Understanding LMS Tasks
This section briefly describes all the LMS tasks. See the Online help for further details.
This section explains the following LMS task groups:
•Understanding Admin Tasks
•Understanding Report Tasks
•Understanding Configuration Tasks
•Understanding Monitor Tasks
•Understanding Inventory Tasks
•Understanding Work Center Tasks
Note You should enable the Browse Jobs task to schedule any job across LMS.
Understanding Admin Tasks
This section explains the following Admin task groups:
•Understanding System Tasks
•Understanding Trust Management Tasks
•Understanding Network Tasks
•Understanding Collection Tasks
•Light Weight Messaging System
Understanding System Tasks
This section explains the following System task groups:
•System Preferences/Device Management Functions
•Authentication Mode Setup
•SMTP Default Server
You can configure log rotation settings and schedule log rotation jobs.
You can configure Cisco.com Settings like:
•Proxy Server Setup
You can update the proxy server configuration.
–Apply Proxy Server Settings:
You can set up the proxy server details.
–Remove Proxy Server Settings:
You can remove the proxy server settings that are already set up.
•Cisco.com User Account Setup
You can add and modify Cisco.com user login names and password.
You can register your software and obtain a product license.
This section explains the following Software Center task groups:
•Schedule Device Downloads
You can schedule device package downloads and specify the time, frequency of the downloads, and specify download policies if you have permissions.
You can view a list of all Cisco Prime related devices packages on your system, and the count of devices supported. The source location could be Cisco.com or the Server Side Directory.
–Check For Updates
You can check for new device updates.
–Delete Device Packages
You can delete packages that are outdated or no longer used.
You can perform the following tasks:
You can download the selected updates from Software Center.
You can select new software packages to update the product.
This section explains the following Debug Settings tasks:
•Layer2 Configuration/Reports and User Tracking Debug Options
You can configure the debug options for Layer2 Configuration and Reports and User Tracking.
•Config and Image Management debugging settings
–Loglevel Settings - Defaults/Apply
You can set different logging levels such as Fatal, Error, Warn, Info, or Debug for individual Config and Image Management packages.
•IPSLA Debugging Settings
You can view, set or reset the log levels for all the modules of IPSLA Performance Management.
•VRF Lite Debug Settings
You can set debugging options for:
–VRF Lite Server
–VRF Lite Collector
–VRF Lite Client
–VRF Lite Utility
•Common Services Log Configurations
You can enable or disable the debugging option for Common Services components without restarting the services.
•Fault Debugging Settings
You can change the logging level of all the functional modules of Fault Management.
•Performance Debugging Settings
You can configure and manage log level settings of Device Performance Management function of LMS.
System Preferences/Device Management Functions
You can configure system-wide information on the LMS Server.
You can also enable or disable LMS functions like:
•Inventory, Config and Image Management
•Network Topology, Layer 2 Services and User Tracking
•IPSLA Performance Management
•Device Performance Management
This section explains the following User Management tasks:
•Local User Setup
You can modify a local user in LMS Server, assign roles, and specify the authorization type.
You can delete a local user profile from the LMS Server.
–Modify My Profile
You can modify your local user profile in LMS Server.
You can add a local user in LMS Server.
You can import local users from the client or from ACS. You can import local users from ACS only through CLI and not from the UI.
You can export the local users.
You can broadcast messages to online users.
•Local User Policy Setup
You can setup username and password policies for Cisco Prime local users in LMS.
•Role Management Setup
The Role Management tasks are listed below:
You can delete user-defined roles.
You can add user-defined roles.
You can edit user-defined roles.
–Import/ Export Roles
You can import roles in the XML format from the client.You can export roles in the XML format. The file will be saved in the client.
You can use this option to copy a role.
You can set a role as a default role. When multiple roles are set as default role, the user will be assigned with all the roles selected as default roles.
This section explains the following Server Monitoring task groups:
You can start the Cisco Prime processes.
You can stop the Cisco Prime processes.
•Collect Server Information
–Create Collect Server Information
You can get the required information about the server.
This includes system information, environment, configuration, logs, web server information, device and credentials administration information, and grouping services information.
–Delete Collect Server Information
You can delete the collected server information.
You can configure disk space threshold level.
You can view self test reports to test some basic functions of the server.
–Create Self test
You can test the basic functions of server.
–Delete Self test
You can delete the collected self test information.
You can run the DBReader utility from a Cisco Prime client to access the database and troubleshoot database issues.
The Groups feature helps you to group devices managed by LMS. It helps to create, manage and share groups of devices. This section explains the following Group Management task groups:
You can delete a group from the Group Selector.
When you delete a group, all the child groups under the group are also deleted. You can also delete the stale groups (groups that are belonging to users removed from Cisco Prime).
You can modify some of the device groups.
You can export a selected group or all user-defined groups from all applications, to an output file.
You can recompute the membership of a group by re-evaluating the group's rule. The membership of Automatic groups is recomputed dynamically.
You can create device groups.
You can import user-defined device groups from an input XML file.
You can view the details of a group.
Authentication Mode Setup
You can use your current authentication database for Cisco Prime authentication and select a login module (Kerberos, TACACS+, RADIUS, and others), and set their options.
Allows you to backup the database regularly. It also lets you schedule immediate, daily, weekly, or monthly automatic database backups.
SMTP Default Server
You can specify the default SMTP server.
Understanding Trust Management Tasks
This section explains the following Trust Management task groups:
You can perform the following multi-server management tasks:
•Peer Server Certificate Setup
You can add the certificate of another LMS Server into its trusted store. This allows LMS Servers to communicate with one another using SSL.
–Delete Peer Certificate
You can delete the peer certificate.
–View Peer Certificate
You can view the details of an existing peer certificate.
–Add Peer Certificate
You can add the certificate of a peer LMS Server into its trusted store.
•System Identity Setup
You can setup a System Identity user on servers that are part of a multi-server setup. This user enables communication among servers that are part of a domain.
•Peer Server Account Setup
You can create users who can log into LMS Servers and perform certain tasks.
–Peer Server Accounts Delete
You can delete a secret user set up in the LMS Servers.
–Peer Server Accounts Add
You can add a secret user who can programmatically login to multiple LMS Servers and perform certain tasks.
–Peer Server Accounts Edit
You can edit a secret user setup in the LMS Servers.
•Single Sign-On Setup
You can use your browser session to transparently navigate to multiple LMS Servers without authenticating to each server.
• Certificate Setup
You can create a self-signed certificate from the user interface.
•Browser-Server Security Mode Setup
You can enable browser-server security.
Understanding Network Tasks
This section explains the following Network task groups:
•Best Practices Deviation Settings
•Notification and Action Settings
•PSIRT/EOS and EOL Settings
•Software Image Management
•Configuration Job Settings
•Device Credential Settings
•Change Audit Settings
Best Practices Deviation Settings
You can customize the Discrepancies Report and Best Practices Deviations Report to display only those discrepancies and Best Practice Deviations about which you want to be notified.
This section explains the following Monitor and Troubleshoot tasks:
You can view, add, edit, or delete the NAM configuration details.
You can load a MIB file.
You can enable RMON on all ports in selected devices.
•Fault Poller settings for topology
You can configure fault poller settings for Topology.
Notification and Action Settings
This section explains the following Notification and Action Settings tasks:
•Performance - Syslog notification
You can update, create, edit, or delete a syslog receiver group.
•IPSLA Syslog Configuration
You can view, enable or disable IPSLA syslog configuration.
•Performance - SNMP Trap notification
You can create, edit, or delete a trap receiver group.
•Fault Syslog Notification
You can add, edit, suspend, resume, or delete a syslog notification subscription.
•Fault - SNMP trap notification
You can add, edit, suspend, resume, or delete an SNMP trap notification subscription.
•ChangeAudit Automated Actions
You can define automated actions on creation of change audit record. You can create, edit, delete, enable, disable, export, or import an automated action.
You can configure a set of events that you want to monitor.
•Fault - SNMP trap forwarding
You can forward SNMP traps from devices in the LMS inventory
•Fault - SNMP trap receiving settings
You can update SNMP trap receiving port.
•Fault - Email notification
You can add, edit, suspend, or resume a subscription for e-mail notification.
You can also delete e-mail notification subscriptions that are no longer useful or are redundant.
•Syslog Message Filters
You can create, edit, delete, enable, disable, export, or import syslog message filter.
•Fault Notification Customization
You can customize names and event severity.
•Fault - Email subject customization
You can customize the e-mail subject for forwarded events.
•Inventory and Config collection failure notification
You can configure the destination server and port to receive trap notification on inventory collection or config fetch failure.
•Syslog Automated Actions
You can create, edit, delete, enable, disable, export, or import a syslog automated action.
•Fault Notification Group
You can add, edit, or delete fault notification groups.
PSIRT/EOS and EOL Settings
This section explains the following PSIRT/EOS and EOL Settings task:
•PSIRT/EOX reports option
You can use the PSIRT/EOX Reports option to change the data source for generating a PSIRT or End-of-Sale or End-of-Life report.
This section explains the following Discovery Settings tasks:
–View Discovery Settings
You can view the summary of device discovery settings.
–Configure Discovery Settings
You can configure the settings required to run a discovery job.
You can view the status of device discovery.
–Start Stop Discovery
You can also start or stop a device discovery.
You can add a device discovery schedule.
This section explains the following Purge Settings tasks:
•Config Job purge settings
You can configure the following config job settings:
–Job Purge - Schedule/Enable/Disable/Purge Now
You can schedule, enable, or disable purging of configuration management jobs.
You can also immediately purge the jobs.
You can purge the config jobs.
•Syslog Backup Settings
You can set the syslog backup policy.
•IPSLA data Purge Settings
You can set the purge period for IPSLA historical data and for audit reports. You can configure the following IPSLA data Purge settings:
–Apply IPSLA Purge Settings
You can apply IPSLA purge settings.
–IPSLA Purge Settings
You can view IPSLA purge settings
–Default IPSLA Purge Settings
You can apply default IPSLA purge settings.
•Syslog Force Purge
You can perform a forced purge of syslog messages
•Performance Job Purge Settings
You can configure the following performance Job purge settings:
–Do Immediate Job Purge
You can immediately purge the performance jobs.
–Schedule Job Purge
You can schedule a performance job purge.
•Fault History Purging Schedule
Configure the daily fault history purging schedule.
•VRF Lite Purge Settings
You can purge VRF Lite jobs or report archives.
•ChangeAudit Force Purge
You can perform a forced purge of change audit.
•Config Archive Purge Settings
You can define the configuration archive purge policy.
•ChangeAudit Purge Policy
You can set the change audit purge policy.
•Performance data purge settings
You can configure the following performance data purge settings:
–Do Immediate Data Purge
You can immediately purge the performance data .
–Schedule Data Purge
You can schedule a performance data purge.
•Syslog Purge Settings
You can specify a default policy for the periodic purging of syslog messages.
•Layer2 Services and User Tracking Report Purge
You can purge Layer2 services jobs or report archives.
Software Image Management
This section explains the following Software Image Management task:
You can set or change software management preferences
Configuration Job Settings
This section explains the following Configuration Job Settings tasks:
•Assign Approver Lists
You can assign an approver list to the applications
•Create/Edit Approver Lists
You can create, edit, or delete approver lists
You can specify approver details
You can set up job approval for the applications
•Config Job Policies
You can define the default job policies for configuration management applications
Device Credential Settings
This section explains the following Device Credential Settings tasks:
•User Defined Fields
You can add, rename, or delete the user-defined fields used to store additional information about a device.
–Register/Unregister 3rd Party Application in DCR
You can register or unregister third party applications in DCR.
–Add User Defined Fields in DCR
You can add a User Defined Field to to store the additional information about a device.
–Rename User Defined Fields in DCR
You can rename a User Defined Field.
–Delete User Defined Fields from DCR
You can delete a User Defined Field.
You can change DCR mode settings to master, slave or standalone.
You can select the credentials that need to be verified while adding devices.
Change Audit Settings
This section explains the following Network Administration tasks:
•Inventory Change Filter
You can set inventory change filters.
You can specify the time when no network changes should occur.
This section explains the following Resource Browser tasks:
You can view the details of resources and manage resources.
You can free-up locked resources.
Understanding Collection Tasks
This section explains the following Collection task groups:
•Inventory Collection Settings
•Config Collection Settings
•Data Collection Settings
•Syslog Collection Settings
•Performance Collection Settings
•User Tracking Collection Settings
•Fault Collection Settings
•VRF Lite Collection Settings
Inventory Collection Settings
You can set the default values for inventory, config timeout, and retry settings. This section explains the following Inventory Collection Settings tasks:
You can view the Inventory job browser, and view, create, stop, delete, or edit an inventory collection or polling job.
•Inventory, Config Timeout and Retry Settings
You can edit the inventory, config timeout, and retry settings.
Config Collection Settings
This section explains the following Config Collection Settings tasks:
•Config Archive settings
You can configure the Config Archive settings. You can move the configuration archive location, archive the running configuration, or enable or disable the use of shadow directory.
•Config Collection Settings
You can define the configuration collection setting. You can modify how and when the configuration archive retrieves configurations.
•Secondary Credentials Settings
You can enable or disable the secondary credentials fallback.
•Config Transport Settings
You can view or define the protocol order for configuration management applications
•Config Job Timeout Settings
You can configure the Job Result Wait Time per device for the Sync Archive jobs.
Data Collection Settings
This section explains the following Data Collection Settings tasks:
•Data Collection schedule
You can schedule the day and time of Data Collection.
•Start Data Collection
You can start Data Collection.
•Layer2 Administration Settings
You can configure Layer2 administration settings.
Syslog Collection Settings
This section explains the following Syslog collection tasks:
You can subscribe or subscribe to a Common Syslog Collector.
You can view the status of the Common Syslog Collector to which the Syslog Analyzer is subscribed to.
Performance Collection Settings
This section explains the following Performance collection tasks:
•IPSLA application settings
You can configure the following IPSLA application settings:
–Copy IPSLA Configuration to Running-config
You can view the configured collectors in the running configuration. You can also retain the default settings.
–Set a source interface address
You can set a source interface address for the source router. You can also retain the default settings.
•Performance Management SNMP timeouts and retry settings
You can configure the Performance Management SNMP timeout and SNMP retries. You can also configure other Poll Settings.
User Tracking Collection Settings
This section explains the following User Tracking collection tasks:
•User Tracking device trap configuration
You can configure the Cisco switches for sending SNMPv1/SNMPv2 MAC Notification Traps when a host is connected to or disconnected from that port.
•User Tracking Acquisition Action
You can trigger the following acquisitions:
–Device based Acquisition
–Subnet based Acquisition
–IP Phone Acquisition
•User Tracking trap listener configuration
You can configure the trap listener to direct the traps through HP Open View (HPOV) or LMS Fault Monitor.
•User Tracking Acquisition Settings
You can configure User Tracking Acquisition settings to collect usernames during UT Major Acquisition and update the UT table.
•User Tracking Acquisition Schedule
You can modify UT acquisition schedule.
•User Tracking Administration Settings
You can configure the various User Tracking administration settings.
Fault Collection Settings
This section explains the following Fault collection tasks:
•Fault Management Rediscovery Schedule
You can suspend, or resume the Fault Management rediscovery schedule, and add, modify, or delete additional schedules.
•Fault Monitoring Device Administration
You can rediscover specific devices.
•Fault Management SNMP timeouts and retries
You can modify the Fault Management SNMP timeout and retries.
•Collection Summary Portlet
You can view the report of successful and failed devices for fault discovery in this portlet.
•Fault Event Forensics Configuration
You can enable the Event Forensics collection feature on LMS server to start collecting the event forensics data.
VRF Lite Collection Settings
This section explains the following VRF Lite collection tasks:
•VRF Lite SNMP Timeouts and Retries
You can modify the SNMP timeouts and retries when VRF Lite Collection fails for a particular device with SNMP timeout exceptions.
•VRF Lite Collector Schedule
You can schedule the VRF Lite Collector process to run after every Data Collection. You can also add, edit and delete VRF Lite Collector Schedule jobs.
Light Weight Messaging System
The Light Weight Messaging system allows you to perform the following task:
You can use this tool to send and receive events.
You can perform the following Job tasks:
You can use the job browser and view the details of individual jobs.
Note You should enable the Browse Jobs task to schedule any job across LMS.
You can use the job browser to delete the jobs.
You can stop the jobs using the job browser.
You can perform the Getting Started tasks.
You can manage all the portlets.
Understanding Report Tasks
This section explains the following Report task groups:
•Understanding Fault and Event Report Tasks
•Understanding Report Archives Tasks
•Understanding Report Designer Tasks
•Understanding Inventory Report Tasks
•Understanding Audit Report Tasks
•Understanding Technology Report Tasks
•Understanding Performance Report Tasks
•Understanding System Report Tasks
•Understanding Switch Port Report Tasks
•Schedule Reports in Layer2 Services and User Tracking
•User Tracking Job Archives
•Layer2 Services Job Archives
•Inventory/Syslogs/Change Audit Generate Reports
•Inventory/Syslogs/Change Audit View All Reports
•Inventory/Syslogs/Change Audit View Own Reports
Understanding Fault and Event Report Tasks
This section explains the following Fault and Event report task groups:
You can generate this report which displays threshold violations details for each device based on the polled data.
You can create reports based on the threshold configured for the MIB variable. You can create, or view reports for specific threshold MIB variables. These reports are called IPSLA Threshold Violation reports.
You can create consolidated reports based on the TrendWatches configured for the MIB variable. You can create, view summary reports of TrendWatch MIB variables.
You can generate the following Best Practices and Discrepancy reports:
You can acknowledge a Best Practice Deviation that you no longer want to see in the Best Practices.
You can also unacknowledge the acknowledged Best Practise Deviations to reappear in the Best Practise Deviations Report.
You can fix the discrepancies detected in the network.
•Fix Best Practice Deviation
You can the fix Best Practice Deviation detected in the network.
You can the fix discrepancies detected in the network.
You can view best practice deviation report.
You can use Custom Reports along with Syslogs to generate GOLD test reports.
You can also use Custom Reports along with Syslogs to generate Embedded Event Manager reports.
You can search fault history database for device issues.
You can view the fault history report for a given event ID.
•Event Monitor/ Device Fault
You can view information on events in device for the past 31 days.
Event Monitor is a centralized place where in you can view the event details of all devices and device groups.
Understanding Report Archives Tasks
This section explains the following Report Archives task groups:
•Inventory and Syslog
•Layer2 Services and User Tracking
You can manage IPSLA archived reports. You can perform the following tasks:
•List Report Archives
You can list the IPSLA report archives.
You can delete the IPSLA report archives.
Inventory and Syslog
You can view the list of the completed report jobs that you own or all report jobs.
Layer2 Services and User Tracking
You can view and delete archived Layer2 Services and User Tracking reports.
Understanding Report Designer Tasks
You can view, modify, or create new report templates for:
•Syslog and Inventory
You can view the list of Custom layouts.
You can customize the layout and columns displayed in the UT reports to suit your needs.
Syslog and Inventory
•Custom Report Template
You can create new report templates customized according to your requirements. You can also view, add and edit, delete existing custom templates, view your own templates or view all templates.
Understanding Inventory Report Tasks
You can generate inventory reports and this section explains the following Inventory Report task groups:
You can view device attributes report.
You can create, schedule, and view various UT reports like:
•End Host History
You can view the login and logout information of the endhosts
• User Tracking System and Custom Reports
You can view User Tracking system and custom reports
You can generate device credentials, device and credentials admin reports, and inventory and config Collection Status report.
•Inventory and Config Collection Status
You can generate the Inventory and Config Collection Status Report which helps you to identify possible causes for Inventory and Configuration collection failure and take timely corrective action.
Understanding Audit Report Tasks
You can generate audit reports like:
•Inventory and Config
You can generate system audit report.
You can generate performance audit report.
Inventory and Config
You can generate inventory and config audit report.
Understanding Technology Report Tasks
You can generate the following technology reports:
You can generate VLAN reports for devices, switch clouds, or VTP domains.
You can generate the following VRF Lite Reports:
•VRF Lite and VRF Lite Readiness report
You can generate Device Based VRF-Lite reports and VRF Based reports. You can also generate the VRF Lite Readiness report which provides the devices details that comply with the basic hardware and software support available, in contrast to the required support on the devices to configure VRF.
Understanding Performance Report Tasks
This section explains the following Performance Report task groups:
•Create Performance Report
•View Performance Report
•Create IPSLA Report
•View IPSLA Job Details
•View IPSLA Report
Create Performance Report
You can generate, or view performance reports like:
Displays the Interface availability information of a device during the last 24 hours. It also displays Interface utilization and error rate information for a device interface during the last 24 hours.
•IPSLA Detailed Report
You can generate various IPSLA detailed reports.
•IPSLA Summary Report
You can generate system reports for all collectors based on the report types and granularity after the consolidation of the statistical data.
•EnergyWise Device Power Usage
Displays the power usage data for each device that is polled for the EnergyWise Device Power Usage template.
•EnergyWise Port Power Usage
Displays the power usage data for each port that is polled for the EnergyWise Port Power Usage template.
•PoE Port Utilization Report
Displays the port level utilization for each device polled for the Power Over Ethernet (PoE) Port Utilization template.
•PSE Consumption report
Displays the power utilization and losses for each device polled for the Power Over Ethernet PSE Consumption template.
•IPSLA Audit report
Displays all IPSLA related audit changes that occurred in the network during a specified time period.
View Performance Report
You can view performance reports like:
•IPSLA Detailed Report
•IPSLA Summary Report
•EnergyWise Device Power Usage
•EnergyWise Port Power Usage
•PoE Port Utilization Report
•PSE Consumption report
•IPSLA Audit report
• View Poller Report
You can view Poller Reports based on the template added in a given Poller.
• Create Poller Job
You can create Poller Reports based on the template added in a given Poller.
You can view device availability and performance parameters of a device.
You can view performance parameters of a device.
Create IPSLA Report
You can create IPSLA Reports and IPSLA Threshold Violation Reports. You can also reset the values you entered.
View IPSLA Job Details
You can view details of IPSLA jobs.
View IPSLA Report
You can view IPSLA Reports, IPSLA Report Archives and IPSLA Threshold Violation Reports.
You can list and create IPSLA Audit Report.
You can create, or view custom reports.
Understanding System Report Tasks
You can generate administration and system reports. This section explains the following System task groups:
•Data Collection Metrics and Device Support
•ANI Server Analysis
Data Collection Metrics and Device Support
You can view the duration of each data collection, and the device count. You can also view the icon, name, and object ID of the supported devices.
You can view information about users currently logged into LMS.
•Who is Logged on
You can view information on users currently logged into LMS.
You can view information on roles and privileges.
ANI Server Analysis
You can analyze the ANI server performance.
You can view the status of the processes running on the LMS Server.
• Log File
You can view information on log file size and file system utilization.
You can view the status of the processes running on the LMS Server.
Understanding Switch Port Report Tasks
You can generate reports based on switch port status. This section explains the following Switch Port Report task groups:
•User Tracking Switch Port Usage
User Tracking Switch Port Usage
You can view reports on:
•Connected Ports—The ports that are administratively UP and are connected to a device will be listed here.
•Free Ports—The Ports that are administratively UP but are not connected to a device will be listed here.
•Free Down Ports—The ports that are administratively down will be listed here.
You can also view the following reports:
•Switch Port Capacity Report
Lists switches that have crossed utilization threshold limits, along with the value of percentage port utilization.
•Recently Down Ports
–Link ports that were connected to a device in the previous Data collection, but found unconnected in the current Data Collection.
–Access ports that were connected to an endhost in the last UT Major Acquisition cycle, but found unconnected in the current Data Collection
•Reclaim Unused Down Ports Report
Displays ports that have been in Unused Down state for a specified interval of time.
•Reclaim Unused Up Ports Report
Displays ports that have been in Unused Up state for a specified interval of time.
•Switch Port Summary Report
Displays the number of Connected, Free, and Free down ports in each switch.
You can view status of the ports.
You can view information about the status of ports in the network
Schedule Reports in Layer2 Services and User Tracking
You can schedule reports of the Network, Layer 2, and User Tracking function of LMS.
User Tracking Job Archives
You can view archived reports of UT jobs.
Layer2 Services Job Archives
You can view archived reports of Layer 2 services jobs.
Inventory/Syslogs/Change Audit Generate Reports
You can generate all Inventory, Syslog, and Change Audit reports.
Inventory/Syslogs/Change Audit View All Reports
You can view all Inventory, Syslog, and Change Audit reports.
Inventory/Syslogs/Change Audit View Own Reports
You can view all Inventory, Syslog, and Change Audit reports which you have generated.
Understanding Configuration Tasks
This section explains the following Configuration task groups:
•Understanding Configuration Archive Tasks
•Understanding Configuration Tools Tasks
•Understanding ConfigCLI Tasks
•Understanding Configuration Workflows Tasks
•Understanding Configuration Job Browsers Tasks
•Understanding Compliance Tasks
Understanding Configuration Archive Tasks
This section explains the following Configuration Archive tasks:
You can select configuration files from different devices, group and label them. You can manage Label Configs.
You can view the configuration archival status and summary.
You can search archives using version tree and version summary. The tasks in Views are the following:
You can create a custom configuration query that searches information about the specified configuration files.
You can search the archive for configuration containing text patterns for selected devices.
You can view all archived configurations for selected devices.
Understanding Configuration Tools Tasks
This section explains the following Configuration Tools tasks:
•Software Image Management
Software Image Management
You can view, add, delete, or update the images that are available in the Software Management repository.
You can update the software repository.
You can distribute software images in the network. You can also distribute patches simultaneously to applicable devices.
You can check the status of a scheduled Software Image Management job. You can view, edit, stop, delete, retry or undo the job.
You can analyze images before distribution.
This section explains the following NetConfig and Template Center tasks:
You can assign tasks to a valid Cisco Prime user.
•User Defined Tasks
You can create and edit user-defined tasks.
You can view all NetConfig and Template Center jobs.
You can deploy and import configuration templates in LMS. You can also create NetConfig jobs.
This section explains the following Config Editor tasks:
You can view changes made to a configuration file in the private work area.
•Edit Private Configs
You can save an edited configuration file in the private work area on the server and retrieve the saved file when required.
•Edit Public Configs
You can save an edited configuration file in the public work area on the server and retrieve the saved file when required.
•Delete Private Configs
You can remove a configuration file from the private work area on the server.
•Delete Public Configs
You can remove a configuration file from the public work area on the server.
You can view changes made to a configuration file in the public work area.
•Edit Mode Preference
You can set up the default editing mode.
You can open, edit, or print configuration files.
You can create, edit, delete, copy, or stop Config Editor jobs.
Understanding ConfigCLI Tasks
This section explains the following ConfigCLI tasks:
You can delete configurations older than a specified date from the configuration archive.
Compare With Baseline and Deploy
You can create a job that compares the given Baseline template with the latest version of the configuration for a device and download the configuration to the device if there is a non-compliance.
Lists the different versions of configuration files archived in the archival system.
Create Parameter file
You can create a parameter file if the Baseline template containing the parameters is specified.
Compare With Baseline
You can compare the given Baseline template with the latest version of the configuration for a device.
You can deploy the given Baseline template to a device.
You can reboot the devices, to load the running configuration with their startup configuration.
You can retrieve the running configuration from the devices and push it to the configuration archive if the running configuration is different than the latest version in the archive.
You can create a job that overwrites the startup configuration of device with running configuration.
Get Change Audit Data
You can get Change Audit data.
You can compare the latest running configuration for the device in the configuration archive with the configuration in the file, to generate a new configuration that is downloaded to the device, so that the configuration specified in the file is available on the running configuration of the device.
You can retrieve the configuration for a device from the archive and write it to a specific file.
You can list the difference between versions of a device configuration.
You can erase the contents of the device's startup configuration and then write the contents of the given file as the device's new startup configuration.
You can retrieve the configuration for a device from the archive and write it to a XML file.
You can retrieve the configuration from a file, and push it to the device, adding to the device's running configuration.
Get Inventory Data
You can get the inventory data for the devices.
You can merge the running configuration of any devices with their startup configuration to give a new running configuration.
You can retrieve the configuration from the configuration archive and push it to the device.
Understanding Configuration Workflows Tasks
This section explains the following Configuration Workflows tasks:
This section explains the following VLAN Workflows tasks:
•Configure Port Assignment
You can manage ports on your network VLAN.
•Create/Delete Private VLAN
You can create and delete private VLANs
•Configure Promiscuous Ports
You can configure a promiscuous port
•Create/ Modify Trunk
You can create a trunk for a port, or modify trunk attributes.
•Configure/ Delete VLAN
You can create and delete VLANs configured on the devices in the network.
This section explains the following VRF Lite Workflows tasks:
You can create, edit, extend, delete and assign Edge VLAN to VRF.
Understanding Configuration Job Browsers Tasks
This section explains the following Configuration Job Browsers tasks:
You can approve or reject a job for which you are an Approver. The job will not run until you or another Approver approves it.
You can manage NetConfig jobs.
You can manage Config Editor jobs.
Understanding Compliance Tasks
This section explains the following Configuration Compliance tasks:
You can generate Out-of-Sync report for device groups.
This section explains the following Compliance Templates tasks:
You can run a compliance check.
You can deploy a baseline template using a file system or UI.
You can manage a baseline template.
Understanding Monitor Tasks
This section explains the following Monitor task groups:
•Understanding Performance Settings Tasks
•Understanding Fault Settings Tasks
•Understanding Threshold Settings Tasks
•Understanding Troubleshooting Tools Tasks
•Understanding Monitoring Tools Tasks
Understanding Performance Settings Tasks
You can configure performance settings like:
You can manage IPSLA devices, collectors, operations and outage settings
You can add devices to manage IPSLA functionality. You can:
–Enable IPSLA Responder
You can enable IPSLA responder for the selected devices.
–Update IPSLA Config
You can update the IPSLA responder enable or disable status. You can also save the latest information configured in a device to the database.
You can view all the IPSLA devices managed by LMS.
–Edit Device Attributes
You can edit the device attributes like SNMP Retry and SNMP Timeout.
You can delete Adhoc target devices.
–Add Adhoc Target
You can add adhoc target devices to the IPSLA Performance Management function in LMS if you want to manage devices from an external source. The Adhoc devices may be either Cisco devices or devices with a unique IP address.
You can create, edit, delete, monitor, start, list, view, or stop collectors.
When you have the authorization to create collectors you can import, export and reconfigure collectors.
You can analyze IP service levels for IP applications and services. You can view operation details, list, create, edit, or delete operations.
• Outage Settings
You can view, list, create, edit, or delete planned outages.
You can setup auto monitoring, poller and template management
You can change the polling intervals.
You can create and manage pollers. You can:
– Edit Poller
You can edit pollers.
– Clear Failures
You can clear all the failures recorded in the database for a Poller.
– Clear Missed Cycle
You can clear all the polling interval cycles missed for a Poller.
– Activate and Deactivate Poller
You can activate an inactive Poller to poll, or stops a Poller from polling.
– View Failures
You can view failures that occurred during polling.
– Create Poller
You can create a Poller.
– List Performance Devices
You can view performance devices.
– Delete Poller
You can delete a Poller.
– Debug Performance Polling Engine
You can debug performance polling engine.
– List / View Pollers
You can list or view Pollers.
You can create, copy, edit, list, delete, export, or import templates to monitor performance parameter.
•Device Performance Management Summary
You can view the Device Performance Management Summary portlet details. To access any custom role, you should select Device Performance Management Summary.
Understanding Fault Settings Tasks
You can set up the following fault settings tasks:
You can setup polling parameters, group priorities, and view device fault details.
– Apply Changes
You can apply polling and threshold changes.
– Polling Parameters
You can configure polling parameters.
– Fault Device Details
You can view component details of a device.
– Priority Settings
You can set priority for polling and thresholds.
Understanding Threshold Settings Tasks
You can configure pollers, manage templates, configure trendwatch.
This section explains the following Threshold Settings tasks:
You can create, activate, list and view, edit, copy, deactivate, or delete trendwatch for a MIB variable.
You can create, edit, delete, access, or, list and view thresholds for a MIB variable.
You can view the thresholds that are associated with device groups, trunk port groups, access port groups, and interface groups.
Understanding Troubleshooting Tools Tasks
You can troubleshoot network devices using various tools like NetShow and VRF-Lite. This section explains the following Troubleshooting Tools tasks:
•Ping and Traceroute/Show Commands
You can troubleshoot VRFs using Ping or Traceroute, or view the result of the VRF-specific show commands
You can perform tasks such as viewing job details, creating jobs, editing jobs, copying jobs, retrying failed jobs, stopping jobs, and deleting jobs.
•Command Set Operations
You can create, edit, or delete user-defined Command Sets.
•Assigning Command Sets
You can assign command sets to network operators.
You can view the details of an existing Command Set.
•NetShow Jobs/Show Commands
You can run NetShow commands and view NetShow jobs.
You can use the following tools:
You can launch the troubleshooting page by clicking device IPs.
You can capture live data from the Cisco Prime machine to aid in troubleshooting.
You can trace the MIB tree of a device starting from a given OID for troubleshooting, or gathering information about a certain device.
You can set an SNMP object or multiple objects on a device for controlling the device.
You can troubleshoot network problems using the troubleshooting workflows. You can diagnose network connectivity problems, or diagnose devices.
Understanding Monitoring Tools Tasks
You can use fault and event monitor tools like:
•Configure Inter-VLAN Routing
•View Link Bandwidth utilization
•Device Operation Discover Devices
•View Trunk Attributes
•Time Domain Reflectometer Report
•Device Operation Delete Link
•Spanning Tree Reports
•Device Operation Delete Devices
•Spanning Tree Configuration
•Device Operation Change management IP
•View Data Extraction Engine
You can view all the faults in a common place. It collects information of fault in devices in real-time and display the information by a selected group of devices. You can clear or annotate faults.
It allows you to own the fault or clear them.
Configure Inter-VLAN Routing
You can configure Inter-VLAN Routing.
View Link Bandwidth utilization
You can view bandwidth utilization across links, in the Topology maps.
You can configure EtherChannel.
View Devices at Fault and Event Monitor
You can view devices available at Fault and Event Monitor.
Device Operation Discover Devices
You can discover devices for device operation.
View Trunk Attributes
You can view trunk attributes.
Time Domain Reflectometer Report
You can generate the TDR report that detect faults in a cable. TDR checks and locates open circuits, short circuits, sharp bends, crimps, kinks, impedance mismatches, and other such defects.
Device Operation Delete Link
You can remove a link from the Network Topology View.
Spanning Tree Reports
You can generate Spanning Tree reports
Device Operation Delete Devices
You can delete devices.
You can access the LAN Edge, Layer 2, and Unconnected Devices network views of managed domains discovered in your network, and you can filter, access, or view network information or status.
Spanning Tree Configuration
You can configure Spanning Trees on the network.
Device Operation Change management IP
You can set a preferred management address to be used by LMS for devices which can have multiple IP addresses.
View Data Extraction Engine
You can view Data Extraction Engine.
Understanding Inventory Tasks
This section explains the following Inventory task groups:
•Understanding Group Management Tasks
•Understanding Job Browsers Tasks
•Understanding Device Administration Tasks
•Understanding Inventory Tools Tasks
Understanding Group Management Tasks
You can create and manage fault groups, IPSLA collectors groups, or ports and modules groups.
• Fault groups
You can view, create, edit, delete fault groups, or refresh groups.
• IPSLA Collector
You can view, create, edit, delete or refresh IPSLA collector groups.
Understanding Job Browsers Tasks
You can view, create, edit, stop, retry, or delete device credentials verification jobs. You can also verify device credentials.
Understanding Device Administration Tasks
You can manage devices and auto update the server. This section explains the following Device Administration tasks:
•Add / Import / Manage Devices
•Add Managed Devices
•Manage Device State
•Device Allocation Policy
Add / Import / Manage Devices
You can manage devices in DCR. You can:
You can view device information for a single device or for multiple devices.
You can export a list of device and their credentials.
You can generate the following reports:
Displays the list of devices that are unreachable.
To generate this report, select Reports > Inventory > Management Status > Unreachable Devices.
Displays the list of devices that should not be added in DCR.
To generate this report, select Reports > Inventory > Management Status > Excluded Devices.
–Imported Device Status
Displays the information about the devices that are imported into DCR.
To generate this report, select Reports > Inventory > Management Status > Imported Device Status.
–Known Device List
Displays the complete list and information of all devices in the repository.
To generate this report, select Reports > Inventory > Management Status > Known Device List.
Displays the complete device list in DCR.
To generate this report, select Reports > Audit > Device Administration.
You can add devices, device properties or attributes, and device credentials to the DCR.
You can view devices in DCR.
You can delete devices from DCR. You can also schedule device polling job and view the Unreachable device report.
You can import multiple devices into DCR. You can also view the Imported device report.
You can edit device information for a single device or for multiple devices.
Add Managed Devices
You can manually add managed devices without using the Device Allocation Policy.
Manage Device State
You can view the states of the devices.
Device Allocation Policy
You can configure the device management policy for Device Management.
Understanding Inventory Tools Tasks
You can use tools like:
Provides real-time views of networked Cisco Systems devices
Provides web-enabled, real-time, remote monitoring (RMON) information to users to facilitate troubleshooting and improve network availability.
Understanding Work Center Tasks
This section explains the following Work Center task groups:
•Understanding Smart Install Tasks
•Understanding Auto Smartports Tasks
•Understanding Identity Tasks
•Understanding EnergyWise Tasks
Understanding Smart Install Tasks
You can configure and manage images using this plug-and-play configuration and image management feature that provides zero-touch deployment for new switches.
You can view the status, delete, stop or manage Smart Install jobs.
You can assess the readiness of your network for Smart Install.
You can provision Smart Install for Day 1 operations.
You can configure, and manage the Smart Install director.
Understanding Auto Smartports Tasks
You can configure, apply and manage Auto Smartports macros on the ASP-capable devices
You can provision Auto Smartports for day 1 operations.
You can view the status, delete, stop or manage Auto Smartport reports.
You can configure, and enable Auto Smartports on selected interfaces.
You can view Auto Smartports based device details after assessing the network.
Understanding Identity Tasks
You can create authentication, access control, and user policies to secure network resources and connectivity.
You can configure Identity on Identity-capable devices.
You can view the status, delete, stop or manage Identity jobs.
You can generate Identity reports.
You can provision Identity for Day 1 operations.
You can view Identity-based device details after assess the network.
Understanding EnergyWise Tasks
You can manage and automate the energy management lifecycle of network.
You can view EnergyWise-based device details after assessing the network.
You can view the status, delete, stop or manage EnergyWise jobs.
You can provision EnergyWise for Day 1 operations.
You can generate EnergyWise reports like:
You can generate EnergyWise power usage report.
You can configure EnergyWise cost savings.
You can view EnergyWise portlets like:
–EnergyWise Savings Trend Graph
–EnergyWise Total Savings Graph
–EnergyWise Power Consumption Graph
•Manage Domains/General Settings
You can manage the configured EnergyWise domains.
You can configure the time to perform EnergyWise device collection, EnergyWise endpoint collection, and EnergyWise compliance check.
You can configure energy management policies on devices and configure endpoints.
You can manage the EnergyWise policies.
–Manage Endpoint Groups
You can create an endpoint group of IP phones.
–Configure Attributes on Endpoints
You can configure EnergyWise attributes.
You can configure EnergyWise collection, cost settings, and data purge settings.
You can configure EnergyWise cost savings.
You can configure EnergyWise data purge settings.