Cisco Prime Network Control System Configuration Guide, Release 1.0
Chapter 17: Tools
Downloads: This chapterpdf (PDF - 198.0KB) The complete bookPDF (PDF - 49.62MB) | Feedback

Tools

Table Of Contents

Tools

Information About Tools

Voice Audit

Location Accuracy Tool

Running Voice Audits

Running Voice Audits on Controllers

Choosing Voice Audit Rules

Voice Audit Report Details

Voice Audit Report Results

Configuring Location Accuracy Tool

Enabling the Location Accuracy Tool

Viewing Currently Scheduled Accuracy Tests

Viewing Accuracy Test Details

Using Scheduled Accuracy Testing to Verify Accuracy of Current Location

Using On-demand Accuracy Testing to Test Location Accuracy

Configuring Audit Summary

Configuring Migration Analysis

Upgrading Autonomous Access Points

Changing Station Role to Root Mode

Running Migration Analysis

Generating the Migration Analysis Report

Viewing a Firmware Upgrade Report

Changing Station Role to Root Mode

Viewing a Role Change Report

Running Migration Analysis

Viewing a Migration Analysis Report

Configuring TAC Case Attachments


Tools


The Tools menu provides access to the Voice Audit, Location Accuracy Tool, Configuration Audit Summary, and Migration Analysis features of Cisco NCS. This chapter contains the following sections:

Information About Tools

Running Voice Audits

Configuring Location Accuracy Tool

Configuring Audit Summary

Configuring Migration Analysis

Configuring TAC Case Attachments

Information About Tools

The Tools menu provides access to the Voice Audit, Location Accuracy Tool, Configuration Audit Summary, and Migration Analysis features of NCS.

Voice Audit

NCS provides an auditing mechanism to check the controller configuration and to ensure that any deviations from the deployment guidelines are highlighted as an Audit Violation.

To access the Voice Audit feature, choose Tools > Voice Audit.

The NCS Voice Audit has three tabs: Controllers, Rules, Reports.

The Controllers tab allows you to choose the controller(s) on which to run the voice audit.

The Rules tab allows you to indicate the applicable VoWLAN SSID and the applicable rules for this voice audit.

The Voice Audit Report provides a summary of the voice audit details and report results.

Voice Audit Report Details

Voice Audit Report Results

Location Accuracy Tool

By verifying for location accuracy, you are ensuring that the existing access point deployment can estimate the true location of an element within 10 meters at least 90% of the time.

You can analyze the location accuracy of non-rogue and rogue clients, interferers, and asset tags by using the Accuracy Tool.

There are two methods of conducting location accuracy testing:

Scheduled Accuracy Testing—Employed when clients, tags, and interferers are already deployed and associated to the wireless LAN infrastructure. Scheduled tests can be configured and saved when clients, tags, and interferers are already pre-positioned so that the test can be run on a regularly scheduled basis.

On demand Accuracy Testing—Employed when elements are associated but not pre-positioned. On demand testing allows you to test the location accuracy of clients, tags, and interferers at a number of different locations. It is generally used to test the location accuracy for a small number of clients, tags, and interferers.

The Accuracy Tool enables you to run either a scheduled or on-demand location accuracy test. Both tests are configured and executed through a single page.

Running Voice Audits

To access the Voice Audit feature, choose Tools > Voice Audit.

This section provides the following information:

Running Voice Audits on Controllers

Choosing Voice Audit Rules

Running Voice Audits on Controllers

The Controllers tab allows you to choose the controller(s) on which to run the voice audit.


Note You can run the voice audit on a maximum of 50 controllers in a single operation.


To select the controller(s) for the voice audit, follow these steps:


Step 1 Choose Tools > Voice Audit.

Step 2 Click the Controllers tab.

Step 3 From the Run audit on drop-down list, select from All Controllers, a Floor Area, or a Single Controller.

All Controllers—No additional Controller information necessary.

A Floor Area—From the drop-down lists, select the applicable Campus, Building, Floor, and Controller.

A Single Controller—Select the applicable controller from the drop-down list.

Step 4 Click the Rules tab to determine the rules for this voice audit. See the "Choosing Voice Audit Rules" section for more information.


Choosing Voice Audit Rules

The Rules tab allows you to indicate the applicable VoWLAN SSID and the applicable rules for this voice audit.

To indicate the rules for the voice audit, follow these steps:


Step 1 In the Tools > Voice Audit page, click the Rules tab.

Step 2 Type the applicable VoWLAN SSID in the VoWLAN SSID text box.

Step 3 From the Rules List, select the check boxes of the applicable rules for this voice audit (see Table 17-1).


Note The red circle indicates an invalid rule (due to insufficient data). The green circle indicates a valid rule.


Table 17-1 Rules List for Voice Audit 

Rule
Rule Details

VoWLAN SSID

Description—Checks whether or not the VoWLAN SSID exists.

Rule validity—User defined VoWLAN SSID.

CAC: 7920

Description—Checks whether or not 7920 AP CAC is enabled for VoWLAN.

Rule validity—User defined VoWLAN SSID.

CAC: 7920 Clients

Description—Checks whether or not the 7920 Client CAC is disabled for VoWLAN.

Rule validity—User defined VoWLAN SSID.

DHCP Assignment

Description—Checks whether or not DHCP assignment is disabled for VoWLAN.

Rule validity—User defined VoWLAN SSID.

MFP Client

Description—Checks whether or not MFP Client protection is not set to Required for VoWLAN.

Rule validity—User defined VoWLAN SSID.

Platinum QoS

Description—Checks whether or not QoS is set to Platinum (Voice) for VoWLAN.

Rule validity—User defined VoWLAN SSID.

Non Platinum QoS

Description—Checks that QoS is not set to Platinum for non-VoWLAN.

Rule validity—User defined VoWLAN SSID.

WMM

Description—Checks whether or not WMM is enabled for VoWLAN.

Rule data—Select Allowed or Required from the drop-down list.

Rule validity—User defined VoWLAN SSID.

CCKM

Description—Checks whether or not CCKM is enabled for VoWLAN.

Rule validity—User defined VoWLAN SSID.

ACM

Description—Checks whether or not Admission Control is enabled.

Rule data—Select the check box for 802.11a/n ACM, 802.11b/g/n ACM, or both.

Rule validity—At least one band must be selected.

DTPC

Description—Checks whether or not Dynamic Transmit Power Control is enabled.

Rule data—Select the check box for 802.11a/n DTPC, 802.11b/g/n DTPC, or both.

Rule validity—At least one band must be selected.

Expedited Bandwidth

Description—Checks whether or not Expedited Bandwidth is enabled.

Rule data—Select the check box for 802.11a/n Expedited Bandwidth, 802.11b/g/n Expedited Bandwidth, or both.

Rule validity—At least one band must be selected.

Load Based CAC

Description—Checks whether or not Load Based Admission Control (CAC) is enabled.

Rule data—Select the check box for 802.11a/n Load Based CAC, 802.11b/g/n Load Based CAC, or both.

Rule validity—At least one band must be selected.

CAC: Max Bandwidth

Description—Checks whether or not Maximum RF Bandwidth for Call Admission Control is configured properly.

Rule data—Enter percentages in the text boxes for Maximum Allowed Bandwidth for 802.11a/n and 802.11b/g/n.

Rule validity—Data for at least one band must be provided. Valid range is 0—100%.

CAC: Reserved Roaming Bandwidth

Description—Checks whether or not Reserved Roaming Bandwidth for Call Admission Control is configured properly.

Rule data—Enter percentages in the text boxes for Maximum Reserved Roaming Bandwidth for 802.11a/n and 802.11b/g/n.

Rule validity—Data for at least one band must be provided. Valid range is 0—100%.

Pico Cell mode

Description—Checks whether or not Pico Cell mode is disabled.

Rule data—Select the check boxes for 802.11a/n Pico Cell mode, 802.11b/g/n Pico Cell mode, or both.

Rule validity—At least one band must be selected.

Beacon Period

Description—Checks whether or not Beacon Period is configured properly.

Rule data—Enter the time (ms) in the text boxes for Beacon Period for 11a/n and 11b/g/n.

Rule validity—Data for at least one band must be provided. Valid range is 20—1000. Enter 0 or keep it empty if a band should not be checked.

Short Preamble

Description—Checks whether or not Short Preamble is enabled for 11b/g.

Fragmentation Threshold

Description—Checks whether or not Fragmentation Threshold is configured properly.

Rule data—Enter the threshold amount (bytes) in the text boxes for Fragmentation Threshold for 11a/n and 11b/g/n.

Rule validity—Data for at least one band must be provided. Valid range is 256—2346. Enter 0 or keep it empty if a band should not be checked.

Data Rate

Description—Checks whether or not Data Rates are configured properly.

Data Rate configuration for 11b/g—Select Disabled, Supported, or Mandatory for each Mbps category.

Data Rate configuration for 11a—Select Disabled, Supported, or Mandatory for each Mbps category.

Aggressive Load Balancing

Description—Checks whether or not Aggressive Load Balancing is disable.

QoS Profile

Description—Checks that QoS Profiles are not altered from default values.

EAP Request Timeout

Description—Checks whether or not EAP Request Timeout is configured properly.

Rule data—Enter the time limit (sec) for the EAP Request Timeout

Rule validity—Data cannot be left blank or as zero. Valid range is 1—120.

ARP Unicast

Description—Checks whether or not ARP Unicast is disabled.



Note Use the Reset button to reset the rules to the default configuration.


Step 4 When the rules are configured for this voice audit, click Save to save the current configuration or Save and Run to save the configuration and run the report.

Step 5 Click the Report tab to view the Report results. See the "Voice Audit Report Details" section for more information.


Voice Audit Report Details

The Voice Audit details provides the following information:

Audit Status—Indicates whether or not the audit is complete.

Start Time and End Times—Indicates the time at which the voice audit began and ended.

# Total Devices—Indicates the number of devices involved in the voice audit.

# Completed Devices—Indicates the number of devices the tool attempted to audit.


Note If a controller is unreachable, the audit skips it. The Voice Audit will not complete any rule checks for that controllers.


# Rules—Indicates the number of rules selected for the voice audit.

Voice Audit Report Results

The Voice Audit Report results include the following information:

IP Address—Indicates the IP Address for the controller involved in the voice audit.

Rule—Indicates the rule that was applied for this controller.

Result—Indicates the result (Skipped, Violation, Unreachable) of the applied rule.


Note If there is no mismatch between the current configuration and a rule value, no results are displayed for that rule.


Details—Defines an explanation for the rule results.


Note If the applied rule results in a Violation, the Details link provides additional information including Name, the Device Value, and the Rule Value. Hold your mouse cursor over the link to view the additional details.


Time—Provides a timestamp for the voice audit.

Configuring Location Accuracy Tool

You can analyze the location accuracy of non-rogue and rogue clients, asset tags, and interferers by using the Accuracy Tool.

There are two ways to test location accuracy:

Scheduled Accuracy Testing—Employed when clients, tags, and interferers are already deployed and associated to the wireless LAN infrastructure. Scheduled tests can be configured and saved when clients, tags, and interferers are already pre-positioned so that the test can be run on a regularly scheduled basis.

On-Demand Accuracy Testing—Employed when elements are associated but not pre-positioned. On demand testing allows you to test the location accuracy of clients, tags, and interferers at a number of different locations. It is generally used to test the location accuracy for a small number of clients, tags, and interferers.

Both are configured and executed through a single page.

This section includes the following topics:

Enabling the Location Accuracy Tool

Viewing Currently Scheduled Accuracy Tests

Viewing Accuracy Test Details

Using Scheduled Accuracy Testing to Verify Accuracy of Current Location

Using On-demand Accuracy Testing to Test Location Accuracy

Enabling the Location Accuracy Tool


Note You must enable the Advanced Debug option in Cisco NCS to use the Scheduled and On-demand location accuracy testing features. The Location Accuracy Tool does not appear as an option under the Tools menu when the Advanced Debug option is not enabled.


To enable the advanced debug option in NCS, follow these steps:


Step 1 In NCS, choose Monitor > Maps.

Step 2 Choose Properties from the Select a command drop-down list, and click Go.

Step 3 In the page that appears, select Enabled for the Advanced Debug Mode option. Click OK.


Note If Advanced Debug is already enabled, you do not need to do anything further. Click Cancel.


You can now run location accuracy tests on the mobility services engine using the Location Accuracy Tool.

Proceed to either the "Using Scheduled Accuracy Testing to Verify Accuracy of Current Location" section or "Using On-demand Accuracy Testing to Test Location Accuracy" section section.


Viewing Currently Scheduled Accuracy Tests

To view currently scheduled accuracy tests, follow these steps:


Step 1 Select Tools > Location Accuracy Tool.

Step 2 The Accuracy Tests page displays all currently scheduled accuracy tests. The page displays the following information:

Test Name—Click the Name to view details regarding this accuracy test.

Test Type

Floor or Outdoor Area—Displays the location of this test.

Status

Accuracy %


Use the Select a command drop-down list to create a new scheduled or on-demand accuracy test, to download logs for last run, to download all logs, or to delete a current accuracy test.


Note You can download logs for accuracy tests from the Accuracy Tests summary page. To do so, check the listed test check box and select either Download Logs or Download Logs for Last Run from the Select a command drop-down list. Click Go.

The Download Logs option downloads the logs for all accuracy tests for the selected test(s).

The Download Logs for Last Run option downloads logs for only the most recent test run for the selected test(s).

Viewing Accuracy Test Details

To view details regarding a current accuracy test, follow these steps:


Step 1 Select Tools > Location Accuracy Tool.

Step 2 Click the name of the accuracy test for which you want to access details.

From the Accuracy Test Details page, you can position test points or delete the accuracy test.

Step 3 Click Cancel to return to the Accuracy Test overview page.


Using Scheduled Accuracy Testing to Verify Accuracy of Current Location

To configure a scheduled accuracy test, follow these steps:


Step 1 Click Tools > Location Accuracy Tool.

Step 2 Select New Scheduled Accuracy Test from the Select a command drop-down list.

Step 3 Enter a Test Name.

Step 4 Select the Area Type from the drop-down list.

Step 5 Campus is configured as Root Area, by default. There is no need to change this setting.

Step 6 Select the Building from the drop-down list.

Step 7 Select the Floor from the drop-down list.

Step 8 Select the begin and end time of the test by entering the days, hours and minutes. Hours are entered using a 24-hour clock.


Note When entering the test start time, be sure to allow enough time prior to the test start to position testpoints on the map.


Step 9 Test results are viewed at the Accuracy Tests > Results page. Reports are in PDF format.


Note If you select the email option, a SMTP Mail Server must first be defined for the target email address. Click Administrator > Settings > Mail Server to enter the appropriate information.


Step 10 Click Position Testpoints. The floor map appears with a list of all clients, tags, and interferers on that floor with their MAC addresses.

Step 11 Click the check box next to each client, tag and interferer for which you want to check the location accuracy.

When you check a MAC address check box, two icons appear on the map. One icon represents the actual location and the other represents the reported location.


Note To enter a MAC address for a client or tag or interferer that is not listed, check the Add New MAC check box, enter the MAC address, and click Go. An icon for the element appears on the map. If the newly added element is on the location server but on a different floor, the icon is displayed in the left-most corner (0,0 position).


Step 12 If the actual location for an element is not the same as the reported location, drag the actual location icon for that element to the correct position on the map. Only the actual location icon can be dragged.

Step 13 Click Save when all elements are positioned. A pane appears confirming successful accuracy testing.

Step 14 Click OK to close the confirmation pane. You are returned to the Accuracy Tests summary page.


Note The accuracy test status displays as Scheduled when the test is about to execute. A status of Running displays when the test is in process and Idle when the test is complete. A Failure status appears when the test is not successful.


Step 15 To view the results of the location accuracy test, click the test name and then select the Results tab on the page that displays.

Step 16 At the Results pane, click the Download link under the Saved Report heading to view the report.

The Scheduled Location Accuracy Report includes the following information:

A summary location accuracy report that details the percentage of elements that fell within various error ranges.

An error distance histogram.

A cumulative error distribution graph.

An error distance over time graph.

A summary by each MAC address whose location accuracy was tested noting its actual location, error distance and a map showing its spatial accuracy (actual vs. calculated location) and error distance over time for each MAC.


Using On-demand Accuracy Testing to Test Location Accuracy

An On demand Accuracy Test is run when elements are associated but not pre-positioned. On demand testing allows you to test the location accuracy of clients, tags, and interferers at a number of different locations. It is generally used to test the location accuracy for a small number of clients, tags, and interferers.

To run an On-demand Accuracy Test, follow these steps:


Step 1 Click Tools > Location Accuracy Tool.

Step 2 From the Select a command drop-down list, choose New On demand Accuracy Test.

Step 3 Enter a Test Name.

Step 4 Select the Area Type from the drop-down list.

Step 5 Campus is configured as Root Area, by default. There is no need to change this setting.

Step 6 Select the Building from the drop-down list.

Step 7 Select the Floor from the drop-down list.

Step 8 Select the Destination point for the test results. Test results are viewed at the Accuracy Tests > Results page. Reports are in a PDF.

Step 9 Click Position Testpoints. The floor map appears with a red crosshair at the (0,0) coordinate.

Step 10 To test the location accuracy and RSSI of a particular location, select either client or tag or interferer from the drop-down list on the left. A list of all MAC addresses for the selected option (client or tag or interferer) displays in a drop-down list to its right.

Step 11 Select a MAC address from the drop-down list and move the red cross hair to a map location and click the mouse to place it.

Step 12 From the Zoom percentage drop-down list, choose the zoom percentage for the map.

The X and Y text boxes are populated with the coordinates based on the position of the red cross hair in the map.

Step 13 Click Start to begin collection of accuracy data.

Step 14 Click Stop to finish collection. You should allow the test to run for at least two minutes before clicking Stop.

Step 15 Repeat Step 11 to Step 14 for each testpoint that you want to plot on the map.

Step 16 Click Analyze Results when you are finished mapping the testpoints.

Step 17 Click the Results tab on the pane that appears.

The On-demand Accuracy Report includes the following information:

A summary location accuracy report that details the percentage of elements that fell within various error ranges.

An error distance histogram

A cumulative error distribution graph


Configuring Audit Summary

Choose Tools > Config Audit to launch the Configuration Audit Summary page (see Figure 17-1).

Figure 17-1 Tools > Config Audit Summary Page

This page provides a summary of the following:

Total Enforced Config Groups—Identifies the count of config group templates which are configured for Background Audit and enforcement enabled.

Click the link to launch the Config Group page to view config groups with Enforce Configuration enabled.

Total Mismatched Controllers—Identifies the number of mismatched controllers. Mismatched controllers indicate that there were configuration differences found between the NCS and the controller during the last audit.

Click the link to launch the controller list sorted on the mismatched audit status column. Click an item in the Audit Status column to view the audit report for this controller.

Total Config Audit Alarms—Identifies the number of alarms generated when audit discrepancies are enforced on config groups.

Click the link to view all config audit alarm details.


Note If enforcement fails, a critical alarm is generated on the config group. If enforcement succeeds, a minor alarm is generated on the config group. The alarms have links to the audit report where you can view list of discrepancies for each controller.


Most recent 5 audit alarms—Lists the most recent configuration audit alarms including the object name, event type, and date and time for the audit alarm.

Click <View All> to view the applicable Alarm page which includes all configuration audit alarms.

Configuring Migration Analysis

Choose Tools > Migration Analysis to launch the Configuration Migration Analysis Summary page.


Note You can also access the migration analysis summary by choosing Configure > Migration Templates and selecting View Migration Analysis Summary from the Select a command drop-down list.


The autonomous access points are eligible for migration only if all the criteria has a pass status. A red X designates ineligibility, and a green check mark designates eligibility. These columns represent the following:

Privilege 15 Criteria—The Telnet credential provided as part of the autonomous access point discovery must be privilege 15.

Software Version—Conversion is supported only from 12.3(7)JA releases excluding 12.3(11)JA, 12.3(11)JA1, 12.3(11)JA2, and 12.3(11)JA3.

Role Criteria—A wired connection between the access point and controller is required to send the association request; therefore, the following autonomous access point roles are required:

root

root access point

root fallback repeater

root fallback shutdown

root access point only

Radio Criteria—In dual-radio access points, the conversion can happen even if only one radio is of the supported type.

Upgrading Autonomous Access Points

You can choose to upgrade the autonomous access points manually or automatically. From the Migration Analysis page, you can select the access point with the software version listed as failed and choose Upgrade Firmware (Manual or Automatic) from the Select a command drop-down list. This process upgrades the autonomous firmware image of the Cisco IOS access point to a supported version.

NCS uses a Telnet-based connection to upgrade the access point firmware. If you choose the automatic option, the internal TFTP server is used with the default images present in NCS. The default images as per device type are as follows:

ap801-k9w7-tar.124-10b.JA3.tar

ap802-k9w7-tar

c1100-k9w7-tar.123-7.JA5.tar

c1130-k9w7-tar.123-7.JA5.tar

c1200-k9w7-tar.123-7.JA5.tar

c1240-k9w7-tar.12307.JA5.tar

c1250-k9w7-tar.124-10b.JA3.tar

c1310-k9w7-tar.123-7.JA5.tar

If you choose the manual option, an additional screen with TFTP server IP, file path, and file path name appears. The final page is the report page.

Changing Station Role to Root Mode

Because a wired connection between the access point and controller is required in order to send the association request, the autonomous access point must be assigned the appropriate role. If the role shows as ineligible, you can choose Change Station Role to Root Mode from the Select a command drop-down list.

Running Migration Analysis

You can choose Run Migration Analysis from the Select a command drop-down list of the Migration Analysis Summary page. The resulting migration analysis summary shows the current status of different criteria. Initially, migration analysis is run automatically when the access point is discovered.

Generating the Migration Analysis Report

You can choose View Migration Analysis Report from the Select a command drop-down list of the Migration Analysis Summary page to generate a report. The report includes the following:

Access point address

Status

Timestamp

Access point logs

Viewing a Firmware Upgrade Report

Choose View Firmware Upgrade Report from the Select a command drop-down list to view a current report of the upgrade status for the selected access point.

The following information displays:

AP Address—IP address of the access point.

Status—Current status of the firmware upgrade.

TimeStamp—Indicates the date and time of the upgrade.

AP Logs

Click OK to return to the Migration Analysis Summary page.

See the "Upgrading Autonomous Access Points" section for more information.

Changing Station Role to Root Mode

Because a wired connection between the access point and controller is required to send the association request, the autonomous access point must be assigned the appropriate role. If the role shows as ineligible, you can choose Change Station Role to Root Mode from the Select a command drop-down list.

Viewing a Role Change Report

Because a wired connection between the access point and controller is required to send the association request, the autonomous access point must be assigned the appropriate role.

To view a report of these role changes, choose View Role Change Report from the Select a command drop-down list. The following information displays:

AP Address—IP address of the access point.

Status—Current status of the role change.

TimeStamp—Indicates the date and time of the upgrade.

AP Logs

Click OK to return to the Migration Analysis Summary page.

Running Migration Analysis

You can choose Run Migration Analysis from the Select a command drop-down list of the Migration Analysis Summary page. The resulting migration analysis summary shows the current status of different criteria. Initially, migration analysis is run automatically when the access point is discovered.

Viewing a Migration Analysis Report

You can choose View Migration Analysis Report from the Select a command drop-down list of the Migration Analysis Summary page to generate a report. The report includes the following:

Access point address

Status

Timestamp

Access point logs

Configuring TAC Case Attachments


Note You must configure a valid mail server before configuring TAC case attachments.


TAC Case Attachment tool helps you easily attach all the relevant controller TAC cases information in one shot. This tool provides two options:

Send— Sends an email to attach@cisco.com.

Download— Downloads the information to a local computer. You have to manually email the data to attach@cisco.com. This option will be handy if there are no email connectivity between NCS server and Cisco system or if the information is too big to be attached through email.

This tool sends the following information:

Network Information—Sends device inventory details and the client types.

Controller Information—Sends running configurationdetails, tech-support, message logs, trap logs, controller crash files.

Access Point Information—Sends crash files and radio core-dumps.

To Send or Download information, you have to enter the follwoing details:

Enter a Valid TAC Case Number.

Select a controller if you want to send the controller or AP information.


Note You can also send additional infomration using the additional comments text box. After sending the information you can verify whether the data has reached Cisco by looking at the attachment section in Case tool.



Note This tool requires read-write access on the controller to collect and upload Controller or Access Point information