a WAAS device's custom data source:


Step 1 Click Setup > Data Sources.

Step 2 From the contents menu, choose WAAS -- Devices.

The WAAS Device table displays.

Step 3 Choose the WAAS device you want to modify, then click Config.

The Config Device dialog box displays the WAAS device IP address and the WAAS segments previously set to monitor. Figure 3-13 shows an example of the Configure WAAS Device window.

Figure 3-13 Configure WAAS Device

You can configure the WAAS data sources to monitor the following WAAS segments as shown in Figure 3-10, WAAS Data Sources (Data Collection Points):

Client—This setting configures the WAE device to export the original (LAN side) TCP flows originated from its clients to the NAM for monitoring.

Client WAN— This setting configures the WAE device to export the optimized (WAN side) TCP flows originated from its clients to NAM for monitoring.

Server WAN—This setting configures the WAE device to export the optimized (WAN side) TCP flows from its servers to NAM for monitoring.

Server—This setting configures the WAE device to export the original (LAN side) TCP flows from its servers to NAM for monitoring.

Server—This setting configures the WAE device to export the original (LAN side) TCP flows from its servers to NAM for monitoring. To monitor this point, configure a Server data source.

Passthrough - This setting configures the WAE device to export TCP flows that are not being optimized (passthrough traffic) to NAM for monitoring. To monitor this point, configure a Passthrough data source. This data source is useful for WAAS impact analysis (before versus after optimization.)

Table 3-7, WAAS Data Source Configurations, lists six different deployment scenarios you might consider to monitor the optimized traffic on your WAAS network.

Table 3-7 WAAS Data Source Configurations

 
Deployment Scenario
Edge WAE Data Source
Core WAE Data Source

1

Clients in the edge (branch)

Servers in the core (data center)

NAM in the core

Client

Server

Server WAN

2

Clients in the edge (branch)

Servers in the core (data center)

NAM in the edge

Client

Client WAN

Server

3

Servers in the edge (branch)

Clients in the core (data center)

NAM in the core

Server

Client

Client WAN

4

Servers in the edge (branch)

Clients in the core (data center)

NAM in the edge

Server

Server WAN

Client

5

Clients and servers in the edge (branch) and the core (data center)

NAM in the core

Client

Server

Client

Server

Client WAN

Server WAN

6

Clients and servers in the edge (branch) and the core (data center)

NAM in the edge

Client

Server

Client WAN

Server WAN

Client

Server



Note The following step is optional and applies only when the WAAS NAM is configured to export data to an External Response Time Reporting Console, such as the NetQos Super Agent.


Step 4 To export WAAS pass-through data to the External Response Time Reporting Console, click Export Passthru to External Console.


Note WAAS pass-through data is not analyzed by the NAM.


See Response Time Export, page 2-18, for more information.


Deleting a WAAS Data Source

To delete a WAAS custom data source:


Step 1 Click Setup > Data Sources.

Step 2 From the contents menu, choose WAAS > Devices.

The WAAS Custom Data Sources table displays.

Step 3 Choose the WAAS custom data source you want to delete, then click Delete.

A dialog box displays the device address and asks if you are sure you want to delete the device.


Auto-Config New WAAS Devices

If you have numerous WAE devices, you can setup the WAAS NAM to configure newly discovered WAE devices using a predefined configuration template using the NAM Auto Config option.


Note If most of your WAE devices are edge WAE, you might want to set the auto config to be that of the edge device, then manually configure the data center WAE. For example, select the Client segment for monitoring.


To configure WAAS auto-config:


Step 1 Click Setup > Data Sources.

Step 2 From the contents menu, choose WAAS -- Devices.

The WAAS Device table displays. Figure 3-11 shows an example of the WAAS Custom Data Source table.

Step 3 Click Auto-Config.

The Auto-Config Setting window displays. Figure 3-14 shows an example of the WAAS Device Auto Config Setting window.

Figure 3-14 WAAS Device Auto Config Setting Window

Step 4 Check the Enable Auto Config check box and specify the configuration to be applied to newly discovered WAE devices. See Configuring WAAS Data Sources, for more information.


Note After a WAAS device is auto configured, you can manually override its auto-configuration by selecting the device and click Config to reconfigure the device.



Managing a WAAS Monitored Server

WAAS monitored servers specify the servers from which WAAS devices export traffic flow data to NAM to monitor. To enable WAAS monitoring, you must list the servers to be monitored by the NAM using the WAAS device's flow monitoring.


Note The NAM is unable to monitor WAAS traffic until you set up WAAS monitored servers. The NAM displays status of WAAS devices as pending until you set up WAAS monitored servers.


This section contains the following topics:

Adding a WAAS Monitored Server

Deleting a WAAS Monitored Server

Adding a WAAS Monitored Server

To add a WAAS monitored server:


Step 1 Click Setup > Data Sources.

Step 2 From the contents menu, choose WAAS > Monitored Servers.

The WAAS Monitored Servers table displays. Figure 3-15 shows an example of the WAAS Monitored Servers table.

Figure 3-15 WAAS Monitored Servers Table

Check the Filter Response Time for all Data Sources by Monitored Servers check box if you want the WAAS NAM to compute response time data only for the servers from this list for all data sources, including non-WAAS data sources. All other servers will be ignored in response time monitoring views. This enables you to reduce NAM workload and to improve NAM overall performance.

Step 3 Click Add.

The New Device dialog box displays.

Step 4 Enter the server IP address in the Server Address field.

Step 5 Click Submit.


Deleting a WAAS Monitored Server

To delete a WAAS monitored server data source:


Step 1 Click Setup > Data Sources.

Step 2 From the contents menu, choose WAAS > Monitored Servers.

The WAAS Monitored Servers table displays any WAAS monitored servers.

Step 3 Select the monitored WAAS server to delete, then click Delete.

A confirmation dialog displays to ensure you want to delete the selected WAAS monitored server.

Step 4 Click OK to delete the WAAS monitored server.


Setting Up a WAAS Analysis Report

The WAAS NAM provides custom reports to help users to analyze and evaluate the impact of WAAS optimization. These reports are helpful during WAAS Proof of Concept evaluation and WAAS deployment planning. This window sets up necessary data sources and data collections and custom reports for WAAS before-after analysis.

After setting up the WAAS analysis report, Cisco NAM VSB will do the following configurations as necessary:

Configure branch WAE to export Client and Passthrough flows to the NAM.

Configure core WAE to export Server flows to the NAM.

Configure either branch WAE or Core WAE to export WAN flows to the NAM, depending on the NAM location.

Configure branch and core WAEs to monitor the selected Server.

Configure NAM data sources and associated response time collections for the WAE flows mentioned above.

Create Before-After Analysis custom reports for the selected client, server, and application.

Before attempting to set up the WAAS analysis report, ensure that the NAM GUI lists the WAE devices in your network and that you have configured the list of monitored servers (using Setup > Data Sources > WAAS -- Monitored Servers window).

To set up a WAAS analysis report:


Step 1 Click Setup > Data Sources.

Step 2 From the contents menu, click WAAS -- Analysis.

The Setup WAAS Analysis Report window displays as shown in Figure 3-16.

Figure 3-16 Setup WAAS Analysis Window

Step 3 Choose a Branch WAE from the Select Branch WAE pull-down menu.

If no WAE devices listed, use WAE CLI command flow monitor to enable flow exports to the NAM.

Step 4 Optionally, choose a Core (Data Center) WAE from the Select Core (Data Center) WAE pull-down menu.

The NAM is Located Near field is enabled if you choose a Core WAE.

Step 5 If you chose to enter a Core WAE, check a check box to indicate whether the NAM location is at the Branch WAE or the Core WAE.

Step 6 Choose an application to analyze using the Application to Analyze field's pull-down menu.

Step 7 Choose a server using the Specify Server pull-down menu.

The servers listed are those monitored servers you should have configured using the Setup > Data Sources > WAAS -- Monitored Servers window.

Step 8 Optionally, enter the IP address of a client.

You will need to provide client IP address if you want to create a custom report like an Application-
Server-Client report.

Step 9 Click Setup Analysis Report.

After you click Setup Analysis Report, the NAM creates the data sources required for these reports if the data sources have not already been configured. The NAM creates the reports and displays the Custom Reports window, as shown in Figure 3-17. Under the WAAS Analysis folder, the NAM creates the following report types:

Average Transaction Time of WAE-Client

Average Transaction Time of WAE-Passthrough data sources

Server Bytes on WAE-Passthrough

Server Bytes of WAE-Client

Server Bytes of WAE-ClientWAN or WAE-serverWAN

Server Bytes of WAE-Server data sources

Figure 3-17 Custom Reports Window


The custom reports window shows six reports created if a Core WAE was chosen. Under the WAAS Analysis folder, the NAM creates the following report types:

Average Transaction Time of WAE-Client data sources

Average Transaction Time of WAE-Passthrough data sources

Server Bytes on WAE-Passthrough

Server Bytes of WAE-Client

Server Bytes of WAE-ClientWAN or WAE-serverWAN

If core WAE was chosen and the NAM location is branch, the WAE-clientWAN data source report is created among six reports. If core WAE was chosen and the NAM location is core, the WAE-serverWAN data source report is created among six reports.

Server Bytes of WAE-Server data sources

If a Core WAE was not chosen, the Server Bytes of WAE-Server data sources report will not be created.

The NAM groups all the reports under one custom report of the type of either App-Server or App-Server-Client.

Understanding Nexus 1000V

Cisco Nexus 1000V Series Switches are virtual machine access switches that are an intelligent software switch implementation for VMware vSphere environments running the Cisco NX-OS operating system. Operating inside the VMware ESX hypervisor, the Cisco Nexus 1000V Series supports Cisco VN-Link server virtualization technology to provide:

Policy-based virtual machine (VM) connectivity

Mobile VM security and network policy, and

Non-disruptive operational model for your server virtualization, and networking teams

When server virtualization is deployed in the data center, virtual servers typically are not managed the same way as physical servers. Server virtualization is treated as a special deployment, leading to longer deployment time, with a greater degree of coordination among server, network, storage, and security administrators.

With the Cisco Nexus 1000V Series, you can have a consistent networking feature set and provisioning process all the way from the VM access layer to the core of the data center network infrastructure. Virtual servers can leverage the same network configuration, security policy, diagnostic tools, and operational models as their physical server counterparts attached to dedicated physical network ports. Virtualization administrators can access predefined network policy that follows mobile virtual machines to ensure proper connectivity saving valuable time to focus on virtual machine administration. This comprehensive set of capabilities helps you to deploy server virtualization faster and realize its benefits sooner.

ERSPAN


Note This section is applicable only to the Nexus 1010 Virtual Services Appliance.


This section describes how to configure Encapsulated Remote Switched Port Analyzer (ERSPAN) of the Cisco Nexus 1010 Virtual Services Appliance as a NAM data source. You configure ERSPAN as a NAM data source from the switch command line interface, not the NAM GUI.

Sending ERSPAN Data Directly to the NAM Management Interface

To send the data directly to the NAM management IP address (management-port), configure the ERSPAN source session. No ERSPAN destination session configuration is required. After performing this configuration on the switch, the ERSPAN data source should appear on the NAM GUI and can then be selected to analyze the ERSPAN traffic.


Note This method affects NAM performance and accessibility.


Sample Configuration

monitor session 1 type erspan-source
no shut
source interface Fa3/47
destination
erspan-id  Y 
ip address aa.bb.cc.dd
origin ip address ee.ff.gg.hh

Where:

Interface fa3/47 is a local interface on the erspan-source switch to be monitored

Y is any valid span session number

aa.bb.cc.dd is the management IP address of the NAM

ee.ff.gg.hh is the source IP address of the ERSPAN traffic

Monitoring

Before you can monitor data, you must set up the data collections in the Monitor option of the Setup tab. For information on data collections, see the "Overview of Data Collection and Data Sources" section on page 4-2.

There are options to set up the following:

Monitoring Core Data

Monitoring Response Time Data

Monitoring DiffServ Data

Setting Up the DiffServ Profile

Monitoring Core Data

You can enable or disable individual core data collections on each available data source. The following core collections are available:

Application Statistics—Enables the monitoring of application protocols observed on the data source.

Host Statistics (Network and Application layers)—Enables the monitoring of network-layer host activity.

Host Statistics (MAC layer)—Enables the monitoring of MAC-layer hosts activity. Also enables monitoring of broadcast and multicast counts for host detail windows.

Conversation Statistics (Network and Application layers)—Enables the monitoring of pairs of network-layer hosts that are exchanging packets.

Conversation Statistics (MAC layer)—Enables the monitoring of pairs of MAC-layer hosts that are exchanging packets.

VLAN Traffic Statistics—Enables the monitoring of traffic distribution on different VLANs for the data source.

VLAN Priority (CoS) Statistics—Enables the monitoring of traffic distribution using different values of the 802.1p priority field.

Network-to-MAC Address Correlation—Enables the monitoring of MAC-level statistics which are shown in host detail windows. Without this collection, a MAC station cannot be associated with a particular network host.

TCP/UDP Port Table—Enables the monitoring of server ports on a particular data source such as a VLAN, a physical port on the NAM, or a set of NDE flow records sent to the NAM.

Switch engine module (Supervisor) records received by the NAM. You can select any combination of Port statistics, VLAN statistics, and NBAR statistics.

Router engine module records (Router) received by the NAM. You can select any combination of Interface statistics and NBAR statistics.


Note For better overall system performance, enable only the collections you want to monitor.



Note You must disable all reports for the collections you want to turn off. If you turn off collections that have reports running on them, the collections will automatically be turned on except for voice reports. For more information on disabling reports, see the "Disabling Reports" section on page 5-20.


To set up core monitoring functions:


Step 1 Choose Setup > Monitor.

The Core Monitoring Functions Dialog Box (Figure 3-18) displays.

Figure 3-18 Core Monitoring Functions Dialog Box

Step 2 Select the collection data source from the Data Source drop-down menu.

To turn on core monitoring for the router, select Router from the Data Source drop-down menu. For routers, the following Data Sources are available:

Internal

External

NETFLOW

Router

To turn on core monitoring data for the switch or managed device, choose Supervisor from the drop-down menu. For switches and appliances, the following Data Sources are available:

VLANs

NETFLOW

NDE

Supervisor

You can enter a partial name of a data source and click Filter to find data sources that match. Click Clear to return to the entire list of data sources.

Step 3 Check the check boxes to enable any combination of the following specific core monitoring functions:

Application Statistics

Host Statistics (Network and Application layers)

Host Statistics (MAC layer)

Conversation Statistics ((Network and Application layers)

Conversation Statistics (MAC layer)

VLAN Traffic Statistics

VLAN Priority (CoS) Statistics

Network-to-MAC Address Correlation

TCP/UDP Port Table

Step 4 Select the maximum number of entries from the Max Entries lists.

Step 5 Click Apply to save your changes, or click Reset to cancel.


Enabling Mini-RMON Collection


Note Currently, the Nexus 1010 Virtual Services Appliance VSM doesn't support Mini-RMON.


Enabling Mini-RMON on the switch Supervisor allows you to monitor port statistics data from each switch port. You must enable Mini-RMON in privileged mode from the CLI. To enable Mini-RMON, do one of the following:

For Switches Running Cisco IOS Software

You must enable Mini-RMON on each individual interface.

Enter the following commands:

Supervisor name(config) # interface interface-name
Supervisor name(config-if) # rmon collection stats collection-control-index owner monitor
Supervisor name(config-if) # end 

where:

The interface-name is the name of the interface on which you are enabling Mini-RMON.

The collection-control-index is any arbitrary number that has not yet
been used.

Monitoring Response Time Data

You can monitor response time to collect the response time between a client and a server. You can enable or disable response time monitoring on individual collection data sources. When you enable response time monitoring, the application supplies the default collection parameters.

The response time monitoring option is on by default; however to monitor response time data, you must enable response time monitoring in the NAM Traffic Analyzer application.

These topics help you set up and manage response time monitoring:

Setting Up Response Time Configuration

Setting Up Response Time Data Monitoring

Creating a Response Time Monitoring Collection

Editing a Response Time Monitoring Collection

Deleting Response Time Data Collections

Setting Up Response Time Configuration

To configure the timing parameters (or buckets) for response time data collections:


Step 1 Choose Setup >  Monitor.

The Core Monitoring Functions table displays.

Step 2 In the contents, click Response Time - Configuration.

The Response Time Monitoring Setup, Collection Configuration window displays. See Figure 3-19, Response Time Configuration Window. The settings you make on this window comprise the time distribution in milliseconds for the detailed Server Application Response Time data collection.

Table 3-8 lists the time settings for the Response Time Configuration window.


Note These settings apply globally for all ART collections, including those you create using SNMP. The method you use last overrides previous settings. So if you change the settings using the GUI, those settings will override the settings made using SNMP, and vice versa.


Figure 3-19 Response Time Configuration Window

Table 3-8 Response Time Configuration Window 

Field
Description
Usage Notes

Report Interval (sec)

Number of seconds between reports

Enter a number in seconds. The default is 300.

RspTime1 (msec)

Upper response time limit for the first bucket

Enter a number in milliseconds. The default is 5.

RspTime2 (msec)

Upper response time limit for the second bucket

Enter a number in milliseconds. The default is 10.

RspTime3 (msec)

Upper response time limit for the third bucket

Enter a number in milliseconds. The default is 50.

RspTime4 (msec)

Upper response time limit for the fourth bucket

Enter a number in milliseconds. The default is 100.

RspTime5 (msec)

Upper response time limit for the fifth bucket

Enter a number in milliseconds. The default is 200.

RspTime6 (msec)

Upper response time limit for the sixth bucket

Enter a number in milliseconds. The default is 500.

RspTimeMax (msec)

The maximum interval that the NAM waits for a server response to a client request

Enter a number in milliseconds. The default is 1000.


Step 3 Accept the default settings or change the settings to the values you want to monitor. Click Submit to save your changes, or click Reset to cancel.


Setting Up Response Time Data Monitoring

To configure response time monitoring:


Step 1 Choose Setup >  Monitor.

The Core Monitoring Functions table displays.

Step 2 In the contents, click Response Time - Monitoring.

The Response Time Monitoring Setup table displays any data sources you might have already set up for response time monitoring as shown in Figure 3-20, Response Time Monitoring Setup (specific to a WAAS NAM scenario).

Figure 3-20 Response Time Monitoring Setup

Click Create to add another data source for which you want to monitor response time data. Check a data source and click Edit to modify the data source. Check a data source and click Delete to remove the data source.


Creating a Response Time Monitoring Collection

To create a response time monitoring collection:


Step 1 Choose Setup >  Monitor.

The Core Monitoring Functions table displays.

Step 2 In the contents, click Response Time - Monitoring.

The Response Time Monitoring Setup table displays any data sources you might have already set up for response time monitoring as shown in Figure 3-20, Response Time Monitoring Setup.

Step 3 Click Create.

The Response Time Monitoring Setup, Collection Configuration window displays as shown in Figure 3-21.

Figure 3-21 Response Time Monitoring Setup, Collection Configuration

Step 4 Choose a data source from the drop-down menu, or enter a partial name in the empty field and click Filter to locate a specific data source from its partial name.

Cisco NAM VSB will build a table of response time data based on the number of entries you specify in Max. Table Entries and the timings you configured in Setting Up Response Time Configuration.

Step 5 Modify the number of table entries, or accept the default of 500 table entries and click Submit.

The new data source is listed as a Data Source when the Response Time Monitoring Setup window displays.


Editing a Response Time Monitoring Collection

To edit a response time monitoring collection:


Step 1 Choose Setup >  Monitor.

The Core Monitoring Functions table displays.

Step 2 In the contents, click Response Time - Monitoring.

The Response Time Monitoring Setup table displays any data sources you might have already set up for response time monitoring as shown in Figure 3-20, Response Time Monitoring Setup.

Step 3 Check the data source you want to modify and click Edit.

The Response Time Monitoring Setup, Collection Configuration window displays as shown in Figure 3-21.

Step 4 Make the changes you want to the data source collection, then click Submit.

The modified data source displays as a Data Source when the Response Time Monitoring Setup window displays.


Deleting Response Time Data Collections

To delete one or more response time data collections:


Step 1 Choose Setup >  Monitor.

The Core Monitoring Functions table displays.

Step 2 In the contents, click Response Time - Monitoring.

The Response Time Monitoring Setup table displays any data sources you might have already set up for response time monitoring.

Step 3 Check one or more of the data source collections listed, then click Delete.


Understanding DiffServ

Differentiated Services (DiffServ) is a computer networking architecture that specifies a simple, scalable and coarse-grained mechanism for managing network traffic and providing Quality of Service (QoS) guarantees on modern IP networks.

This scalability is achieved by the mechanisms controlling QoS at an aggregate level. Application traffic can be categorized into multiple classes (aggregates), with QoS parameters defined for each class. A typical arrangement would be to categorize traffic into premium, gold, silver, bronze, and best-effort classes.

Monitoring DiffServ Data

Differentiated services monitoring (DSMON or DiffServ) is designed to monitor the network traffic usage of differentiated services code point (DSCP) values.

To monitor DiffServ data, you must configure at least one aggregation profile and one or more aggregation groups associated with each profile. For more information on configuring an aggregation profile, see the "Creating a DiffServ Profile" section.

To set up monitoring of differentiated services:


Step 1 Choose Setup >  Monitor.

The Core Monitoring Functions table displays.

Step 2 In the contents under DiffServ, click Monitoring.

The DiffServ Monitor Setup Dialog Box (Table 3-9) displays.

You can enter a partial name of a data source and click Filter to find data sources that match. Click Clear to return to the entire list of data sources.

Step 3 Select the appropriate information.

Table 3-9 DiffServ Monitor Setup Dialog Box 

Element
Description
Usage Notes

Data Source List

Lists the data sources available.

Select the data source from the list.

DiffServ Profile List

Lists the user defined DiffServ profiles available.

Select the user-defined DiffServ profile from the list.

Traffic Statistics

Shows basic DSCP traffic distribution.

Select to enable or deselect to disable.

Application Statistics

Shows DSCP traffic distribution by application protocol.

Select to enable or deselect to disable. Select the maximum number of entries from the Max Entries list.

IP Host Statistics

Shows DSCP traffic distribution by host.

Select to enable or deselect to disable. Select the maximum number of entries from the Max Entries list.


Step 4 Click Apply to save your changes, or click Reset to cancel.


Setting Up the DiffServ Profile

A DiffServ profile is a set of aggregation groups that can be monitored as a whole. After you create the proper profile(s), you can enable DiffServ collection. For more information on setting up DiffServ collections, see the "Monitoring DiffServ Data" section.

These topics help you set up and manage the DiffServ profile:

Creating a DiffServ Profile

Editing a DiffServ Profile

Deleting a DiffServ Profile

Creating a DiffServ Profile

To create a DiffServ profile:


Step 1 Choose Setup >  Monitor.

The Core Monitoring Functions table displays.

Step 2 In the contents under DiffServ, click Profile.

The DiffServ Monitor Profile Dialog Box displays.

Step 3 Click Create.

The DiffServ Profile Setup Dialog Box (Table 3-10) displays.

Step 4 Select the appropriate information.

Table 3-10 DiffServ Profile Setup Dialog Box 

Element
Description
Usage Notes

Template List

Templates for creating a differentiated services profile.

Select the template from the list. Select NONE if you are not using a template.

Profile Name text box

Name of the profile.

Enter the name of the profile you are creating. The maximum is 64 characters.

DSCP Value column

DSCP numbers from 0 to 63.

Group Description text boxes

Name of the aggregation group for each DSCP value.

Enter the name of the aggregation group for each DSCP value. The maximum is 64 characters.


Step 5 Click Submit to save your changes, or click Reset to cancel.


Editing a DiffServ Profile

To edit a DiffServ profile:


Step 1 Choose Setup > Monitor.

The Core Monitoring Functions table displays.

Step 2 In the contents under DiffServ, click Profile.

The DiffServ Monitor Profile Table displays.

Step 3 Select the profile to edit, then click Edit.

The DiffServ Profile Setup Dialog Box (Table 3-10) displays.

Step 4 Make the necessary changes, then click Submit to save your changes, or click Reset to cancel.


Deleting a DiffServ Profile

To delete one or more DiffServ profiles, simply select the profiles from the DiffServ Monitor Profile table, then click Delete.

Protocol Directory

The NAM contains a default set of protocols to be monitored. You can edit and delete protocols from the RMON2 protocol directory table on the NAM.

These topics enable you to manage the protocol directory:

Individual Applications

Setting Up Application Groups

Setting Up Autolearned Protocols

Individual Applications

The Individual Applications window (Figure 3-22) lists protocols that have been set up for this NAM. To view the Individual Applications window, click Setup > Protocol Directory > Individual Applications. Use this window to view, add proprietary protocols, and to edit the settings for well-known protocols.

Figure 3-22 Protocol Directory Table

This section provides the following sections:

Creating a New Protocol

Editing a Protocol

Deleting a Protocol

Creating a New Protocol

You can create additional protocol ports to enable the NAM to handle additional protocol traffic for standard protocols.

To create a new protocol:


Step 1 Choose Setup >  Protocol Directory.

The Protocol Directory Table (Figure 3-22) displays.

Step 2 Click Create.

The New Protocol Parameters window (Figure 3-23) displays.

Figure 3-23 New Protocol Parameters Window

Table 3-11 describes the fields of the New Protocol Parameters Dialog.

Table 3-11 New Protocol Parameters Dialog

Field
Description

Protocol Family

Use the pull-down menu to choose a protocol:

IP

TCP

UDP

STCP

Description

Description of the protocol you create

Master Port/Protocol

Standard protocol port depending on the protocol family you choose

Port/Protocol

Arbitrary port you assign to handle the additional ports for the protocol family. This protocol number must be unique so it does not conflict with standard protocol/port assignments.

The range is 1-255 for IP

The range is 1-65535 for TCP, UDP, and SCTP.

Port Range

Range of ports for the protocol you create

Affected Stats

Address Map

Host

Conversations

ART

Note You must choose a type of Affected Stats for the traffic type you want to monitor.


Step 3 Use the pull-down menu to choose a Protocol Family.

Choose the protocol for the type of traffic you want to create the additional protocol to handle.

Step 4 Enter a description of the protocol you create.

Step 5 Use the pull-down menu to choose the master port for the type of traffic you want the new protocol to handle.

If you select a Master Port/Protocol, this extends the master protocol to cover the port/protocol you assign as well. Traffic on the port/protocol you create is treated as though it were traffic on the Master Port/Protocol. In this case, you cannot edit the Description or Affected Stats.

If you do not choose a Master Port/Protocol (None), the protocol you create is an independent protocol. You must still provide values for the Description and Affected Stats.

Step 6 Enter an integer to use as the beginning port number for the protocol you want to create.

The range is 1-255 for IP and 1-65535 for TCP, UDP, and SCTP.

Step 7 Enter the number of ports you want to create to assign to the protocol you create.

If you assign the new protocol to port 239, for example, and enter a range of four (4), the protocol you create will use ports 239, 240, 241, and 242 to handle traffic for the new protocol.

Step 8 For Affected Stats, check the type of statistics for the traffic you want to monitor.

Step 9 Click Submit to create the new protocol ports, or click Cancel to clear the dialog of any characters you entered or restore the previous settings.



Tip To view the full protocol name, move the cursor over the protocol name in the Protocol column of the Protocol Directory table.


Editing a Protocol

We recommend that you do not change any settings in the NAM protocol directory. Changing the default settings might cause unexpected behavior in SNMP-based management applications. However, advanced users might want to monitor proprietary protocols or alter the normal settings for well-known protocols.

To edit a protocol:


Step 1 Choose Setup >  Protocol Directory.

The Protocol Directory table displays.

Step 2 Select the protocol to edit, then click Edit.

The Edit Protocol Dialog Box(Table 3-12) displays.

Step 3 Make the necessary changes.

Table 3-12 Edit Protocol Dialog Box 

Field
Description
Usage Notes

Name

The name of the protocol.

 

Currently displayed as

Protocol name as it appears in the Protocol Directory table.

 

Port Range

Port Range for this protocol

 

Encapsulation

Protocol encapsulation type.

 

Affected Stats

The statistics that can be collected for the protocol:

Address Map

Hosts

Conversations

ART

A statistic is grayed out if it is not available for the protocol.


Step 4 Do one of the following:

To accept the changes, click Submit.

To leave the configuration unchanged, click Cancel.

To delete the protocol, click Delete.



TipYou can display the Edit Protocol dialog box for a specific protocol by clicking on the protocol name in the Protocol Directory table.

To view the full protocol name, move the cursor over the protocol name in the Protocol column of the Protocol Directory table.


Deleting a Protocol

To delete a protocol, simply select it from the Protocol Directory table, then click Delete.


Tip You can also delete a protocol from the Edit Protocol Directory dialog box. Select the protocol, then click Delete.


Setting Up Encapsulation

Using Encapsulation Configuration gives you increased flexibility when trying to monitor (such as counting or grouping) different types of application traffic. Encapsulation Configuration enables you to configure how you want the NAM to handle IP tunnel encapsulations.

You can use the NAM to set up the way you monitor different types of encapsulation in network traffic for the following protocols:

IPIP4—IP in IP tunneling

GREIP—IP over GRE tunneling

IPESP—IP with Encapsulating Security Payload

GTP—GPRS (General Packet Radio Service) Tunneling Protocol

When set to IGNORE, the default mode, the NAM uses application-based counting. The encapsulation type is ignored, and the NAM counts all application traffic but ignores tunneled traffic. When you turn on Encapsulation Configuration for one or more protocols, you enable the NAM to count separately for tunnel-based counting in addition to application-based counting. When you turn off Encapsulation Configuration for one or more protocols, the NAM uses tunnel-based counting, and all traffic over the specified protocol is counted as the tunnel protocol. Figure 3-24 shows the Encapsulation Configuration dialog box.

To configure encapsulation:


Step 1 Choose Setup >  Protocol Directory.

The Protocol Directory table appears.

Step 2 Select Encapsulations from the Content menu.

The Individual Applications Encapsulation Configuration window displays.

Figure 3-24 Encapsulation Configuration

Step 3 Use the pull-down menu to choose the type of Encapsulation Configuration you want for each protocol.

Application Based

Tunnel Based

Application and Tunnel Based

Step 4 Click Submit to change the Encapsulation Configuration.


Click Reset to revert to the previous settings since the last Submit.

Setting Up Application Groups

An application group is a set of application protocols that can be monitored as a whole. The following topics help you set up and manage the application group:

Creating an Application Group

Editing an Application Group

Deleting an Application Group

Creating an Application Group

To create an application group:


Step 1 Choose Setup >  Protocol Directory.

The Protocol Directory table displays.

Step 2 Select Application Groups from the Content menu.

Step 3 Click Create.

The New Application Group Dialog Box (Table 3-13) displays.

Step 4 Enter the application group name.

Step 5 Select the appropriate information.

Table 3-13 New Application Group Dialog Box 

Element
Description
Usage Notes

Application Group Name

Group Name

Enter the group name.

Encapsulation

Encapsulation of the application.

Select the encapsulation from the drop down box.

Application Filter

Options to filter or clear.

Enter the name of the protocol you are filtering. The maximum is 64 characters.

Application

List of applications

Select an application and click Add.

Applications appear in the Selected Applications box.


Step 6 Click Submit to save your changes, or click Reset to cancel.


Editing an Application Group

To edit an application group:


Step 1 Choose Setup > Protocol Directory.

The Individual Applications window displays.

Step 2 Select Application Groups from the Content menu.

The Application Groups window displays.

Step 3 Select the application group to edit, then click Edit.

The Application Groups Edit window displays.

Step 4 Make the necessary changes, then click Submit to save your changes, or click Reset to cancel.


Deleting an Application Group

To delete one or more application groups, simply select the profiles from the Application Groups table, then click Delete.

Setting Up Autolearned Protocols

The Autolearned Protocols Preferences window allows you to configure the NAM to automatically learn application information. You can set the following preferences:

Number of protocols to be learned (100 - 500)

Number of TCP ports to be learned (0 - 65535)

Number of UDP ports to be learned (0 - 65535)

Range of TCP ports NOT to be learned (1 - 65535)

Range of UDP ports NOT to be learned (1 - 65535)

To set up Autolearned Protocol preferences:


Step 1 Choose Setup > Protocol Directory.

Step 2 Click Autolearned Applications.

The Autolearned Protocols Preferences Dialog Box (Figure 3-25) displays.

Figure 3-25 Autolearned Protocols Preferences Dialog Box

Step 3 Enter or change the information described in the Autolearned Protocols Preferences Dialog Box (Table 3-14).

Table 3-14 Autolearned Protocols Preferences Dialog Box 

Field
Description
Usage Notes

Enable Autolearned Protocols

Enables the Autolearned Protocols feature.

Check the check box to enable.

Maximum Autolearned Protocols

The maximum number of protocols that can be autolearned.

Enter a number from 100 to 500. The default is 100.

Maximum TCP Port

The maximum number of TCP ports that can be autolearned.

Enter a number from 0 to 65535.

Maximum UDP Port

The maximum number of UDP ports that can be autolearned.

Enter a number from 0 to 65535.

TCP Exclusion Port Range

Specifies range of TCP ports to be excluded.

Enter a number from 0 to 65535. (0 Disables)

Start

Specifies start of TCP ports to be excluded.

 

End

Specifies end of TCP ports to be excluded.

 

UDP Exclusion Port Range:

Specifies range of UDP ports to be excluded.

Enter a number from 0 to 65535. (0 Disables)

Start

Specifies start of UDP ports to be excluded.

 

End

Specifies start of UDP ports to be excluded.

 

Step 4 Click Apply to save your changes, or click Reset to cancel.


Setting Up Alarm Events and Thresholds

You can set up alarm thresholds by defining threshold conditions for the following monitored variables on the NAM:

Response times

Server-client response times

DiffServ host statistics

DiffServ traffic statistics

DiffServ application statistics

Voice protocols

Mini-RMON MIB on the switch

Network layer statistics

MAC layer statistics

Application statistics

These topics help you set up and manage alarm threshold settings:

Setting Up Alarm Events

Setting Alarm Thresholds

Setting Up the NAM Syslog

Setting Managed Device Thresholds

Setting NAM Trap Destinations

Setting NAM Alarm Mail

Setting Up Alarm Events

Use this window to set up the alarm events, then use these events to set up the alarms you want to use. These events are also used for the Capture Trigger events. After creating events, go to the Setup >
Alarm Events
to see a list of the events you created. There you select which event you wish to be associated with that alarm. See Setting Alarm Thresholds.

You do not need to set up logs and traps before you set up Alarm Event. Logs and traps are part of the event parameters and specify what the NAM should do after an alarm is triggered.

To create an alarm event:


Step 1 Choose Setup > Alarms.

The Alarm Events table displays any configured Alarm Events. An alarm event is listed by its Description, Community, and Type. The type can be one of Log, Trap, or Log and Trap. Each alarm event also contains a Last Sent and Status field. The Last Sent field is a timestamp indicating the date and time the last event occurred. The Status field indicates the current status of the event.

Step 2 Click Create.

The Create Alarm Events Dialog displays, as shown in Figure 3-26.

Figure 3-26 Create Alarm Events Dialog

Step 3 Enter a description of the Alarm Event.

Enter up to 128 characters that describe this Alarm Event. This description displays on automatic captures you might configure.

Step 4 In the Community field, enter the community string for the SNMP community to which traps are sent. This community string must match a trap community string set in the NAM traps.

Step 5 Choose an event action.

Choose Log to log the event and display it in the Alarms tab. Choose Trap to send the event to traps processing. Choose Log and Trap to log the event and send it to trap processing.

Step 6 Click Submit.

The Alarm Events table displays the newly configured Alarm Event in its list.


Editing Alarm Events

To edit an alarm event:


Step 1 Choose Setup > Alarms.

The Alarm Events table displays any configured Alarm Events.

Step 2 Choose the alarm event you want to modify, and click Edit.


Deleting Alarm Events

To delete an alarm event:


Step 1 Choose Setup > Alarms.

The Alarm Events table displays any configured Alarm Events.

Step 2 Choose the alarm event you want to remove, and click Delete.


Setting Alarm Thresholds

You use the NAM GUI to set up alarm thresholds for MIB variables with values that trigger alarms. To view currently set alarm thresholds:


Step 1 Click Setup > Alarms.

The Alarm Events table displays any configured Alarm Events.

Step 2 In the content menu, click Alarm Thresholds.

The Alarm Thresholds table displays any currently setup alarm thresholds. Figure 3-27 shows an example of the Alarm Thresholds table.

Figure 3-27 Alarm Thresholds

Step 3 Click Create to set up an alarm threshold.


Alarm Thresholds - Selecting a Variable

After you click Create on the Alarm Thresholds window, you must set up alarm threshold variable properties. To set up an alarm threshold variable:


Step 1 Click Setup > Alarms.

The Alarm Events table displays any configured Alarm Events.

Step 2 In the content menu, click Alarm Thresholds.

The Alarm Thresholds table displays any currently setup alarm thresholds. Figure 3-27 shows an example of the Alarm Thresholds table.

Step 3 Click Create.

The Alarm Thresholds - Create - Select a Variable window displays. Figure 3-28 shows an example of the Alarm Thresholds - Create - Select a Variable window.

Figure 3-28 Alarm Thresholds - Create - Select a Variable

Step 4 From the Variable pull-down list, choose one of the following variables:

You can choose from among the following:

Network Layer Host

Network Layer Conversations

MAC Layer Hosts

MAC Layer Conversations

Application Statistics

Server Response Times

Server-Client Response Times

DiffServ Traffic Stats

DiffServ Host Stats

DiffServ Application Stats

Step 5 From the pull-down menu, choose the type of packets or bytes:

You can choose from among the following:

In Packets

Out Packets

In Bytes

Out Bytes

Step 6 For Network Protocol, use the pull-down menu to choose IPv4 (default) or IPv6.

Step 7 Click Next.


Alarm Thresholds - Selecting Parameters

After you click Next in the Alarm Thresholds - Create - Select a Variable window, you must set up the parameters for the alarm threshold variable.

To set up an alarm threshold variable parameters:


Step 1 From the Alarm Thresholds - Create - Select a Variable window, click Next.

Figure 3-27 shows an example of the Alarm Thresholds table. The Alarm Thresholds - Create - Select Parameters window displays. Figure 3-29 shows an example of the Alarm Thresholds - Create - Select Parameters window.

Figure 3-29 Alarm Thresholds - Create - Select Parameters

Table 3-15 lists and describes the parameters for Alarm Thresholds - Create - Select Parameters window.

Table 3-15 Alarm Thresholds - Create - Select Parameters

Field
Description
Usage Notes

Data Source

Available data sources on the NAM.

Select the data source from the list.

Network Protocol

Selected protocol to be monitored.

This is the network protocol you chose in Step 5.

Variable

Selected variable to be monitored.

This is the variable you chose in Step 3.

Network Address

Network address of host.

For network-layer host variables only.

Polling Interval

Interval in seconds for the sampling period.

Enter the number of seconds for the polling interval duration.

Sample Type

Type of sampling to be done.

Click Absolute for an alarm to be triggered by an absolute value that is reached.

Click the Delta for an alarm to be triggered by a change in the data rate.

Rising Threshold

Number of packets that triggers the alarm. For response time alarms, it is the number of milliseconds.

Enter a whole number (an integer)

Falling Threshold

Number of packets that triggers the alarm. For response time alarms, it is the number of milliseconds.

Enter a whole number (an integer)

Rising Event

Alarm threshold as defined in the RMON1 MIB.

Use the pull-down menu to select a rising threshold event.

Falling Event

Use the pull-down menu to select a falling threshold event.


Step 2 Enter the desired parameters for the alarm threshold you are creating.

Step 3 Click Finish to accept your changes, or click Cancel to cancel.


Viewing Alarm Details from the NAM MIB Thresholds Table

To view details of a specific alarm from the NAM MIB Thresholds table, select the radio button, then click Details. The Alarms Details Table(Table 3-16) displays.

Table 3-16 Alarm Details Table 

Field
Description

Variable

Monitored variable.

Data Source

Data source being monitored.

Address

Destination and source address of the hose.

Interval (seconds)

Interval of the sampling period.

Sample Type

Sample type of the alarm—absolute or delta.

Rising Threshold

The number of rising packets or octets that triggers the alarm.

Falling Threshold

The number of falling packets or octets that triggers the alarm.

Alarm Action

Action to be taken when the alarm is triggered.

Community

SNMP community where traps are sent.

Trigger Set

None, Start or Stop. Start indicates a capture process would start when this alarm is triggered. Stop means a capture process would stop when this alarm is triggered. None means no capture trigger is set for this alarm.


Editing an Alarm Threshold

To edit an alarm threshold:


Step 1 Choose Setup > Alarms.

The Thresholds table displays.

Step 2 Select the alarm to edit, then click Edit.

The Edit Event dialog box displays.

Step 3 Make the necessary changes.

Step 4 Click Finish to save your changes, or click Cancel to cancel the edit.


Deleting a NAM MIB Threshold

To delete a NAM MIB threshold:


Step 1 Select it from the Alarms table, then click Delete.

Step 2 Click Apply to save your changes, or click Reset to leave the configuration unchanged.


Setting Up the NAM Syslog

NAM syslogs are created for alarm threshold events, voice threshold events, or system alerts. The NAM maintains two syslog files, one for logging RMON threshold events (for MIB and voice threshold events) and one for logging local NAM system alerts.

You can specify whether syslog messages should be logged locally on the NAM, on a remote host, or both. You can use the NAM Traffic Analyzer to view the local NAM syslogs.

For information on viewing the syslog, see Chapter 6, "Viewing Alarms." You can use a standard text editor to view syslog on remote hosts.

To set up the NAM syslog:


Step 1 Choose Setup > Alarms.

The Alarm Events table displays.

Step 2 In the content menu, click NAM Syslog.

The NAM Alarms Syslog Dialog Box (Table 3-17) displays.

Step 3 Make the necessary changes.

Table 3-17 NAM Alarms Syslog Dialog Box 

Field
Usage Notes

Alarm Thresholds

Select Local to log messages on your local system.

Select Remote to log messages on a remote system.

Voice/Video Stream

Thresholds

Select Local to log voice/video threshold syslogs on your local system.

Select Remote to log voice/video threshold syslogs on a remote system.

RTP Stream

Select Local to log RTP Stream threshold syslogs on your local system.

Select Remote to log RTP Stream threshold syslogs on a remote system.

System

Select Local to log system alert syslogs on your local system.

Select Remote to log system alert syslogs on a remote system.

Select Debug to log debug messages from the application to the syslog.

Remote Server Names

Enter the IP address or DNS name of up to 5 remote systems where syslog messages are logged. Each address you enter receives syslog messages from all three alarms (Alarm Thresholds, Voice/Video Stream Thresholds, and System).


Step 4 Click Apply to save your changes, or click Reset to cancel.


Setting Managed Device Thresholds

You can configure RMON thresholds in the switch Mini-RMON MIB. You can specify only variables from the etherStatsTable in the Mini-RMON MIB to monitor for threshold-crossing conditions.

These topics help you set up and manage switch thresholds:

Creating Managed Device Thresholds

Editing Managed Device Thresholds

Deleting Managed Device Thresholds

Creating Managed Device Thresholds

To create Managed device thresholds:


Step 1 Choose Setup > Alarms.

The Thresholds table displays.

Step 2 In the contents, click Chassis Thresholds or Managed Device Thresholds.

The Chassis Threshold table displays.

Step 3 Click Create.

The New Chassis Thresholds (Table 3-18) displays.

Table 3-18 New Chassis Alarm Dialog Box 

Field
Description
Usage Notes

Data Source List

Data source from the switch.

Variable

The following variables are available:

Broadcast Pkts

Collisions

CRC Align Errors

Drop Events

Fragments

Jabbers

Multicast Pkts

Bytes

Oversize Pkts

Packets

Pkts size 64 Bytes

Pkts 65 to 127 Bytes

Pkts 128 to 255 Bytes

Pkts 256 to 511 Bytes

Pkts 512 to 1023 Bytes

Pkts 1024 to 1518 Bytes

Undersize Pkts

Interval (seconds)

Length of time, in seconds, for the sampling period to last.

Enter a decimal number.

Sample Type

Type of sampling to be done.

Click Absolute for an alarm to be triggered by an absolute value that is reached.

Click Delta for an alarm to be triggered by a change in the data rate.

Rising Threshold

Number of packets/octets that trigger the alarm.

Enter a number (an integer)

Falling Threshold

Number of packets/octets that trigger the alarm.

Enter a number (an integer)

Alarm Description

Description of the alarm.

Must not exceed 128 characters.

Alarm Action

Action to be taken when the alarm is triggered.

Click Log to log the event and display it in the Alarms tab.

Click Trap to send the event to traps.

Click Log and Trap to log the event and send it to traps.

Community

SNMP community where traps are sent.

This community string must match the traps community string set on the switch.


Step 4 Click Submit to save your changes, or click Reset to reset any entries you might have made.


Note If the switch is running a Cisco IOS image, you can save the alarm configuration to NVRAM.



Editing Managed Device Thresholds

To edit chassis thresholds or managed device thresholds:


Step 1 Choose Setup > Alarms.

The Thresholds table displays.

Step 2 In the content menu, click Chassis Thresholds or Chassis Thresholds.

The Switch Threshold Alarms dialog box displays.

Step 3 Select the alarm to edit, then click Edit.

The Edit Alarm dialog box displays.

Step 4 Make the necessary changes, then click Submit to save your changes, or click Reset to cancel and leave the configuration unchanged.


Deleting Managed Device Thresholds

To delete an existing chassis threshold or managed device threshold, select it from the Chassis Threshold Alarms table, then click Delete.

Setting NAM Trap Destinations

Traps are used to store alarms triggered by threshold crossing events. When an alarm is triggered, you can trap the event and send it to a separate host.

These topics help you set up and manage NAM traps:

Creating a NAM Trap Destination

Editing a NAM Trap Destination

Deleting a NAM Trap Destination

Creating a NAM Trap Destination

To create a NAM trap destination:


Step 1 Choose Setup > Alarms.

The NAM MIB Thresholds table displays.

Step 2 In the content, click NAM Trap Destinations.

The Traps dialog box displays.

Step 3 Click Create.

The Create Trap Dialog Box (Table 3-19) displays.

Step 4 Enter the appropriate information.

Table 3-19 Create Trap Dialog Box 

Field
Description

Community

The community string of the alarm community string set in the NAM MIB Thresholds.

IP Address

The IP address to which the trap is sent if the alarm and trap community strings match.

UDP Port

The UDP port number.


Step 5 Click Submit to save your changes, or click Reset to cancel and leave the configuration unchanged.


Editing a NAM Trap Destination

To edit a NAM trap destination:


Step 1 Choose Setup > Alarms.

The Thresholds table displays

Step 2 In the contents, click NAM Traps.

The Traps dialog box displays.

Step 3 Select the trap to edit, then click Edit.

The Edit Trap dialog box displays.

Step 4 Make the necessary changes.

Step 5 Click Submit to save your changes, or click Reset to remove any entry.


Deleting a NAM Trap Destination

To delete an existing trap, simply select it from the Traps table, then click Delete.

Setting NAM Alarm Mail


Note NAM alarm mail is sent as a result of NAM alarms, not router or switch alarms.


You can configure the NAM to send e-mail to one or more addresses in the case of a NAM alarm. To configure e-mail alarms:


Step 1 Choose Setup > Alarms.

Step 2 From the content menu, click NAM Alarm Mail.

The Alarm Mail Configuration dialog box displays.

Step 3 In the Mail Alarm to field, enter one or more e-mail addresses to receive the NAM alarm mail.

Use an e-mail address such as jdoe@cisco.com. Use a space to separate multiple e-mail addresses.


Setting Global Preferences

Global preferences settings apply to all users of the NAM and determine how data displays are formatted. To set up global preferences.


Step 1 Choose Setup > Preferences.

The Preferences Dialog Box (Figure 3-30) displays.

Figure 3-30 Preferences Dialog Box

Step 2 Enter or change the information described in the Preferences Dialog Box (Table 3-20).

Table 3-20 Preferences Dialog Box 

Field
Description
Usage Notes

Entries Per Screen

The number of rows to display in tabular screens.

Enter a number from 1 to 100. The default is 15.

Refresh Interval

The number of seconds between monitor display refreshes.

Enter a number from 15 to 3600. The default is 60.

Number Graph Bars

The number of graph bars to display in TopN displays and charts.

Enter a number from 1 to 15. The default is 10.

Perform IP Host Name Resolution

Display DNS names, if available.

Select to enable or deselect to disable. Enabled by default.

Note Enabling IP host name resolution without configuring nameservers might result in slow response times.

Data Displayed in

Option to display data in bits or bytes.

Select Bytes or Bits. Default is bytes.

Format Large Numbers

Display large integer values in appropriate units with prefixes such as Kilo (K), Mega (M), Giga (G) and Tera (T.)

Check box to format large numbers. If this box is unchecked, large numbers are not formatted. The default is unchecked.

International Notation

You have the option to print numbers in the following format:

1,025.72

1.025,72

1 025,72

Default is 1,025.72

CSV Export Monitor Entries

Provides the option to CSVexport all entries in a particular monitor table or just the current entries displayed on a particular window.

Default is Current Window Only.

Audit Trail

Check the check box to enable or disable the audit trail.

Enables the recording of critical user activities to an internal log file. By default, the audit trail is enabled.

See also:

Viewing the Audit Trail, page 2-19, for information about audit trail entries

Setting Up the NAM Syslog, for information about setting up remote file storage

ESP-Null Heuristic

Enables NAM to detect ESP-null encryption and parse content as described in Internet RFC 2410.

Enabling ESP-Null Heuristic forces the NAM to check all packets with an ESP header to see if it could be using Null encryption. The ESP-Null Heuristic feature adds processing overhead, so it is disabled by default.

Capture File Download Format

Check ENC or PCAP.

 

Step 3 Click Apply to save your changes, or click Reset to cancel.