To begin, log in to the VMS Service Interface using your consumer credentials.
In case of association with several tenants, choose a customer name from the drop-down in the left pane of the Welcome page. The Services and Devices menu items in the UI are populated only after you finish ordering or shopping.
Resetting Password
The Administrator first creates a Tenant and then one or more users.
As a new user, when you receive an email notification (with link) to configure the password, you must click this link before the password expiry date, to specify your new password. In case you forget the password, access the Login page, and click the Forgot Password link. This link opens a page where you are prompted to specify information, so that you receive a mail with the new password.
A VPN that connects one or more locations over the public Internet using the IPsec protocol
Remote VPN users (SSL VPN users)
Intelligent router (self-configure and self-install) per site
Simple self-service management interface with capability to customize the VPN access based on company size, select the VPN speeds and desired level of security.
![]() Note | Only a user with an out-of-the-box Approver role or Approver permissions can perform this process. By default, VMS provides the approval privileges to an Operator user. |
Enable
approvals at the service offer level, i.e, before importing the service
definitions into VMS. See
Enabling Approvals for a Service Request.
Configure
notifications if you want to notify approvers or service provider users about
the status of the approvals. See
Enable
Notifications for Events.
Step 1 | Log in to the Cisco VMS Portal. |
Step 2 | From the left pane, click Approvals to view a list of pending service requests. |
Step 3 | Select a
request and do the following:
The user is notified about the status. . |
As a consumer, you can define or update the firewall configuration for a Cloud VPN Advanced or Cloud VPN Advanced with Web Security offer.
Step 1 | From the
left pane of the service interface, click
Services
to view the list of offers you have purchased.
![]() |
Step 2 | In the right pane of the selected (either Advanced or Advanced with Web Security) offer, under Total Bandwidth area, click the Edit firewall (pencil) icon. |
Step 3 | In the Firewall Settings window, you can Add or modify a rule (Inside to Outside Firewall Rules area) by entering the mandatory values and click Submit. |
Step 4 | Similarly, in the Port Forwarding Rule window, you can Add or modify a rule (Outside to Inside Port Forwarding Rule) by entering the mandatory values and click Submit. |
You can also delete a firewall rule by selecting the specific rule in the Firewall Rule or Port Forwarding Rule area.
Configuration Requirements
HTTPS - PnP protocol uses HTTPS on TCP port 443 to contact the PnP server that runs on NSO. The CPE must have an IP address in order to originate this HTTPS request. This is the first point of contact between the CPE and PnP server on NSO.
DNS - The CPE requires DNS lookup to work for certificate validation. If DNS is not working, the CPE will not be able to establish a PnP session because it will reject the certificate.
NTP - The CPE requires NTP to be working and have its internal clock be relatively close to actual time to ensure certificate validation. If NTP is not working and the CPE clock is not accurate, it might think the certificate is not valid. Most certificates are valid only during a certain date range.
Certificate - The CPE must have a certificate in its configuration to properly establish HTTPS session with the PnP server.
IOS version and Feature set - Cisco VMS Cloud VPN/VCE requires a minimum IOS version of 15.5(1)T or newer. The use of FlexVPN and IPsec requires that the IOS has a feature set that can support IPsec. This is designated with a "K9" in the image name, and the IOS license type should be "Advanced Security."
Internet Access - The CPE connects to the PnP server across the open Internet. The Internet connection must be capable of routing traffic across the Internet to the PnP server.
WAN port vs LAN port - Each CPE has two or more Ethernet connections. One of them is designated as the WAN port and must be connected to the Internet.
Devices |
WAN Interface |
LAN Interface |
---|---|---|
ISR 1900, 2900, 3900 series All Cloud VPN ISR devices take on the role of CPEs |
GE 0/1 |
GE 0/0 |
ISR 881 |
FE 4 |
FE 0 |
ISR 892 |
GE 8 |
GE 0 |
All CPEs delivered to a customer must have the Day -1 config as the startup-config, and the same configuration should also be stored in the device flash storage as day--1-config file. If the Day -1 configuration is missing, then the CPE will never attempt to connect to the PnP server until the configuration is loaded. The same configuration is stored as flash:day--1-config so that it can be reset back to "factory defaults" once it has been de-commissioned from the vMS service. If the flash:day--1-config is not present, then the CPE will fail to reconnect to the PnP server after being reset or removed from a service chain. Each CPE type needs a day--1-config file that is specific to the CPE type and deployment. It should be tested in a lab before the configurations are finalized and placed on multiple CPEs.
A console connection is required to configure a CPE. Once connected to the CPE console, enter enable mode, config mode, and then paste the day--1-config in the terminal session.
router>enable router#config t router-config# < now paste the day--1-config into the terminal > router-config#end router#copy running-config startup-config router#copy running-config flash:day--1-conf
aaa new-model ! aaa authentication login default none ! crypto pki trustpoint ncs enrollment terminal revocation-check crl ! ! crypto pki certificate chain ncs certificate ca 0509 308205B7 3082039F A0030201 02020205 09300D06 092A8648 86F70D01 01050500 3045310B 30090603 55040613 02424D31 19301706 0355040A 13105175 6F566164 B478A53A 874C8D8A A5D54697 F22C10B9 BC5422C0 01506943 9EF4B2EF 6DF8ECDA F1E3B1EF DF918F54 2A0B25C1 2619C452 100565D5 8210EAC2 31CD2E <--Certificate has been truncated in this sample. quit ! ! ip name-server 8.8.8.8 ip name-server 8.8.4.4 ip cef ! interface GigabitEthernet0/0 ip address dhcp duplex auto no shut speed auto ! ntp 0.pool.ntp.org ntp 1.pool.ntp.org ! line vty 0 15 ! pnp profile test transport https ipv4 11.17.0.11 port 443 remotecert ncs <-- Your NSO server public IP address that this CPE can connect to. end
Verification
The configuration can be checked with the following commands. Both commands should have the same output, and should display all of the configuration needed for PnP to work.more flash:day--1-config more nvram:startup-config
The serial number of the CPE can be displayed by executing the show version command. The serial number of the CPE should be saved so that it can be referenced later in case of difficulty. Notice that the show version command also displays the IOS feature set that is enabled.
For new combinations of CPE device types and Day -1 configurations, it is recommended to verify that the IOS version, feature set, and configuration works before deploying to the field. It is suggested to test it by the normal CPE on-boarding process into a test service chain. This can prevent troubleshooting sessions.
What Next- The CPE can be on-boarded/registered in the portal either before or after it is connected to the Internet. After a CPE serial number has been associated with a service chain from the portal, and CPE establishes connectivity with NSO, then the CPE is provisioned by NSO. See Registering a Cloud VPN Device section.
After you subscribe/purchase and configure the Cloud VPN service, the CPEs (devices) must be on-boarded for the Cloud VPN service. Device on-boarding is a two step process: Registering the CPE in the Cloud VPN user interface and connecting the CPEs to the respective WAN and LANs.
Device registration establishes the mapping between a Cloud VPN service (specific tenant) and the CPEs associated with that tenant.
When devices are registered in Cisco VMS for a Cloud VPN service, the Plug-N-Play (PnP) server maps the service configuration (that it needs to orchestrate) to the device. In the Cisco VMS solution, the NSO also functions as the PnP server that is used for Zero-Touch Deployment (ZTD) of the CPEs (devices)
End customer CPEs connect via the IPsec tunnels (implemented with FlexVPN) to the Cloud VPN hub in order to communicate with each other and also to securely access the Internet
You can register a device as follows:
Step 1 | From the left pane of the Service Interface UI, click Devices to view the list of devices. The devices that are in various statuses such as Unregistered, Registering, Provisioned, Ordering, Updating, Provisioning Failed, Up, Down, Unknown are displayed. | ||
Step 2 | Click the
unregistered device.
![]() | ||
Step 3 | In the right
pane, enter the serial number of the device in the
Enter Device
Serial Number (SN) field.
| ||
Step 4 | Click
Register.
The status turns to "Provisioned" after the registration is complete.
The Cloud VPN service requires at least one registered CPE to function. Ensure that you do not delete all CPEs.
After the CPE has been added to/registered with Cloud VPN, the Cloud VPN portal communicates to NSO by sending edit-config message with the following parameters: admin@ncs> show configuration cloudvpn <service-chain-name> cpe cpe cpe_1 { serial FTX00000000; allocate { ip-type ipv4; prefix-size 24; } }
| ||
Step 5 | Set up the traffic bandwidth for each CVPN device or CPE. For more information, see Setting up Bandwidth Prioritization for a CVPN Device or CPE. |
After you provision a VMS CVPN service, you can set up the traffic bandwidth for each CVPN device or CPE. Traffic prioritization classifies traffic and assigns bandwidth prioritization as data traverse the network.
To set the bandwidth prioritization for a CPE or device, you need to:
Assign the bandwidth percentage to each traffic class.
Specify the upstream and downstream speed.
Select the application types for each traffic class.
To set the bandwidth prioritization, do the following:
Step 1 | Log in to the Cisco VMS Portal. | ||
Step 2 | From the left pane of the Service Interface, click Device. | ||
Step 3 | Choose the device for which you want to specify the bandwidth prioritization and double-click. The Cloud VPN Advance screen appears. | ||
Step 4 | Click the
Edit
button next to Bandwidth Prioritization.
The
Bandwidth Prioritization screen appears.
In Cloud CVPN, the network traffic is classified into four traffic classes: Important, Standard, Critical, and Low. | ||
Step 5 | Select the
percentage of the bandwidth that you want to allocate to each traffic class.
| ||
Step 6 | Enter the bandwidth for the Upstream and the Downstream traffic. | ||
Step 7 | Select the
application types for each traffic class. You can drag and drop the application
types to the respect traffic classes.
| ||
Step 8 | Click Save button to keep your change. |
Upgrade a Cloud VPN Foundation service to Cloud VPN Advanced service
Upgrade a Cloud VPN Foundation service to Cloud VPN Advanced with Web Security service
Upgrade a Cloud VPN Advanced service to Cloud VPN Advanced with Web Security service
Downgrade a Cloud VPN Advanced with Web Security service to Cloud VPN Advanced service
Downgrade a Cloud VPN Advanced with Web Security service to Cloud VPN Foundation service
Downgrade a Cloud VPN Advanced service to Cloud VPN Foundation service
Step 1 | From the left pane of the Service Interface, click Services to view the list of services you have purchased in the Services window. |
Step 2 | Select a service you want to upgrade or downgrade. The service details are displayed in the right pane. |
Step 3 | Click Modify. The offers available for the selected service are displayed in the Modify Service Offer page. |
Step 4 | Select an offer based on your requirement and make the necessary changes in the service form. For more information, see the Placing an Order for a Service section. |
Step 5 | Click Review Order placed under the Summary area, at the right pane. Review your order summary in Order Summary page. |
Step 6 | Check the I accept the Terms and Conditions check box if you agree to proceed for the purchase. You can also click the Terms and Conditions hyperlink to view the terms and conditions, before you proceed. |
Step 7 | Click Purchase. An email with purchase details is sent to the service provider. The service that you have purchased is displayed on the Services page. |
Step 1 | From the left pane, click Services. The Services window displays the list of services purchased by you. | ||
Step 2 | Select a service
you want to unsubscribe. The service details are displayed in the right pane.
| ||
Step 3 | Click
Unsubscribe
in
Account
Options area of the right pane.
![]()
|
Remote users must be created in order to access Cisco VMS services from a remote location. As an operator or a consumer, you can create remote users, activate or suspend user accounts, and reset passwords.
The consumer must enter a username for the remote access user account that needs to be created. A randomly generated password will be created for the newly added user. An email is generated to notify the new remote access user about the login credentials. The email also contains the URL for remote access. This is the URL that was created by the DNSUpdater when the original CloudVPN service was provisioned.
![]() Note | This feature is only available for Cloud VPN Advanced and Cloud VPN Advanced with Web Security services. |
Step 1 | From the left navigation pane in the VMS Portal, click Services to view the list of services you have purchased in the Services window. | ||
Step 2 | Select a provisioned service to which you want to add remote users. | ||
Step 3 | Click Remote Users (people icon) to display the Services / Remote Users page. | ||
Step 4 | Click the
Add (+)
icon. Enter the email address of the remote user and click
Save.
|
An email is sent to the Service Provider when the status of the remote user is changed.
![]() Note |
|
Step 1 | Log in to the Service Interface using your credentials. If a user belongs to many tenants, a drop-down is displayed to select the tenant. |
Step 2 | Click Search displayed at the top of the window. |
Step 3 | Enter an event name or a keyword in the search box. The list of matching events is displayed. |
![]() Note | To view the list of events that have occurred in your service, from the left navigation pane of the Service Interface, click Event Logs. You can filter these events by severity and time frame. |