Cisco Prime Network Services Controller Release Notes

This document describes the features, limitations, and bugs for the Prime Network Services Controller, Release 3.5.1a.

Cisco Prime Network Services Controller Overview

The dynamic nature of cloud environments requires organizations to apply and enforce frequent changes to networks. These networks can consist of thousands of virtual services elements, such as firewalls, load balancers, routers, and switches. Cisco Prime Network Services Controller (PNSC) simplifies operations with centralized, automated multi-device and policy management for Cisco network virtual services. For the latest PNSC release updates and overview, see the corresponding Cisco PNSC data sheet.

Cisco PNSC is the primary management element for Cisco Nexus 1000V and Cisco Nexus 1000VE Switches and Services that can enable a transparent, scalable, and automation-centric network management solution for virtualized data center and hybrid cloud environments. Cisco Nexus 1000V and Cisco Nexus 1000VE switches and services deliver a highly secure multitenant environment by adding virtualization intelligence to the data center network. These virtual switches are built to scale for cloud networks. Support for Virtual Extensible LAN (VXLAN) helps enable a highly scalable LAN segmentation and broader virtual machine (VM) mobility.

Cisco PNSC enables the centralized management of Cisco virtual services to be performed by an administrator, through its GUI, or programmatically through its XML API. Cisco PNSC is built on an information-model architecture in which each managed device is represented by its subcomponents (or objects), which are parametrically defined. This model-centric approach enables a flexible and simple mechanism for provisioning and securing virtualized infrastructure using Cisco VSG security services.


Note

Starting with Cisco PNSC Release 3.4.2a, Cisco Adaptive Security Appliance (ASA 1000V), Cisco Cloud Services Router (CSR), Citrix NetScaler VPX, Citrix NetScaler, and KVM Hypervisor, and Microsoft HyperV platforms are not supported.
  • Security administrators can author and manage security profiles and manage Cisco VSG instances. Security profiles are referenced in Cisco Nexus 1000V and Cisco Nexus 1000VE port profiles.

  • Network administrators can author and manage port profiles, and manage Cisco Nexus 1000V and Cisco Nexus 1000VE switches. Port profiles with referenced security profiles are available in VMware vCenter through the Cisco Nexus 1000V and Cisco Nexus 1000VE VSM programmatic interface with VMware vCenter.

  • Server administrators can select an appropriate port profile in VMware vCenter when instantiating a virtual machine.

  • Stateless managed devices—Security policies (security templates) and object configurations are abstracted into a centralized repository and used as templates against any virtual device type.

  • Dynamic device allocation—A centralized resource management function manages pools of devices that are commissioned (deployed) in service and a pool of devices that are available for commissioning. This approach simplifies large-scale deployments because managed devices can be preinstantiated and then configured on demand, and devices can be allocated and deallocated dynamically across commissioned and noncommissioned pools.

  • Scalable management—A distributed management-plane function is implemented using an embedded agent on each managed device that helps enable greater scalability.

New Features and Enhancements

No new features were introduced in Cisco Prime Network Services Controller, release 3.5.1a.

Requirements Overview

The following topics identify the primary requirements for installing and using Cisco PNSC.

System Requirements

Requirement Description

Prime Network Services Controller Virtual Appliance

Four virtual CPUs

1.8 GHz

Memory

4 GB RAM

Disk space

220 GB on shared NFS or SAN, configured on two disks as follows:

  • Disk 1—20 GB

  • Disk 2—200 GB

  • With InterCloud functionality, 220 GB on shared NFS or SAN, and configured on two disks as follows:

    • Disk 1—20 GB

    • Disk 2—200 GB

  • Without InterCloud functionality, 40 GB on shared NFS or SAN, and configured on two disks as follows:

    • Disk 1—20 GB

    • Disk 2—20 GB

Management interface

One management network interface

Processor

x86 Intel or AMD server with 64-bit processor listed in the VMware compatibility matrix

Hypervisor Requirements

Prime Network Services Controller is a multi-hypervisor virtual appliance that can be deployed on VMware vSphere.

See the VMware Compatibility Guide to confirm that VMware supports your hardware platform.

Requirement Description

VMware

VMware vSphere

5.5, 6.0, and 6.5a with VMware ESXi (English only)

VMware vCenter

5.5, 6.0, and 6.5a (English only)


Note

Prime Network Services Controller running as a virtual machine with version 3.4.1b and later can be hosted on VMware vSphere ESXi 6.0 hosts that are managed by VMware vCenter Server 6.0.

Note

Prime Network Services Controller running as a virtual machine with version 3.4.2b or later can be hosted on VMware vSphere ESXi 6.5a hosts that are managed by VMware vCenter Server version 6.5a.

Web-Based GUI Client Requirements

Requirement Description

Operating system

Either of the following:

  • Microsoft Windows

  • Apple Mac OS

Browser

Any of the following:

  • Google Chrome 32.0 or later (recommended)

  • Internet Explorer 10.0 or later

  • Mozilla Firefox 26.0 or later

Flash player

Adobe Flash Player plugin 11.9 or later

Firewall Ports Requiring Access

If Cisco PNSC is protected by a firewall, the following ports on the firewall must be open so that clients can contact Csco PNSC.

Port Description

22

TCP/SSH

80

HTTP

443

HTTPS

843

Adobe Flash

Performance and Scalability

The following table lists the performance and scalability data for Cisco ONSC when using VMware.

Item Scalability Numbers

Endpoints VSGs

511

Hypervisors

600

Locales

256

Object groups

65536

Orgs

2048

Policies

4096

Policy sets

2048

Rules

16384

Security profiles

2048

Tenants

256

Managed VMs

6000

Users

260

Zones

8192

Hypervisor Support

The following table identifies features that differ with regard to hypervisor support in Cisco PNSC Release 3.5.1a. Features that are not listed are supported by all hypervisors.

Feature and Device Support

VMware vSphere ESXi 5.5, 6.0, and 6.5a

Feature Support

Automatic deployment of network services

Supported

VM Attribute support

Supported:

  • Cluster Name

  • Guest OS Full

  • Name

  • Hypervisor Name

  • Parent Application Name

  • Port Profile Name

  • Resource Pool

  • VM DNS Name

  • VM Name

Device Support

For detailed information about device support, see Cisco Prime Network Services Controller Supported Devices.

VSG

Supported

Cisco PNSC Upgrade Matrix

The following table lists the supported upgrade paths for Cisco PNSC.


Note

Please make sure to have 5GB of space free in bootflash directory before proceeding with upgrade process.


Initial Version

Intermediate State(s)

Final Version

2.0.3

2.1 to 3.0.2g to 3.2.2a to 3.4.1d to 3.4.2b to 3.4.2c

3.5.1a

2.0.3

2.1 to 3.0.2g to 3.2.2a to 3.4.1d to 3.4.2b to 3.4.2c

3.5.1a

2.1

3.0.2 to 3.2.2a to 3.4.1d to 3.4.2b to 3.4.2c

3.5.1a

3.0.2

3.2.2a to 3.4.1d to 3.4.2b to 3.4.2c

3.5.1a

3.2.1d

3.4.1d to 3.4.2b to 3.4.2c

3.5.1a

3.2.2b

3.4.1d to 3.4.2b to 3.4.2c

3.5.1a

3.4.1b

3.4.1d to 3.4.2b to 3.4.2c

3.5.1a

3.4.1c

3.4.1d to 3.4.2b to 3.4.2c

3.5.1a

3.4.1d

3.4.2b to 3.4.2c

3.5.1a

3.4.2a

3.4.2b to 3.4.2c

3.5.1a

3.4.2b

3.4.2b to 3.4.2c

3.5.1a

3.4.2c

NA

3.5.1a

3.4.2d

NA

3.5.1a

Important Notes

The following topics provide important information for using Cisco PNSC .

Cloned Linux Virtual Machines

When Linux virtual machines are cloned, new MAC addresses are assigned. This causes a MAC address mismatch between the VM settings and the Linux Guest OS. If you encounter this situation, the following message is displayed:

The Guest OS either does not contain interface configuration for the VM NICs or the
interfaces are explictly disabled.

For information on how to resolve the MAC address mismatch, see the VMware Knowledge Base.

Editing Firewall Interfaces

We recommend that you do not edit the data interfaces of compute or edge firewalls. Changing the data interface via the Cisco PNSC GUI stops communication between the Cisco Nexus 1000V and Cisco Nexus 1000VE VEM link and the firewall, and thereby stops vPath traffic.

If you change the data interfaces of compute or edge firewalls via the Cisco PNSC GUI, make the appropriate configuration changes on the Cisco Nexus 1000V and Cisco Nexus 1000VE.

Searching with Special Characters

Searching for organization names does not work if the organization names include special characters, such as $.

User Account Password Expiration

When adding a user account, the administrator can choose to expire the account password and select the date on which it expires. When the expiration date is reached, the account is disabled and the user cannot log in to Cisco PNSC until a user with administrator privileges extends the expiration date.

Workflow for Automatically Deploying Network Services

Cisco PNSC enables you to automatically deploy compute firewall and load balancer network services by preparing the required networks, defining organizational profiles by configuring service automation policies, and assigning the organizational profiles to the required organization in the tenant hierarchy.

The following table identifies the tasks required to configure Cisco PNSC for automatic network service deployment, the related documentation, and the minimum role required for each task.

Task Related Documentation Role Required

1. Confirm that the following prerequisites are met:

  • Cisco PNSC has been installed and is accessible from VMware.

  • In Cisco PNSC, VMware vCenter has been added as a VM Manager.

  • The Cisco PNSC Device Adapter has been installed and is registered with Cisco PNSC.

Cisco Prime Network Services 3.4 Installation Guide

admin

2. Import service images. Supported service devices are VSG compute firewalls .

Importing Service Images

admin

3. Configure Management, HA, and vPath networks and subnetworks at root.

Configuring Networks for Network Service Deployment

admin

4. Create the policies and profiles for the network services.

Adding a Device Profile

admin

5. Create organizational (Org) profiles and add service automation definitions to each profile.

Configuring an Org Profile for Automatic Service Deployment

admin

6. In Tenant Management, create the organization where the network services will be deployed and assign an Org profile.

Creating an Organization and Assigning an Org Profile

admin or tenant-admin

7. Add a network to the organization to deploy the network service.

Deploying a Network Service

tenant-admin

8. Configure additional policies and profiles as needed.

Configuring Additional Policies and Profiles for Network Services

tenant-admin

9. Removing an automatically deployed compute firewall network service.

Deleting an Automatically Deployed Compute Firewall Service

tenant-admin

Importing Service Images

Before you begin

Confirm that the service images are available for importing into.

Procedure


Step 1

Choose Resource Management > Resources > Images.

Step 2

Click Import Service Image.

Step 3

In the Importing Service Image Dialog box:

  1. Enter a name and description for the image you are importing.

  2. In the Type field, choose the type of image to import.

  3. In the Version field, enter a version number that you want to assign to the image.

  4. In the Import area, provide the following information, and then click OK:

    • Protocol to use for the import operations: FTP, SCP, or SFTP.

    • Hostname or IP address of the remote host with the images.

    • Account username and password for the remote host.

    • Absolute image path and filename, starting with a slash (/).


Configuring Networks for Network Service Deployment

To automatically deploy network services, you must configure the following networks with subnetworks at the root level:

  • A management network—This network provides IP addresses for the automatically deployed services.

  • A vPath service network—This network is required for deploying compute firewall network services.

  • An HA network—This network is required for deploying compute firewall network services in HA mode.

The following guidelines apply when creating networks for automated network service deployment:

  • You must use the same Distributed Virtual Switch (DVS) port group for all networks.

  • The port group must be accessible from Prime Network Services Controller.

Procedure


Step 1

Choose Resource Management > Managed Resources > root.

Step 2

In the Networks tab, click Add.

Step 3

To add a management network, provide the following information and click OK:

  1. Enter the network name and description.

  2. In the Role field, choose Management.

  3. In the VM Manager area, choose the VMM and the port group.

Step 4

To add an HA network to support compute firewall services in HA mode, provide the following information and click OK:

  1. Enter the network name and description.

  2. In the Role field, choose HA.

  3. In the VM Manager area, choose the VMM and the port group.

Step 5

To add a vPath service network, provide the following information and click OK:

  1. Enter the network name and description.

  2. In the Role field, choose Service_Vpath.

  3. In the VM Manager area, choose the VMM and the same port group that you chose for the management network.

Step 6

For each management and vPath network, add a subnetwork as follows:

  1. Choose the network and click Add in the Subnetworks area.

  2. In the Add Subnetwork dialog box, enter the netmask, gateway, and name for the subnetwork.

  3. In the IP Address Range area, click Add and enter the starting and ending IP addresses for the IP address range for the subnetwork.

  4. Click OK to accept your changes.


Adding a Device Profile

A device profile is a set of custom security attributes and device policies. Adding a device profile enables you to specify the DNS and NTP servers that the service device is to use in addition to SNMP, syslog, and authentication policies.

Procedure


Step 1

Choose Policy Management > Device Configurations > root > Device Profiles.

Step 2

Click Add Device Profile.

Step 3

In the General tab in the Add Device Profile dialog box:

  1. Enter the profile name and description.

  2. If required, select the time zone.

  3. Add a DNS server and domain.

  4. Add an NTP server.

  5. For the SNMP, Syslog, and Auth policies, either use the default policy, select another existing policy, or create a new policy.

  6. In the Policy Engine Logging field, indicate whether logging is enabled or disabled.

Step 4

In the Advanced tab, specify the fault, core file, and log file policies to use for the for the Cisco PNSC policy agent, and then click OK.


NTP Behavior Post PNSC Upgrade

NTP service does not come up on the terminal when PNSC is upgraded from the previous releases to Release 3.4.1d or later. To access the NTP service, you need to re-login into the same terminal or start a new terminal.

Configuring an Org Profile for Automatic Service Deployment

A network service automation policy specifies the profiles, image, and credentials to be used when deploying a network service. Depending on the type of service, different options are available. For each Org profile, you can create a definition for each network service type: compute firewall and load balancer.

Procedure


Step 1

Choose Tenant Management > root > Profile Name > Create and enter a name for the Org profile.

Step 2

Choose Resource Management  > Managed Resources > root > Service Deployment > Org Profile > profile where profile is the profile you created in the first step.

Step 3

To enable automatic deployment of the service, check the Enable Automation check box.

Step 4

Click Compute Firewall Service or Load Balancer Service to deploy that service using this Org profile.

Step 5

In the Network Service dialog box, provide the information as described in the following table, and then click OK. Different fields are available depending on the type of service.

Note 

You must set the Admin state to enable to deploy the service.    

Field

Description

Properties

Admin State

Whether the Administrative state of the network service is enabled or disabled.

You must choose enable to deploy the service.

HA Mode

(Compute firewall only) Whether the service should operate in standalone or active standby mode.

Deployment Size

(Compute firewall only) Size of the deployment: small, medium, or large.

For more information, see the online help.

Enable License

(Load balancer only) Check the check box to use an existing license for the service.

Feature License

(Load balancer only) Choose the license to use for the service.

Profiles

Device Config Profile

The device configuration profile to use for the service.

Access

Login User

User account for administrative access.

Login Password

User password for administrative access.

Confirm Password

Confirming password entry.

VM Image Table

image

Choose the service image to use to deploy the network service.


Creating an Organization and Assigning an Org Profile

After you configure the service automation policies for an Org profile, create the tenant or other organization on which you want to deploy the network service. Creating the organization includes assigning the Org profile that will be used to automatically deploy network services.

Before you begin

Determine the level in the hierarchy where the organization that will be configured to automatically deploy network services will reside.

Procedure


Step 1

Choose Tenant Management > root and navigate to the level where you want to add the organization that will deploy network services using the Org profile. For example, to assign an Org profile to a tenant, click Create Tenant at the root level. Similarly, to assign an Org profile at the Application level, navigate to the VDC and click Create Application.

Step 2

In the Create dialog box, enter a name for the organization and, from the Profile drop-down list, choose the Org profile to assign to the organization.

Step 3

Click OK.


Deploying a Network Service

After you create the organization where network services will be deployed and assign an Org profile, you can deploy the network service. To deploy the network service, create a network on the organization.

The following guidelines apply when deploying a network service:

  • Only one compute firewall service can be automatically instantiated for an organization by adding a Layer 2 network with any role.

  • Only one load balancer service can be automatically instantiated for an organization by adding a Layer 2 network with the role Service_LB.

Before you begin

  • For a compute firewall network service, confirm that Management and vPath networks have been configured at root.

Procedure


Step 1

Choose Resource Management > Managed Resources > root > tenant or tenant > org.

Step 2

In the Networks tab, create the network for the service to be deployed, being sure to choose the correct role for the service.

The network service is then automatically deployed. To monitor progress, choose Resource Management > Managed Resources > root > tenant or tenant > org and click the Network Services tab.

Configuring Additional Policies and Profiles for Network Services

After deploying a network service, you might need to apply new policies and profiles to the network service. To apply new policies and profiles to a specific, deployed network service, create the policies and profiles at the same organizational level as the deployed service. For example, if a compute firewall network service has been deployed for a VDC, create the new policies and profiles at the VDC level.

Deleting an Automatically Deployed Compute Firewall Service

You cannot delete an automatically deployed compute firewall by deleting the network of a specific client. However, you can delete an automatically deployed compute firewall service from the Managed Resources Network Services tab in Cisco PNSC.


Note

If you delete the vPath network from root, it will remove all compute firewalls from all tenants and subordinate organizations.

Procedure


Step 1

Choose the organization in which the network service has been deployed (Resource Management > Managed Resources > root > tenant > org).

Step 2

Click the Network Services tab.

Step 3

Choose the automatically deployed compute firewall service and click Delete.


Using the Bug Search Tool

This topic explains how to use the Bug Search Tool to search for a specific bug or to search for all bugs in a release.

Procedure


Step 1

Go to http://tools.cisco.com/bugsearch.

Step 2

In the Log In screen, enter your registered Cisco.com username and password, and then click Log In. The Bug Search page opens.

Note 
If you do not have a Cisco.com username and password, you can register for them at http://tools.cisco.com/RPF/register/register.do.
Step 3

To search for a specific bug, enter the bug ID in the Search For field and press Enter.

Step 4

To search for bugs in the current release:

  1. In the Search For field, enter Cisco Prime Network Services Controller and press Enter. Leave the other fields empty.

  2. When the search results are displayed, use the filter tools to find the types of bugs you are looking for. You can search for bugs by status, severity, modified date, and so forth.

    Tip 
    To export the results to a spreadsheet, click the Export Results to Excel link.     

Open Bugs

The following table lists the open bugs in the Cisco PNSC, Release 3.5.1a.

Bug ID Description

CSCvc09685

PNSC: VSM role shows as standalone mode even when VSM is in primary HA mode.

CSCvd80756

VSM goes to Failed to Apply state in PNSC on upgrade.

CSCvb84497

Cleanup or modification of authorization methods on PNSC are not updated on VSG.

CSCvd60980

VSM going to Failed to Apply state on changing the service path from PNSC.

Related Documenation

Prime Network Services Controller

The Prime Network Controller documentation is available on Cisco.com at the following URL:

http://www.cisco.com/c/en/us/support/cloud-systems-management/prime-network-services-controller/tsd-products-support-series-home.html

Cisco Nexus 1000V Series Switch Documentation

The Cisco Nexus 1000V Series switch documentation is available on Cisco.com at the following URL:

http://www.cisco.com/c/en/us/support/switches/nexus-1000v-switch-vmware-vsphere/tsd-products-support-series-home.html

Cisco Nexus 1000VE Series Switch Documentation

The Cisco Nexus 1000V Series switch documentation is available on Cisco.com at the following URL:

https://www.cisco.com/c/en/us/support/switches/nexus-1000ve/tsd-products-support-series-home.html

Cisco Prime Data Center Network Manager Documentation

The Cisco Prime Data Center Network Manager (DCNM) documentation is available on Cisco.com at the following URL:

http://www.cisco.com/c/en/us/support/cloud-systems-management/prime-data-center-network-manager/tsd-products-support-series-home.html

Cisco Virtual Security Gateway Documentation

The Cisco VSG documentation is available on Cisco.com at the following URL:

http://www.cisco.com/c/en/us/support/switches/virtual-security-gateway/tsd-products-support-series-home.html

Accessibility Features in Cisco Prime Network Services Controller

All product documents are accessible except for images, graphics, and some charts. If you would like to receive the product documentation in audio format, braille, or large print, contact accessibility@cisco.com.

Obtaining Documentation and Submitting a Service Request

For information on obtaining documentation, using the Cisco Bug Search Tool (BST), submitting a service request, and gathering additional information, see What's New in Cisco Product Documentation.

To receive new and revised Cisco technical content directly to your desktop, you can subscribe to the RSS feeds are a free service.