Performing Administrative Tasks

This chapter describes how to perform administrative tasks using Cisco CMX. Users who are assigned administration privileges can perform administrative tasks.

Cisco CMX User Accounts

Prior to Cisco CMX 10.2 all Cisco CMX processes ran under the Linux root user account. Cisco CMX 10.2 introduces two new user accounts (cmx and cmxadmin) to prevent any potential risks and secure the system.

  • root: Root user account. Users should not use this account.


    Note


    The password of the root account is now being set and maintained by the system owners, and no longer has a default password configured. This way, the account is still available for special-case installation and tackling debugging issues, and the root user will be owned by the end-user. Password recovery is accomplished through the use of the single user login process. For more information see Resetting Password - Cisco CMX Release 10.6 and Later with CentOS 7.0.


  • cmx: A no login account that now owns all the CMX processes with the exception of postgress.

  • cmxadmin: Primary account used for the performance of all administrative tasks using CLI. User will sudo from this account to perform tasks requiring root-level access. This account is used to upgrade Cisco CMX 10.2 to a future release using GUI.

  • admin: Admin user account for configuring maps, and Cisco WLCs, and restart services using Cisco CMX Web UI.

  • normal user accounts: User-defined accounts. Use the cmxos apiserver user command to create/modify the Cisco CMX API users for this account.


Note


From Cisco CMX Release 10.5.0, you must install the root patch to access root user account. For more information about transferring and installing patches, see Transferring and installing patches on CMX 10.6 and above.


Unlocking Users

You can unlock CMX access for a command line interface (CLI) or graphical user interface (GUI) user after they have been locked out, using the cmxctl users unlock command. For caveats and full details, refer to see the Release Notes for Cisco CMX at:

https://www.cisco.com/c/en/us/support/wireless/connected-mobile-experiences/products-release-notes-list.html

Before you begin

You must have root access credentials to modify these settings.

Procedure


Step 1

Connect to CMX via SSH, or through the console if FIPS or UCAPL is enabled.

Step 2

Enter one of the following commands to unlock a CMX user:

  • cmxctl users unlock cli username to unlock a CLI user.
  • cmxctl users unlock gui username to unlock a GUI user.

The user can log in again from the user interface you unlocked.

Setting Strong Password Authentication

You can enable strong password authentication with or without enabling FIPS or UCAPL mode. If you do plan to enable FIPS or UCAPL, set the correct minimum values for that mode.

Before you begin

  • You must have CMX root user credentials to modify these settings.
  • If FIPS or UCAPL is enabled, you must connect directly from the console, or access the console through VMware VSphere client.

Procedure


Step 1

Connect to CMX via SSH, or through the console if FIPS or UCAPL is enabled.

Step 2

Enter the cmxctl config auth settings command to set password authentication settings.

Step 3

Respond to the following prompts:

Prompt

Action

Enable strong password [yes / no] [yes]:

Enable strong password authentication. Default is yes.
  • CMX default: Not required.
  • FIPS: Yes.
  • UCAPL: Yes.

Note

 

If Enable strong password is set to Yes, you can extend the password up to 127 characters. However, we recommend you to ensure that password should have minimum one lower case, one upper case, one digit and a special character.

Minimum password length [8-20] [8]:

Set minimum password length. The range is 8 to 20 characters. The default is 8 characters.

  • CMX default: 8 characters.
  • FIPS: 8-20 characters.
  • UCAPL: 15-20 characters.

Maximum password lifetime [1-9999] [9999]:

This is the duration after which the password will expire. You must change the password before it expires.

The range is 1 to 9999 days. The default for CMX is 9999 days.

  • CMX default: 9999 days. characters.
  • UCAPL: 60 days.

Password Expiry Warning Period [1-30] [14]:

Password expiry warning period duration. Range is 1-30 days.
  • CMX default: 14 days. characters.
  • UCAPL: 7 days.

Note

 

If the password of Cisco CMX user is going to expire within the duration specified, then a warning message is displayed about the password expiry immediately following the login.

On the Cisco CMX GUI, an alert window is displayed showing when the password is going to expire.

If you are logging into Cisco CMX using SSH and the Cisco CMX CLI account for which the password is going to expire within the specified warning period, a warning message is printed just after the login successful message and before the command prompt.

If password is already expired, then you will be redirected to change the password immediately after the login.

Unsuccessful login attempts before account lock [3-5] [3]:

Set the number of times a user can attempt to login before they are locked out for 30 minutes. Range is 3-5. Default is 3.
  • CMX default: Not required.
  • FIPS: 3-5.
  • UCAPL: 3.

Fail interval in minutes [1-120] [15] :

Set the fail interval time in minutes. Range is 1-120. Default is 15. Fail interval time is automatically set to 15 minutes when UCPAL mode is enabled.

Account lockout interval in minutes [1-120] [30] :

Set the account lockout interval time in minutes. Range is 1-120. Default is 30.

Set session timeout in minutes [1-720] [30] :

Set the number of minutes a user can be inactive on the system before CMX times out. Range is 10-120 minutes. There is no default session timeout.
  • CMX default: Not required.
  • FIPS: 30 minutes or less.
  • UCAPL: 10 minute timeout required.

Cisco CMX then restarts its authorization services.

Password Recovery

If you are using Cisco CMX Release 11.0.1, follow the process below to recover the password in console access.


Note


To recover the cmxadmin password, console access is mandatory. Console access can be a VM console or a physical console depending on the type of appliance used in the deployment.


Procedure


Step 1

Power on the Cisco CMX VM.

Step 2

Establish console access.

The System Setup window is displayed and stays for a span of five seconds.

Figure 1. Console Access

Step 3

Press e to edit the configuration.

Step 4

Use the arrow keys to navigate to the line starting with linux.

Step 5

At the end of the line, add the following text: rd.break enforcing=0.

Figure 2. System Setup Window

Step 6

Press Ctrl+x to exit the configuration and return to shell.

Step 7

Run the following commands:

  1. mount -o rw,remount /sysroot

  2. chroot /sysroot

Figure 3. Shell Access

Step 8

To change the password for cmxadmin, run the passwd cmxadmin command.

Figure 4. Password Change

Step 9

To complete the password recovery process, run the touch /.autorelabel command.

Step 10

To exit from the shell, run the exit command.

Step 11

To reboot, run the exit command.

Figure 5. Reboot

The system is rebooted and the Cisco CMX login prompt is displayed.

Step 12

On the Cisco CMX login prompt, log in with cmxadmin user and the new password.


Resetting Cisco CMX GUI Administrator Password

The GUI admin user password can be reset to the default of admin from the Cisco MSE CLI using the following command:

cmxctl users passwd username


Note


You should know the cmxadmin user password for CLI access. If you do not know the current cmxadmin password, follow the guidelines to reset the root password. For more information, see and Resetting Root Password - Cisco CMX Release 10.4 and Earlier with CentOS 6.0 and Resetting Password - Cisco CMX Release 10.6 and Later with CentOS 7.0.


Resetting Root Password - Cisco CMX Release 10.4 and Earlier with CentOS 6.0

Cisco CMX uses a single user mode to reset the root/cmxadmin user passwords.

To enter into the single user mode you require:

  • A (non-SSH) console connection to the Cisco Mobility Services Engine (Cisco MSE).

  • A power-cycle of the Cisco MSE appliance

For Cisco CMX Release 10.4 and below with CentOS 6.0 operating system to reset the root or cmxadmin password, perform the following tasks:

Procedure


Step 1

Establish console access.

Step 2

Power on the Cisco MSE.

Step 3

Press the Up arrow key within 6 seconds of the first text appearing on window.

Step 4

When the GRUB menu is displayed:

  1. Verify if the first entry is highlighted.

  2. Press the e key to edit.

Step 5

Use the Down arrow key to highlight the entry that begins with the word kernel.

  1. Press the e key to edit the entry.

  2. Press the space bar, type the word single , and then press Enter.

  3. Press the b key to boot the selected entry.

Step 6

After the system boots and you are at the # prompt:

  1. Enter passwd <username> and press Enter.

  2. When prompted, enter the new password for the user (root/cmxadmin) and press Enter.

  3. Re-enter the password to verify.

Step 7

Type reload and press Enter to reboot the system and load the Cisco CMX services.


Resetting Password - Cisco CMX Release 10.6 and Later with CentOS 7.0

To recover a password, console access is mandatory. Console access can be a VM console or a physical console depending on the type of appliance used in the deployment.

Procedure


Step 1

Establish console access.

Step 2

Break the boot sequence on the GRUB screen.

Step 3

Choose the entry for the Rescue mode and then press the e.key to edit.

If prompted for username or password, enter the credentials as username: root password: password (not the configured root password).

Step 4

In the code, navigate to the line linux16 and remove the last 2 parameters for rhgb and quiet.

Step 5

Add rd.break enforcing=0 in the same linux16 line.

Step 6

Press Ctrl+X to restart with the new parameters. After the system reboots, you are at the switch_root:/# prompt.

Step 7

Use the # mount -o remount,rw /sysroot command to mount the partition in read/write mode.

Step 8

Use # chroot /sysroot option to change the filesystem root.

Step 9

Use the # passwd command and enter the new root password.

Step 10

Use the # mount -o remount,ro / command to re-mount the partition in read-only mode.

Step 11

Enter the exit command twice to reboot the system and load the Cisco CMX services. The root password is successfully reset.


Setting Up External Server Authentication

Cisco CMX supports external AAA server authentication. Use external AAA authentication servers, such as Radius Server, and AD and allow Cisco CMX to delegate CMX’s authentication functionality to the external AAA server. With this, Cisco CMX users can be directly managed, added, and deleted directly in the AAA server.

When the feature is enabled, the local user management for Cisco CMX GUI users is suspended and local GUI users are deleted. When a Cisco CMX user tries to log in to the Cisco CMX GUI, Cisco CMX authenticates the user against the credentials stored in this external AAA server. After the user is authenticated, Cisco CMX provides access to the GUI based on the user’s role in Cisco CMX. From end-user perspective, this authentication by the AAA server is transparent and there is no change in the GUI behavior.


Note


  • You must ensure that the password in the RADIUS credentials does not include any of the following characters: !, @, #, $, %, ^, &, *, () and -. If you include these characters, Cisco CMX will fail authentication, and you will be unable to log in to the Cisco CMX GUI.

  • Cisco CMX does not support Terminal Access Controller Access-Control System (TACACS) protocol.


Procedure


Step 1

To configure external RADIUS authentication, run the cmxctl config authserver command.

Step 2

Use these subcommads as required:

  1. cmxctl config authserver delete : Removes the external RADIUS authentication server.

  2. cmxctl config authserver settings : Sets the external RADIUS authentication server.

  3. cmxctl config authserver show : Shows the external server configuration.


Configuring Cisco CMX Users in the External Authentication Server

Before enabling this feature, the passwords and roles of the Cisco CMX GUI users should be configured in the external authentication server. A Cisco CMX user’s ID and the role should be configured exactly as expected by Cisco CMX in this external authentication server.

Apart from this, a secret shared key should also be configured on the external authentication server. Later,the same shared key should be configured on Cisco CMX.

Configuring an External Authentication Server in Cisco CMX

You can configure an external authentication server using the cmxctl config authserver settings command. Provide the server IP address, shared secret key (which is already configured in the external authentication server, as described earlier), the local user name as a Last Resort user and the password.

If the connection to the external AAA server is lost due to some reason, a user can log in using this Last Resort user credentials, in which case, authentication is done by the Cisco CMX server itself. Thus, the system can function properly even if connectivity to the external AAA server is lost.

The following example shows how to configure an external RADIUS authentication server.

[cmxadmin@cmx]# cmxctl config authserver settings
Enter external RADIUS authentication server host : 1.2.3.4
Enter RADIUS server shared secret key : password
Configure local account. This account can be used if RADIUS server is not reachable.
Enter username : cmxadmin
Enter password :
Repeat for confirmation:
External RADIUS authentication server configured successfully

Configuring an External AAA Server with Cisco CMX

You can authenticate Cisco CMX users to connect with an external AAA server. For every authentication request, the server must sent Access-Accept or Access-Reject response packet depending upon the outcome of the authentication.

An external AAA server must be configured with the following details for AAA server and Cisco CMX to work together to perform external authentication. There are two types of AAA servers: Cisco ISE and freeradius.


Note


In Cisco CMX Release 10.6.3, the External Authentication (AAA) feature is enabled without the Federal Information Processing Standard 140-2 (FIPS) or the U.S. Department of Defense Unified Capabilities Approved Products List (UCAPL) mode. Prior to Cisco CMX Release 10.6.3, the External Authentication (AAA) feature was only available with UCAPL mode enabled.


Procedure


Step 1

Access-Accept response must include the following Vendor Specific Attribute (VSA) information with value as appropriate role corresponding to the authenticated user.

  1. Provide the Attribute value as Cisco-AVpair. For this VSA, provide Type as 1.

  2. Enter "shell:cmx-user-role=<ROLE>", wherein values for <ROLE> can be "Admin", "System", "Manage", "Location" and "Read Only".

    Note

     

    Value string is case-sensitive.

Step 2

For freeradius AAA server, the sample string for role Admin in "users" is Cisco-AVPair = "shell:cmx-user-role=Admin".

Step 3

For Cisco ISE, follow the steps:

  1. In section Policy> Policy Elements> Dictionaries > System> Radius> Radius Vendors (if not configured already), add Vendor or Vendor specific attribute (VSA).

    • Vendor ID: Enter the value as 9 (Cisco Systems).

    • VSA Type/ID: Enter the value as 1.

  2. Add a Network Device Profile and associate correct vendor dictionary that contains VSA.

  3. Add Cisco CMX as a Network Device and associate correct Network Device Profile.

  4. Create authorization policies that sends Access-Accept packets in response to authentication requests.

    • In the response, add Vendor Specific Attribute (Vendor ID=9 for Cisco Systems) named "cisco-avpair" (Type = 1) with a value of "shell:cmx-user-role=<ROLE>". <ROLE> can have the values "Admin", "System", "Manage", "Location" and "Read Only".

    Note

     

    Value string is case-sensitive.

  5. Create one authorization policy for every role that needs to be supported.

  6. Create Policy Set with required authorization policies.

    For more information on ISE configuration, see https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/215525-use-radius-for-device-administration-wit.html.

    Note

     

    Along with UDP port 1812, UDP port 500 must be accessible from Cisco CMX to AAA/ISE when using IPSec.


Displaying External Authentication Server Settings

To display the settings of the currently configured external authentication server, run the cmxctl config fips ucaplmode authserver show command.

[cmxadmin@cmx]# cmxctl config fips ucaplmode authserver show
External RADIUS authentication server host : 1.2.3.4
RADIUS server shared secret key : password
Local user : cmxadmin

Deleting External Authentication Server Settings

To delete the currently configured external authentication server settings, run the cmxctl config fips ucaplmode authserver delete command.

When these settings are deleted, CMX reverts to local user management. Standard CMX UI users are re-created locally and their passwords are set to default. If new users were added to External Authentication Server, prior to disabling feature, you will need to configure those users in CMX UI as well.


Note


If you have this feature enabled and later disable FIPS mode, this feature is also disabled and External Authentication Server details are deleted. Then CMX reverts to local user management as described above.

The following example shows how to delete the configured external authentication server settings.

[root@server]# cmxctl config fips ucaplmode authserver delete
External RADIUS authentication server is removed.

Setting Up Audit Logging

You can enable remote logging of system events, and specify which syslog events you want to log and view.

Before you begin

  • You must have CMX root user credentials to modify these settings.
  • If FIPS or UCAPL is enabled, you must connect directly from the console, or access the console through VMware VSphere client.

Procedure


Step 1

Connect to CMX via SSH, or through the console if FIPS or UCAPL is enabled.

Step 2

Enter the cmxctl config audit settings command.

Step 3

Respond to the following prompts. Enter selects the prompt default, shown in [brackets].

Prompt

Action

Enable or Disable Remote Syslogging [Enable / Disable] [Enable]:

Choose whether CMX should log system events. Options are Enable or Disable, and defaults to enable.

If logs size goes beyond l gb, drop or overwrite messages? [drop / overwrite] [overwrite]

Select CMX behavior when log size exceeds 1 gigabyte. Options are drop and overwrite, and defaults to overwrite.

Please enter rsyslog port [514]:

Optional. Enter the port number of a remote syslog server if you want to enable remote audit logging. The default is port number 514.

Please enter rsyslog DNS:

Optional. If your system uses a domain name server (DNS) for authentication, enter the DNS address here. There is no default. For example, yoursyslogserver.yourco.com

Please enter the email IDs (comma separated) for mail alerts:

List email IDs which need to receive important email alerts about audit logging.

A confirmation message displays.

Remote Audit Logging = Enabled

Step 4

Select the events you want Cisco CMX to log. Yes logs all events. No prompts you to select the event types you want to log, and confirms the update.

Show all logs [yes/no] [yes]: no
Enter day [today(1)/yesterday(2)/last week(3)/last month(4)/all(5)] [5]: 
Enter event type [MGMT_EVENT(1)/CONN_EVENT(2)/AUTH_EVENT(3)/CONF_EVENT(4)/ALL(5) [5]: 
Enter identity [root(1)/admin(2)/all(3)] [3]: 
Enter status [success(1)/failure(2)/all(3) [3]: 

Settings saved.

Note

 

In Cisco CMX, audit logging is not enabled for user-related activities such as modifying a user and monitoring the user modification activities. Audit logging is not available for the Settings option and associated actions such as filtering probing clients or tracking parameters.


CMX then restarts the affected loggers.

Example

This example shows how to log everything except Connection, Management, and Misc events.

[root@server]# cmxctl config audit settings enable

Enable or Disable Audit Logging [Enable / Disable] [Enable]:enable
If logs size goes beyond lgb, drop or overwrite messages? [drop / overwrite] [overwrite]:overwrite
Please enter rsyslog IP: 168.172.1.20
Please enter rsyslog port [514]: 514
Please enter rsyslog DNS: sls1296@wowco.com
Please enter the email IDs (comma separated) for mail alerts: email@example.com
Remote Audit Logging = Enabled
Please select the events to be logged
All Events [yes/no] [yes]: no
Connection Events [yes/no] [yes]:no
Management Events [yes/no] [yes]:no
Auth Events [yes/no] [yes]:
Configuration Events [yes/no] [yes]:
Security Configuration Events [yes/no] [yes]:
Security Events [yes/no] [yes]:
Misc Events [yes/no] [yes]:no
Settings saved.

Performing Scheduled Backup for Cisco CMX

You can use SSH File Transfer Protocol (SFTP) or Secure copy protocol (SCP) commands for backing up and restoring data on Cisco CMX 10.x. We recommend you to follow the below best practice for data backup automation.


Note


Cisco CMX does not support File Transfer Protocol (FTP) commands for managing data.


Procedure


To schedule a Cisco CMX backup capability, run the cmxos backupsched command.

For more information, see the Cisco CMX command reference guide.


Performing Manual Backup for Cisco CMX

After you install and run Cisco CMX successfully, you can take a backup to avoid losing any data.

You may lose data on your CMX server, if:

  • The hard disk in your CMX server fails

  • The data on your CMX server is corrupted while upgrading

Therefore, backing up your data enables you to restore it to the original state. You can back up data on either /tmp or /opt partition. The /tmp folder is allocated 25 GB storage.

If Cisco CMX contains huge amount of saved data, the backup operation will take up extra disk space. In that case, you can consider the following:

  • Back up to an external drive if there is not enough space on the Cisco CMX server. You can perform this operation by plugging in a removable hard disk or a mounted hard disk.

  • After the backup operation, move the backup file (using scp) to a different server and remove it from the Cisco CMX server.

You can backup data such as location history, current client location, floor maps, and licenses.


Note


We recommend that you backup database, floormaps, license and setup components to be compliant with General Data Protection Regulation (GDPR).

The following components are included in the backup:

  • Database—Stores configuration data, such as, maps, controllers, location, and aggregated analytics data.

  • Cache—Stores analytics repeat visits.

  • Cassandra—Stores location history data and analytics raw visits.

  • Influxdb—Stores metrics data for systems.

  • Consul—Stores Consul configurations.

  • Floormaps—Stores floor images for UI display.

  • Licenses—Stores Cisco CMX license information.

  • Setup—Stores CMX setup data.

  • Conf—Stores node configurations.

Procedure


To perform a backup operation, run the cmxos backup command using the cmxadmin (non-root user) account.

You can include the -i (for example, cmxos backup -i database) parameter with the backup so that you can choose the components that you want to include in the backup.

The other backup options available are:

  • --all—Include influxdb in the backup. The default is without influxdb and only includes postgres and Cassandra data.

  • --path—Specify a location for the backup file. The default location is /tmp.

  • --online—Perform the backup without stopping cmx services.

  • --offline—Stop cmx services first and then perform the backup.

Note

 
  • The destination directory for backup file requires rwx permission. When you specify a backup directory other than /tmp, ensure that the directory has "r/w/x" permission by user:cmx.

  • If High Availability is enabled on Cisco CMX, online backup is supported only on primary and not secondary. If High Availability is disabled, online and offline backups are supported on both primary and secondary.

The following is a sample output from the cmxos backup command:

[cmxadmin@test ~]$ cmxos backup
Please enter the path for backup file [/tmp]: /tmp
[17:01:30] Preparing for backup...
Data size 287388806
Available disk space 139165282304
Pre-backup took: 0.0118758678436 seconds
['database', 'cache', 'cassandra', 'influxdb', 'consul', 'floormaps', 'licenses' , 'setup', 'conf']
[17:01:30] Backup Database...
Backup database took: 1.15777993202 seconds
[17:01:32] Backup Cache...
Backup cache took: 0.383176088333 seconds
[17:01:32] Backup Cassandra...
Backup Cassandra DB took: 2.99715185165 seconds
[17:01:35] Backup InfluxDb...
Backup Influx DB took: 0.0846002101898 seconds
[17:01:35] Backup Consul...
Backup Consul took: 0.0185141563416 seconds
[17:01:35] Backup Floormaps...
Backup floor maps took: 0.000938892364502 seconds
[17:01:35] Backup licenses...
Backup licenses took: 0.000122785568237 seconds
[17:01:35] Backup setup...
Backup setup took: 0.000464200973511 seconds
[17:01:35] Backup node configuration...
Backup configuration took: 0.476609945297 seconds
[17:01:35] Creating tar file..
Post backup took: 16.3115179539 seconds
[17:01:52] Done Backup. Created backup file /tmp/cmx_backup_test.cisco.com_2015_07_28_17_01.tar.gz
[cmxadmin@test ~]$

What to do next

You can automate the backing up process. For more information, see Performing Scheduled Backup for Cisco CMX.

Increasing the Hard Disk Space

You can increase the hard disk space if your Virtual Machine that runs Cisco CMX is run out of disk space for backup.

Procedure


Step 1

Stop all the Cisco CMX services by entering the following commands:

cmxctl stop

cmxctl stop -a

Step 2

Shutdown the virtual machine by entering the following command:

Shutdown –h now

Step 3

Edit the virtual machine settings and increase the hard disk space.

Note

 
You cannot increase the hard disk space if the virtual machine was ever restored from snapshot.
Figure 6. Virtual Machine Settings

Step 4

Reboot the virtual machine.

After performing these steps, you can back up Cisco CMX.

You can enter the cmxctl status command to verify the status of CMX services. If any of the services is not running, you may need to restart it by entering the cmxctl restart <service name> command.


Restoring Data

After the backup, you can save the backup file in a safe location. If required, you can restore from this location.

To restore data, the Cisco CMX server must have free disk space which is 4 times the size of the backup file. If there is not enough disk space in the Cisco CMX server, you must increase the disk space. For more information, see Increasing the Hard Disk Space.


Note


  • The restore of backup data on a third-party server is not allowed.

  • Restoring Cisco CMX data must be done on a device that has the same local time as the device from which the data is collected.

  • Otherwise, you will not be able to correctly access the analytics data. In addition, the data will result in errors or zero values on reports.


Procedure


To restore the data, enter the cmxos restore command using the cmxadmin (non-root user) account.

You can include the -i (for example, cmxos restore -i database) parameter with the restore command so that you can choose the components that you want to restore.

The following is a sample output from the cmxos restore command:

[cmxadmin@cmx~]# cmxos restore
Please enter the backup file path: /tmp/cmx_backup_test.cisco.com_2015_07_28_17_01.tar.gz
Please enter the path for untar backup file [/tmp]: /tmp
[17:08:54] Preparing for restore...
Restore size 27866720
Available disk space in /tmp is 139137040384
Available disk space is 139424529077
[17:08:54] Untarring backup file...
[17:08:55] Stopping all services...
Pre restore took: 26.4669179916 seconds
[17:09:21] Restoring Database...
Created database mse
Running command /usr/bin/sudo -u postgres  pg_restore -d mse -Fc /tmp/cmx_backup_test.cisco.com_2015_07_28_17_01/postgres/mse.dump
Restored database mse
Restarting database...
Restore database took: 18.3071520329 seconds
[17:09:39] Restoring Cache...
Stopping cache_6383...
Restarting cache_6383...
Stopping cache_6380...
Restarting cache_6380...
...............
Stopping cache_6382...
Restarting cache_6382...
Stopping cache_6379...
Restarting cache_6379...
Stopping cache_6381...
Restarting cache_6381...
Stopping cache_6378...
Restarting cache_6378...
Restore Cache took: 46.7663149834 seconds
[17:10:26] Restoring Cassandra...
Stopping Cassandra...
Starting casandra
Creating cassandra scehma
...............
Restore Cassandra took: 29.5983269215 seconds
[17:10:56] Restoring Influxdb...
Stopping Influxdb...
Restarting Influxdb...
Restore Influx DB took: 13.9934449196 seconds
[17:11:10] Restoring consul...
Restore Consul took: 0.761927843094 seconds
[17:11:10] Restoring floormaps...
Restore floor maps took: 0.0269021987915 seconds
[17:11:10] Restoring licenses...
Restore licenses took: 0.00019907951355 seconds
[17:11:10] Restoring setup...
Restore setup took: 0.000532150268555 seconds
[17:11:10] Running Post Restore Tasks...
[17:11:10] Migrating Schemas...
[17:11:11] Migrating Cassandra schemas...
[17:11:12] Restarting all services...
stopping cassandra
Post restore took: 6.64956212044 seconds
[17:11:17] Starting all services...
...............
[17:12:45] Done
$

Encrypting the CMX /opt Directory

You can elect to encrypt CMX data in one of two ways:

  • CMX installation. You have the option to encrypt the /opt partition of the disk as part of the installation process, or to skip it. Refer to Cisco Mobility Services Engine Virtual Appliance Installation Guide for Cisco CMX, release 10.6 for more details.

  • The cmxos encryptdisk command. You have the option to run the encryption command after installation. The following task uses this option. Refer to Cisco CMX Command Reference, release 10.6 for more details.


Note


We recommend that you enable encryption at installation, or as soon as possible afterward. The encryption process requires time proportional to the amount of data present on the /opt partition.

Important


Encryption cannot be disabled or undone. It requires someone with root access credentials to manually enter the encrypted disk passphrase from the command line each time the device is rebooted or powered up.

Before you begin

  • You must have CMX root user credentials to modify these settings.
  • If FIPS or UCAPL is enabled, you must connect directly from the console, or access the console through VMware VSphere client.

Procedure


Step 1

Connect to CMX via SSH, or through the console if FIPS or UCAPL is enabled.

Step 2

Enter the cmxos encryptdisk command.

Step 3

At each of the following prompts, enter y to stop CMX and backup your data, or N to cancel. Data backup could take some time.

Have you closed all SSH sessions to this CMX? [y/N]:y
Are you sure you want to encrypt the /opt partition of the disk ? [y/N]:y

Checking disk space requirements for backing up /opt folder...
Looks Good.

Proceed with stopping all CMX services? [y/N]:y
Backing up /opt folder into /var ...
tar backup done.
Press Enter key to enter rescue mode and begin the encryption.

Step 4

Press Enter to continue. This process can take some time.

Shredding /opt ...
Shread: List of deleted folders
Shread: List of deleted folders
Shread: List of deleted folders
...
Formatting /opt ...
You will be prompted to set a passphrase for encrypted disk /opt.
Choose a passphrase, Enter and Verify it.

Note:
On every boot / power up, you will be prompted for this passphrase.
System will continue only if this passphrase is correct.

Step 5

Respond to the following prompt. If you enter YES, encryption is irreversable.

WARNING!
========
This will overwrite data on /dir/your_cmx/opt irrevocably.
Are you sure? (Type uppercase yes): YES

Step 6

Follow the prompts to select and confirm the encrypted disk passphrase.

Enter passphrase:
Verify passphrase:
Command successful.

Opening /opt ...
Enter passphrase for /dir/your_cmx/opt:

At this point, the encryption process begins in earnest. This process can take some time.

Step 7

When the process completes, press Enter at the prompt to reboot the disk.

Encryption of /opt is complete.

System will reboot now.
Upon (every) restart, when prompted to enter passphrase for /opt partition, 
enter the passphrase you just set.

Press Enter to continue with reboot

Step 8

Once the system reboots, enter the encrypted disk passphrase at the prompt.

Please enter passphrase for disk device_name_opt on /opt!:

Step 9

Log into Cisco CMX command line.


Display a Login Banner

You can create a banner that displays when users log into CMX.

Before you begin

  • You must have CMX root user credentials to modify these settings.
  • If FIPS or UCAPL is enabled, you must connect directly from the console, or access the console through VMware VSphere client.

Procedure


Step 1

Connect to CMX via SSH, or through the console if FIPS or UCAPL is enabled.

Step 2

Enter the cmxctl config banner edit command.

If there is an existing banner, CMX displays the text [within brackets]. If none, the brackets are empty.

Step 3

Enter the banner text:

  1. Type the text you want to display, and press Enter.

  2. On the second line, type a period, and press Enter.


Your new banner will display the next time a user logs in from a browser or from the command line.

Note


Use the cmxctl config banner show command to display the login banner.

Use the cmxctl config banner disable to disable the login banner.

For more information about the cmxctl config banner command, see https://www.cisco.com/c/en/us/td/docs/wireless/mse/10-6/cmx_command/cmxcli106.html.


Example

This example creates the following login banner: "All users must have a valid client certificate on file to log in."
 
Current Login Banner = []
Enter text to be displayed as login banner. Enter a single period on a line to terminate.

All users must have a valid client certificate on file to log in.
.
starting /usr/sbin/sshd... \c
done.

When you opened CMX in a browser, you would see something similar to this:

Figure 7. Example of a login banner from a browser

Logging in from the command line, you would see something similar to this:

login as: cmxadmin
All users must have a valid client certificate on file to log in.
cmxadmin@192.168.1.20's password:

Managing NTP Servers

You can set up multiple Network Time Protocol (NTP) servers in Cisco CMX. You can add 2 types of NTP servers in Cisco CMX – unauthenticated NTP Server and and authenticated. You can add either a single unauthenticated NTP server or add up to 2 authenticated NTP servers.

Configuring Authenticated NTP Server

Before you begin

You need to decide on a local password for CMX’s NTP client.

Procedure


Step 1

On NTP Server with Chronyd Service, verify if the settings are configured at /etc/chrony.conf.

[cmxadmin@cmx]#  cat /etc/chrony.conf 
#servers to synchronize from 
server ntp.server.example.com iburst 
allow 192.0.1.1/24 
makestep 1.0 3 
keyfile /etc/chrony.keys 
leapsectz right/UTC 
logdir /var/log/chrony

Step 2

To find unused key ID from /etc/chrony.keys, run the grep -v '#' |grep -v "$"

[cmxadmin@cmx]# cat /etc/chrony.keys | grep -v '#' |grep -v "$" 
1 SHA256 HEX: C4ECA8710F9E93C54EE6388BBC05D8D9FD71CAC111688C1260CB64C60C708882 
5 SHA256 HEX: DAE5F1D3C746988ABABCBF0A9FB53D0A6D004DF827814884F4CD2049156494A6 

In the above example, 1 and 5 are already in use.

Step 3

Select any unused key ID. For example, 21.

Step 4

Generate the key using the selected number (for example, 21) and hash algorithm of SHA256 or SHA384 or SHA512.

Step 5

Save the same in the location /etc/chrony.keys file.

[cmxadmin@cmx]# chronyc keygen 21 SHA256 256 | tee -a /etc/chrony.keys 
21 SHA256 HEX: 0E50E2818864DA450CEC234A332B9169A24EA7CF3B8D179E542805F1E1AC8EFB 

Step 6

From the command output, copy or export the the ENCRYPTED PRIVATE KEY block, for example 21 SHA256 HEX: 0E50E2818864DA450CEC234A332B9169A24EA7CF3B8D179E542805F1E1AC8EFB.

Step 7

To restart the chronyd services, run the systemctl restart chronyd command.

Step 8

SCP the file to Cisco CMX server.

Step 9

Connect to CMX command line either from a console, or from a VMWare vSphere console.

Step 10

To delete all the NTP configurations, run the cmxos ntp clear command.

Step 11

To configure authenticated NTP server:

  1. Run the cmxos ntp type command.

  2. Enter the hostname or IP addresses of the NTP server.

  3. Enter the server key.

[cmxadmin@cmx]# cmxos ntp type 
Current NTP Type = <Not Set> 
Select NTP Type [1] Unauthenticated, [2] Authenticated or [3] Skip (1, 2, 3) [3]:2 
  
Changing the NTP Type Authenticated 
  
Enter hostname / IP for NTP Server #1 (blank to skip) (): 192.0.2.1 
Please ensure Server Key has Hashing algo either SHA256, SHA384 or SHA512 only 
Please enter the Server Key (Correct Key Format sample -> 1 SHA256 HEX:E78EE456FF9AD89279411E51071AE86CE1DE4016): 21 SHA 
256 ΗΕΧ: ΘΕ50E2818864DA450CEC234A33289169A24EA7CF3B8D179E542865F1E1AC8EFB 
Checking 1+ server 192.0.2.1 15 reachable 
OK 
Key file successfully replaced and permissions set. 
NTP Server added successfully 
  
Chrony Service restarted successfully 

Step 12

Repeat step 11 to add the second NTP server.

Note that you need to wait for a few minutes for the NTP servers to sysnchronize.

Step 13

(Optional) To verify the status of the NTP server configuration, run the cmxos ntp status command. Add --verbose to get detailed status.

[cmxadmin@cmx]# cmxos ntp status
NTP Type = Authenticated 
Server  = 192.0.1.2 
Status  = Synchronized 
Key  = 1 SHA256 HEX:E78EE456FF9AD89279411E51071AE86CE1DE4D16 
[cmxadmin@cmx]# cmxos ntp status --verbose 
NTP Type = Authenticated 
Server  = 192.0.1.2 
Status  = Synchronized 
Key  = 1 SHA256 HEX:E78EE456FF9AD89279411E51071AE86CE1DE4D16 
  
  .-- Source mode  '^' = server, '=' = peer, '#' = local clock. 
 / .- Source state '*' = current best, '+' = combined, '-' = not combined, 
| /             'x' = may be in error, '~' = too variable, '?' = unusable. 
||                                                 .- xxxx [ yyyy ] +/- zzzz 
||      Reachability register (octal) -.           |  xxxx = adjusted offset, 
||      Log2(Polling interval) --.      |          |  yyyy = measured offset, 
||                                \     |          |  zzzz = estimated error. 
||                                 |    |           \ 
MS Name/IP address         Stratum Poll Reach LastRx Last sample 
=============================================================================== 
^* 10.22.244.168                 2   6   377    63    -24us[  -32us] +/-  722us 
  
Remote address  : 192.0.1.2 (0A16F4A8) 
Remote port     : 123 
Local address   : 192.0.1.3 (0A16F4A4) 
Leap status     : Normal 
Version         : 3 
Mode            : Server 
Stratum         : 2 
Poll interval   : 6 (64 seconds) 
Precision       : -24 (0.000000060 seconds) 
Root delay      : 0.000763 seconds 
Root dispersion : 0.000183 seconds 
Reference ID    : AB442642 () 
Reference time  : Fri Oct 18 07:43:39 2024 
Offset          : +0.000032190 seconds 
Peer delay      : 0.000315516 seconds 
Peer dispersion : 0.000000089 seconds 
Response time   : 0.000204549 seconds 
Jitter asymmetry: +0.00 
NTP tests       : 111 111 1111 
Interleaved     : No 
Authenticated   : Yes 
TX timestamping : Kernel 
RX timestamping : Kernel 
Total TX        : 14 
Total RX        : 14 
Total valid RX  : 14 
Total good RX   : 14 
Name/IP address             Mode KeyID Type KLen Last Atmp  NAK Cook CLen 
========================================================================= 
192.0.1.2                 SK     1    3  160    -    0    0    0    0 

Note

 

If you want to change NTP type from unauthenticated to authenticated or vice versa, you can change it using following commands:

  1. Run the cmxos ntp clear command to clear current NTP settings.

  2. Run the cmxos ntp type command to select appropriate type.


Configuring Unauthenticated NTP Server

To add unauthenticated NTP server, follow these steps:

Procedure


Step 1

Connect to CMX command line either from a console, or from a VMWare vSphere console.

Step 2

To delete all the NTP configurations, run the cmxos ntp clear command.

Step 3

To configure unauthenticated NTP server, run the cmxos ntp type command, followed by the IP addresses of the NTP server.

Step 4

(Optional) To verify the status of the NTP server configuration, run the cmxos ntp status command.


Updating Auntenticated NTP Server Parameters

To update configured authenticated NTP server parameters, follow the steps:

Procedure


Step 1

To change the local password and set a new password, run the cmxos ntp auth password command.

1. If you want to change the local password, execute cmxos ntp auth password command and set the new password

[cmxadmin@cmx]# cmxos ntp auth password
Enter local password:
Repeat for confirmation:
Password changed and host key/cert file generated successfully.
[cmxadmin@cmx-vmdev282 ~]$

Step 2

To add/delete NTP server details, run the cmxos ntp auth servers command.

[cmxadmin@cmx]# cmxos ntp auth servers
	
Server 1 is already configured with IP 1.2.3.4

Do you want to (1) Edit (2) Delete (3) Skip ? [1]: 3
Enter hostname / IP for NTP Server #2 (blank to skip) []: 1.2.3.5
Please enter complete path of exported IFF (encrypted) key file: /tmp/iffkey2
Checking if server 1.2.3.5 is reachable ...
OK
Key file successfully saved as ntpkey_iffkey_ntpserver2.3747444855
NTP Server added successfully

NTP Service restarted successfully

Note

 

If you need to restart NTP service, run the cmxos ntp restart command. It will restart NTP daemon. Run cmxos ntp status command to check the NTP status. You can add --verbose option to the command if you want detailed output.

[cmxadmin@cmx]# cmxos ntp restart
NTP Service restarted successfully

Troubleshooting Cisco CMX Server Shutdown Problems

The Cisco CMX server shuts down all the services when disk space usage reaches 85 percent. If you encounter this issue, create additional disk space on your Cisco CMX server by deleting unnecessary files, if any, from the server. Run the cmxos clean find/normal command to find unnecessary files and delete it to free some disk space.

After you have sufficient space, you can choose to restart your Cisco CMX server by running the cmxctl start –a command, if required.

Performing Periodic Maintenance for Cisco CMX

We recommend scheduling a maintenance window every two months to restart Cisco CMX software (system and application services). Perform this periodic maintenance on both High Availability and standalone setups. It takes up to five minutes and helps Cisco CMX reclaim system resources, improving performance. From an operations perspective, this results in approximately 30 minutes of scheduled downtime per year.

Schedule a full restart of Cisco CMX once a month during low activity times, such as late at night or early in the morning, to clean up long queues and long-running processes. The restart takes approximately 5 minutes to complete.

To restart Cisco CMX, follow the steps

Procedure


Step 1

To shut down a Cisco CMX service, run the cmxctl stop -a command:

Step 2

To kill services, run the cmxos kill command:

Step 3

To restart agent, run the cmxctl agent restart command:

Step 4

To restart a Cisco CMX service, run the cmxctl start command:

Step 5

To start Cisco CMX API server, run the cmxos apiserver start command:


Periodic Maintenance for Automatic Failover

The purpose of this task is to perform periodic maintenance for Cisco CMX in a High Availability setup.

Follow these steps to perform periodic maintenance for automatic failover.

Before you begin

Verify if the High Availability status is active with failover type as Automatic.

Procedure


Step 1

On the terminal, run the cmxos reboot command to reboot the Secondary Cisco CMX.

Example:


[cmxadmin@cmx-host ~]$ cmxos reboot

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

!!!!!!! CONFIRM REBOOT !!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

Are you sure you want to reboot?: y

Rebooting.

Step 2

Wait for the Secondary Cisco CMX to return to the Secondary Active state.

Example:

[cmxadmin@cmx-host ~]$ cmxha info
Version                      : 11.1.0-718
Current Server Time          : Mon Jul 7 14:12:27 2025
State                        : Secondary Active
State Description            : Secondary is actively synchronizing with primary server
State Last Updated Time      : Mon Jul 7 13:52:46 2025
Keepalived State             : Backup
Keepalived Updated Time
Role : Mon Jul 7 13:53:22 2025
Role                         : SECONDARY

Wait approximately for 30 minutes for High Availability to stabilize.

Figure 8. High Availability

Step 3

Shutdown or reboot the Primary VM.

  1. Power down the Primary VM from the ESXi client and then power it on.

  2. On the Primary Cisco CMX, run the cmxos reboot command. When prompted for failover, select "n" (No).

Example:


[cmxadmin@cmx-host ~]$ cmxos reboot
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!! CONFIRM REBOOT !!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

Are you sure you want to reboot?: yes

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!! High Availability Failover !!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

Failover before the reboot?: N
Rebooting.
Automatic failover is triggered on the Secondary Cisco CMX.

Step 4

Wait until the Secondary Cisco CMX enters the Secondary Failover Active state.

Example:


[cmxadmin@cmx-host ~]$ cmxha info

Version                 : 11.1.0-718
Current Server Time     : Mon Jul 7 14:59:59 2025
State:                  : Secondary Failover Active
State Description       : Secondary is failed over and actively running on the secondary
State Last Updated Time
: Mon Jul 7 14:39:09 2025
Keepalived State        : Master
Keepalived Updated Time : Mon Jul 7 13:53:22 2025
Role                    : SECONDARY

Step 5

Wait until the Primary Cisco CMX enters the Primary Failover Active state.

Example:

[cmxadmin@cmx-host ~]$ cmxha info

Version                 : 11.1.0-718
Current Server Time     : Mon Jul 7 14:59:59 2025
State:                  : Primary Failover Active
State Description       : Secondary is active
State Last Updated Time
: Mon Jul 7 14:39:44 2025
Keepalived State        : Stopped
Keepalived Updated Time : Mon Jul 7 14:39:27 2025
Role                    : PRIMARY
Wait approximately for 30 minutes for High Availability to stabilize.

Step 6

Verify that all Cisco CMX services are running on Secondary Cisco CMX. Run the cmxctl status command.

The command output displays the status of all services.

Step 7

On the Secondary Cisco CMX terminal, to initiate the failback, run the cmxha failback command.

Step 8

To verify if the Primary Cisco CMX transitions to Primary Active and the Secondary Cisco CMX transitions to Secondary Active state respectively, run the cmxha info command.

Figure 9. Active State Verification

Periodic Maintenance for Manual Failover

The purpose of this task is to perform periodic maintenance for Cisco CMX in a High Availability setup.

Follow these steps to perform periodic maintenance for manual failover.

Before you begin

Verify that High Availability status is Primary Active (for Primary Cisco CMX) and Secondary Active (for Secondary Cisco CMX) with failover type set as Manual.

Procedure


Step 1

On the terminal, run the cmxos reboot command to reboot the Secondary Cisco CMX.

Example:


[cmxadmin@cmx-host ~]$ cmxos reboot

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

!!!!!!! CONFIRM REBOOT !!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

Are you sure you want to reboot?: y

Rebooting.

Step 2

Wait for the Secondary Cisco CMX to return to the Secondary Active state.

Example:

[cmxadmin@cmx-host ~]$
cmxha info
Version                      : 11.1.0-718
Current Server Time          : Mon Jul 7 14:12:27 2025
State                        : Secondary Active
State Description            : Secondary is actively synchronizing with primary server
State Last Updated Time      : Mon Jul 7 13:52:46 2025
Keepalived State             : Backup
Keepalived Updated Time
Role : Mon Jul 7 13:53:22 2025
Role                         : SECONDARY

It takes 30 minutes for High Availability to stabilize.

Figure 10. High Availability

Step 3

On the Primary Cisco CMX, run the cmxha failover to trigger a manual failover.

Manual Failover is triggered on the Secondary Cisco CMX.

Step 4

Wait for the Secondary Cisco CMX to return to the Secondary Failover Active Active state.

Example:


[cmxadmin@cmx-host cmxha info

Version                 : 11.1.0-718
Current Server Time     : Mon Jul 7 14:59:59 2025
State:                  : Secondary Failover Active
State Description       : Secondary is failed over and actively running on the secondary
State Last Updated Time
: Mon Jul 7 14:39:09 2025
Keepalived State        : Master
Keepalived Updated Time : Mon Jul 7 13:53:22 2025
Role                    : SECONDARY

Step 5

Reboot the Primary VM.

  1. Power down the Primary VM from the ESXi client and then power it on.

  2. On the Primary Cisco CMX, run the cmxos reboot command. When prompted for failover, select "n" (No).

Example:


[cmxadmin@cmx-host ~]$ cmxos reboot

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!! CONFIRM REBOOT !!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

Are you sure you want to reboot?: yes

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!! High Availability Failover !!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

Failover before the reboot?: N
Rebooting.

Step 6

Wait until the Primary Cisco CMX enters the Primary Failover Active state

Example:


[cmxadmin@cmx-host ~]$ cmxha info

Version                 : 11.1.0-718
Current Server Time     : Mon Jul 7 14:59:59 2025
State:                  : Primary Failover Active
State Description       : Secondary is active
State Last Updated Time
: Mon Jul 7 14:39:44 2025
Keepalived State        : Stopped
Keepalived Updated Time : Mon Jul 7 14:39:27 2025
Role                    : PRIMARY

Wait approximately for 30 minutes for High Availability to stabilize.

Step 7

Verify that all Cisco CMX services are running on Secondary Cisco CMX. Run the cmxctl status command.

The command output displays the status of all services.

Step 8

On the terminal of the Secondary Cisco CMX, to initiate the failback, run the cmxha failback command.

Step 9

To verify that the Primary Cisco CMX transitions to the Primary Active state and the Secondary Cisco CMX transitions to the Secondary Active state, run the cmxha info command.

Figure 11. Active State Verification