This document describes the procedure to update the StarOS Control-Function (CF) device password in the Element Manager (EM) configuration.
Operators may have to update the VNF passwords on a regular basis for security reasons. If the password of the StarOS CF and password set in EM are inconsistent, you must see this alarm on EM that tries to connect to the CF device.
Cisco recommends that you have knowledge of these topics:
The information in this document is based on these software and hardware versions:
StarOS : 21.10.0 (70597)
Cloud - CVIM 2.4.17
Note: If the operator also uses AutoVNF, they need to update the AutoVNF configuration as well. This is helpful in re-deployment of VNF when you wish to continue with the same password.
The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, ensure that you understand the potential impact of any command.
2. Verify if the alarm connection-failure alarm is due to Bad password.
# /opt/cisco/usp/packages/nso/ncs-4.1.1/bin/ncs_cli -u admin -C
admin@scm# devices device cpod-vpc-cpod-mme-cf-nc connect
info Failed to authenticate towards device cpod-vpc-cpod-mme-cf-nc: Bad password for local/remote user admin/admin
admin@scm# *** ALARM connection-failure: Failed to authenticate towards device cpod-vpc-cpod-mme-cf-nc: Bad password for local/remote user admin/admin
Alarm details can be verified through show alarms command:
admin@scm# show alarms alarms summary indeterminates 0 alarms summary criticals 0 alarms summary majors 0 alarms summary minors 0 alarms summary warnings 0 alarms alarm-list number-of-alarms 1 alarms alarm-list last-changed 2020-03-22T16:27:52.582486+00:00 alarms alarm-list alarm cpod-vpc-cpod-mme-cf-nc connection-failure /devices/device[name='cpod-vpc-cpod-mme-cf-nc'] "" is-cleared false last-status-change 2020-03-22T16:27:52.582486+00:00 last-perceived-severity major last-alarm-text "Failed to authenticate towards device cpod-vpc-cpod-mme-cf-nc: Bad password for local/remote user admin/admin " status-change 2020-03-22T16:26:38.439971+00:00 received-time 2020-03-22T16:26:38.439971+00:00 perceived-severity major alarm-text "Connected as admin" admin@scm#
3. Check if the device is in-sync with EM (ignore this step if the EM is not able to connect to the device).
admin@scm(config)# devices device cpod-vpc-cpod-mme-cf-nc check-sync result in-sync admin@scm(config)#
4. Verify the current authgroup configuration for the CF device.
6. Update the password for the authgroup (cpod-vpc-cpod-mme-cisco-staros-nc-ag) umap admin with the new password and device config password.
admin@scm(config)# devices authgroups group cpod-vpc-cpod-mme-cisco-staros-nc-ag umap admin remote-password <new-password>
7. Once the password is set, check dry-run commit to see whether the changes that are committed or not (proceed even if it doesn’t display any difference for the authgroup password change). However, ensure there are no other changes apart from the intended changes.