Table Of Contents
Adding and Managing VNEs, AVMs, Units, and the Gateway Server
Managing the Gateway
Managing Units (and High Availability)
Adding a New Unit (and Setting Up High Availability)
Viewing and Editing Unit Properties
Removing a Unit
Managing AVMs
Understanding AVM Status
Creating an AVM
Viewing and Editing AVM Properties
Changing AVM Status (Start or Stop)
Moving an AVM
Deleting an AVM
Managing VNEs
Understanding VNE Status and VNE States
Prerequisites for Adding VNEs to AVMs
Using Network Discovery to Add Bulk VNEs
Configuring and Performing Network Discovery
Importing Network Elements from a Seed File
Defining and Creating Individual VNEs
Viewing and Editing VNE Properties and Schemes
Changing VNE Status (Start, Stop, Maintenance)
Moving One or More VNEs
Deleting a VNE
Adding and Managing VNEs, AVMs, Units, and the Gateway Server
These topics describe how to add, delete, and maintain network elements in Cisco ANA. They also describe the various states and statuses that are displayed in the Cisco ANA GUI client.
•
Managing the Gateway, describes how to use the cmpctl command to manage and get information on the gateway server.
•
Managing Units (and High Availability), describes how to add and manage units on the gateway server, and how to configure unit and AVM failover using the high availability feature.
•
Managing AVMs, describes how to add and manage AVMs on units, describes AVM status (admin and operational), and lists the default AVMs that are part of Cisco ANA.
•
Managing VNEs, describes how to add VNEs to AVMs in bulk using network discovery, how to add VNEs individually, and how to manage VNEs; it also describes VNE status (operational and admin) and VNE states (investigation and communication).
You must have Administrator privileges to use these functions, unless otherwise noted.
The following topics describe how to perform basic management tasks. Refer to these topics for administration information:
•
Cisco ANA Administration, page 13-1, explains how to manage polling groups and high availability protection groups for AVMs (for unit and AVM high availability); how to add users and scopes; and how to back up and restore data on the Solaris gateway server. It also contains information on system security.
•
Cisco ANA System Health and Diagnostics, page 14-1, provides procedures for checking basic system (CPU, memory) health, creating traffic graphs, running diagnostic jobs, getting database information, gathering logs, and checking connectivity.
Managing the Gateway
As described in Cisco ANA Architecture, page 1-6, the gateway enforces access control and security for all connections and manages client sessions. It maintains a repository of system settings, topological data, and snapshots of active alarms and events. The gateway also maps network resources to the business context, which enables Cisco ANA to contain information that is not directly contained in the network (such as VPNs and subscribers) and display it to northbound applications.
These topics provide more information on how to manage the gateway server, and the roles required:
•
Getting Information on Configured Gateway Servers Using the GUI Client
•
Managing the Gateway Server Using the cmpctl Command
•
Roles Required to Stop or Start the Gateway
To connect to a gateway, download and install the client software on your client machine. Installing the gateway and client software is described in Cisco Active Network Abstraction 4.0.2 Installation and Setup Guide, along with other basic setup information.
Getting Information on Configured Gateway Servers Using the GUI Client
Before You Begin
Be sure to configure Network Time Protocol (NTP) on the gateway so that all network elements are synchronized to a common time base (UTC).
To get information about configured gateways:
Step 1
In the Administration perspective, click the Objects tab in the navigation pane and click the ANA Servers drawer. (If you click the Servers tree, Cisco ANA dibove the splays the gateway and units that are configured on the system.)
Step 2
Click the Servers tree and click a gateway. The gateway workspace(above the tabular list) displays the following information about all gateway servers on the system. (If you do not have any separate units, and instead all of your AVMs are on the gateway, the gateway acts as both a gateway and a unit and may display additional information. See Viewing and Editing Unit Properties.)
Field
|
Description
|
IP Address
|
The IP address of the gateway.
|
Up Since
|
The date and time that the gateway was started.
|
Used Memory
|
The maximum memory used by the gateway. (Used memory is the sum of the memory used by all the AVMs that are up.)
|
Status
|
The administration status of the gateway (Up or Down, similar to the status for units, AVMs, and VNEs).
|
Physical Memory
|
The physical memory of the gateway.
|
Allocated Memory
|
The amount of memory allocated to the gateway. Allocated memory is the sum of all the memory settings for all the AVMs.
|
The table below the workspace provides information about the units or AVMs installed on the gateway. These are described in Viewing and Editing Unit Properties, and Viewing and Editing AVM Properties.
The log for the gateway server process is stored in ANAHOME/Main/logs/11.log.
Managing the Gateway Server Using the cmpctl Command
You can use the cmpctl command to start and stop the gateway and all component processes (including AVMs you created), or just perform a general check of the system status. The cmpctl command is located in ANAHOME/Main (ANAHOME is the installation directory, normally /export/home/ana41). It takes the following arguments:
cmpctl [ options ] [ start | stop | status | restart ]
start
|
Starts the gateway process. With no options, this command starts the gateway server and all component processes.
|
stop
|
Stops the gateway process. With no options, this command stops the gateway server and all component processes.
|
restart
|
Stops and starts the gateway processes. With no options, this command stops and restarts the gateway server and all component processes.
|
status
|
Displays the status of the gateway processes.
|
options
|
-avm avm_id,avm_id,...
|
Performs the action on the AVM specified by avm_id (for example, AVM111, AVM112). For all AVMs, use *.
|
-unit unit_ip,unit_ip,...
|
Performs the action on the unit specified by unit_ip (for example, 192.168.01.01). For all units, use *.
|
-jboss
|
Performs the action on the JBoss process.
|
You must be logged in as anauser to use this command. The following is an example.
# cd /export/home/ana41/Main
.-= Welcome to anaserver, running Cisco ANA gateway =-.
+ Checking for services integrity:
- Checking if host's time server is up and running [OK]
- Checking if blood test webserver daemon is up and running [OK]
- Checking if secured connectivity daemon is up and running [OK]
- Checking if license server is up and running [OK]
+ Detected AVM99 is up, checking AVMs
- Checking for AVM112's status [OK]
- Checking for AVM113's status [OK]
- Checking for AVM66's status [OK]
- Checking for JBoss status [OK]
- Checking for AVM11's status [OK]
- Checking for AVM55's status [OK]
- Checking for AVM100's status [OK]
- Checking for AVM0's status [OK]
Note Checking if host's time server is up and running is the only item that can safely
have a status of DOWN. Everything else must display OK.
cmpctl could display any of the following status indictors:
OK
|
Service or AVM is up and running.
|
DOWN
|
Service or AVM is down.
|
LOADED
|
Service is down, but the system is trying to start (load) it.
|
EVAL
|
License service is running with an evaluation license.
|
DISABLED
|
AVM has been stopped.
|
If you would like to configure gateway high availability, contact ask-ana@cisco.com.
See these topics for more information on managing and administering the gateway server:
•
Cisco ANA Administration, page 13-1, explains how to manage polling groups, high availability protection groups for AVMs, (for unit and AVM high availability); how to add users and scopes; backing up and restoring data. It also contains information on system security.
•
Cisco ANA System Health and Diagnostics, page 14-1, provides procedures for checking basic system health (CPU, memory), creating traffic graphs, running diagnostic jobs, getting database information, gathering logs, and checking connectivity.
Roles Required to Stop or Start the Gateway
Table 2-1 lists the roles that are required to stop or start the gateway. For more information on roles, see Creating and Managing Users, Passwords, and Scopes, page 13-34.
Table 2-1 Roles Required to Stop or Start the Gateway
Task
|
Role Required
|
Stopping or starting the gateway using cmpctl
|
Administrator
|
Related Topics
•
Managing Units (and High Availability)
•
Managing AVMs
•
Managing VNEs
Managing Units (and High Availability)
As described in Cisco ANA Architecture, page 1-6, the interconnected fabric of units comprises the lowest level of the Cisco ANA architecture. Each unit manages a group of network elements. Units host the autonomous VNEs. This creates a fabric of interconnected VNEs which can intercommunicate with other VNEs (regardless of which unit they are running on). Cisco ANA also provides a high ability mechanism to protect the system in case a unit malfunctions. If the unit is configured for high availability, Cisco ANA switches over to the redundant standby unit, with no loss of information accumulated to that point.
For more information on high availability, see Managing Protection Groups and High Availability, page 13-9.
To check the basic system health of a unit, see Cisco ANA System Health and Diagnostics, page 14-1.
See these topics for more information:
•
Adding a New Unit (and Setting Up High Availability)
•
Viewing and Editing Unit Properties
•
Removing a Unit
Roles Required to Manage Units
Table 2-2 lists the roles that are required to manage units. For more information on roles, see Creating and Managing Users, Passwords, and Scopes, page 13-34.
Table 2-2 Roles Required to Manage Units
Task
|
Role Required
|
Adding a unit
|
Administrator
|
Viewing unit properties
|
Administrator
|
Editing unit properties
|
Administrator
|
Finding units
|
Administrator
|
Removing units
|
Administrator
|
Related Topics
•
Managing Protection Groups and High Availability, page 13-9
•
Managing the Gateway
•
Managing AVMs
•
Managing VNEs
Adding a New Unit (and Setting Up High Availability)
After you install the Cisco ANA software on a unit, you can add it to the Cisco ANA fabric. Cisco ANA automatically registers the unit in the registry. The units are linked to the gateway in a star topology.
In addition, administrators can enable or disable high availability for a unit. These settings enable the administrator to define to which protection group a unit is assigned, and whether it is enabled for high availability. For more information on high availability, see:
•
Configuring High Availability for Units, page 13-17
•
High Availability Events and Default Settings for Failover, page 13-21
Before You Begin
•
Before adding a unit, you must install the Cisco ANA software on the unit as described in the Cisco Active Network Abstraction 4.1.2 Installation and Setup Guide.
•
If you want to configure unit high availability, verify that the unit's protection group has been configured. See Managing Protection Groups and High Availability, page 13-9.
To add a new unit:
Step 1
In the Administration perspective, click the Objects tab and click the ANA Servers drawer.
Step 2
Right-click the Servers tree and choose New ANA Unit. The New ANA unit dialog box is displayed.
Step 3
Enter the following information:
a.
Unit IP Address—Enter the unique IP address of the unit.
b.
Gateway IP Address—IP address of the gateway server for the unit.
c.
Unit Protection—Click the appropriate radio button to indicate the unit's high availability configuration:
–
Protected—Enable high availability for the unit (the default).
–
Unprotected—Do not enable high availability for the unit.
–
Standby—Designate the unit to be a standby for a protection group.
Note
It is highly recommended that you do not select Unprotected. For more information about configuring standby units, see Configuring High Availability for Units, page 13-17.
d.
Protection Group—If you selected Protected or Standby for unit protection, choose a protection group from the drop-down list of available groups. (Protection groups are described in Managing Protection Groups and High Availability, page 13-9.)
Step 4
Click OK. The new unit is displayed in the tree pane and the workspace.
Step 5
If the unit is configured for high availability and you have configured devices to forward traps to a unit, you should also configure the devices to send traps to the standby unit. (If the unit goes down, when the standby unit comes up, AVM 100 on the standby unit broadcasts to the VNEs, and the VNEs register to it to start receiving traps from the new AVM 100.) See Trap Forwarding, page 13-23.
If the new unit is installed and reachable it starts automatically. The active unit is registered with the gateway. Specifically, the command creates the configuration registry for the new unit in the registry.
Related Topics
•
Roles Required to Manage Units
•
Cisco ANA System Health and Diagnostics, page 14-1
•
Managing Protection Groups and High Availability, page 13-9
•
Viewing and Editing Unit Properties
•
Removing a Unit
Viewing and Editing Unit Properties
To view or edit a unit's properties:
Step 1
In the Administration perspective, click the Objects tab and click the ANA Servers drawer.
Step 2
Open the Servers tree and click any unit.
Step 3
The unit workspace (above the tabular list) displays the following information. If the unit is inactive, some of the following information is not displayed.
Field
|
Description
|
IP Address
|
The IP address of the unit.
|
Up Since
|
The date and time that the unit was started.
|
Used Memory
|
The maximum memory used by the unit. (Used memory is the sum of the memory used by all the AVMs that are up.)
|
Protection Group
|
The protection group to which the unit is assigned.
|
Status
|
The administration status of the unit (Up or Down, similar to the status for gateways, AVMs, and VNEs).
|
Physical Memory
|
The physical memory of the unit.
|
Allocated Memory
|
The amount of memory allocated to the unit. Allocated memory is the sum of all the memory settings for all the AVMs.
|
AVM HA
|
Indicates whether the AVM watchdog protocol is enabled. (See Managing the Watchdog Protocol on AVMs, page 13-20.)
|
The table below the workspace provides information about the AVMs installed on the gateway. These are described in Viewing and Editing AVM Properties.
Step 4
You can change the assigned unit protection group, as required, by choosing an option from the list.
The AVM HA check box defines whether the watchdog protocol is enabled. This should be checked. (See Managing the Watchdog Protocol on AVMs, page 13-20.)
When you change (disable or enable) the Enable Unit Protection option (high availability), changes are effective after a delay of about 15 minutes.
Step 5
Exit the window. If you made any changes, you are prompted to confirm them.
Related Topics
•
Roles Required to Manage Units
•
Cisco ANA System Health and Diagnostics, page 14-1
•
Managing Protection Groups and High Availability, page 13-9
•
Adding a New Unit (and Setting Up High Availability)
•
Removing a Unit
Removing a Unit
Before You Begin
Delete all the VNEs and unreserved AVMs before deleting a unit; see Deleting an AVM. The reserved AVMs cannot be deleted.
Use this procedure to remove a unit:
Step 1
In the Administration perspective, click the Objects tab and click the ANA Servers drawer.
Step 2
Open the Servers tree, right-click the unit you want to delete and choose Delete. A warning message is displayed.
Step 3
Click Yes to proceed or No to cancel the operation. A confirmation message is displayed.
Step 4
Click OK. The unit is deleted and is no longer displayed in the navigation area or workspace.
Related Topics
•
Roles Required to Manage Units
•
Cisco ANA System Health and Diagnostics, page 14-1
•
Managing Protection Groups and High Availability, page 13-9
•
Adding a New Unit (and Setting Up High Availability)
•
Viewing and Editing Unit Properties
Managing AVMs
As described in Cisco ANA Architecture, page 1-6, AVMs are Java processes that provide the necessary distribution support platform for executing and monitoring multiple VNEs. AVMs and VNEs commonly reside on Cisco ANA units but some also reside on a Cisco ANA gateway. The following AVMs are always created on the gateway; some are also created on units. These cannot be edited or deleted.
AVM #
|
Purpose
|
Is installed on...
|
Can be checked using...
|
AVM 0
|
High Availability/Switch AVM—Enables communication between the unit with other units, as well as the gateway.
|
Gateway
|
cmpctl status
|
AVM 11
|
Gateway server AVM—???(Definition)
|
Gateway
|
cmpctl status
|
AVM 55
|
Inventory service AVM—Provides modeling information.
|
Gateway
|
cmpctl status
|
AVM 66
|
Workflow engine AVM—Defines rules and dependencies to activate business and network processes.
|
Gateway
|
GUI client and cmpctl status
|
AVM 99
|
Management AVM—Manages the unit and the other AVMs running on the unit (or gateway, if there are no separate units).
|
Gateway and units
|
cmpctl status
|
AVM 100
|
Trap management AVM—Processes syslogs and traps.
Note Only one AVM 100 should be running, and all traps and syslogs should be forwarded to the gateway or unit containing the running AVM.
|
Gateway and units
|
GUI client and cmpctl status
|
AVM 199
|
???
|
??
|
??
|
You can add AVMs to units or directly to a gateway. Each of these AVMs has its own log.
The Cisco ANA Watchdog Protocol monitors the AVM processes to make sure any AVMs that have stopped are restarted. For information on the Watchdog Protocol, see Configuring AVMs for High Availability, page 13-20.
To check the basic system health of AVMs, see Cisco ANA System Health and Diagnostics, page 14-1.
See these topics for more information:
•
Understanding AVM Status
•
Creating an AVM
•
Viewing and Editing AVM Properties
•
Changing AVM Status (Start or Stop)
•
Moving an AVM
•
Deleting an AVM
Roles Required to Manage AVMs
Table 2-3 lists the roles that are required to manage AVMs. For more information on roles, see Creating and Managing Users, Passwords, and Scopes, page 13-34.
Table 2-3 Roles Required to Manage AVMs
Task
|
Role Required
|
Adding an AVM
|
Administrator
|
Viewing AVM properties
|
Administrator
|
Editing AVM properties
|
Administrator
|
Starting or stopping an AVM
|
Administrator
|
Finding an AVM
|
Administrator
|
Moving an AVM
|
Administrator
|
Deleting an AVM
|
Administrator
|
Related Topics
•
Managing the Gateway
•
Managing Units (and High Availability)
•
Managing VNEs
Understanding AVM Status
AVM status describes the administrative condition of the AVM process on the unit or gateway. AVM status is determined by a combination of the AVM's admin status and operational status:
•
AVM admin status is a user-directed status that signifies if the AVM should be up or down. If you stop an AVM using the Administration perspective, the admin status is changed to Disabled. If you start the AVM, the admin status is changed to Enabled.
•
AVM operational status describes the condition of the AVM as seen by the gateway server.
Table 2-4 describes how the combination of AVM admin and operational status determines the overall AVM status.
Table 2-4 AVM Status
AVM Status
|
Admin Status
|
Operational Status
|
Description
|
Up
|
Enabled
|
Up
|
The AVM process is reachable, was loaded, and has started. This is the status when the AVM is created (and you selected Activate Upon Creation), and no problems are encountered.
|
Down
|
Disabled
|
Down
|
The AVM process is reachable, but was stopped. This is the status when a Stop command is issued.
|
When moving an AVM, its status has a bearing on whether the process is automatically reloaded. If its status is Up, it is reloaded; if its status is down, it is not reloaded. For more information about moving AVMs, see Moving an AVM. For more information about starting and stopping AVMs, see Changing AVM Status (Start or Stop).
Related Topics
•
Changing AVM Status (Start or Stop)
•
High Availability Events and Default Settings for Failover, page 13-21
•
Configuring AVMs for High Availability, page 14-22
•
Roles Required to Manage AVMs
•
Creating an AVM
•
Cisco ANA System Health and Diagnostics, page 14-1
Creating an AVM
Cisco ANA lets you define AVMs for Cisco ANA units. Every AVM in the Cisco ANA fabric is by default managed by the watchdog protocol. Cisco ANA enables the administrator to define AVMs for units, and enable or disable the watchdog protocol on the AVM.
Before You Begin
•
Decide which unit you want to use to install the AVM. See Creating an AVM.
•
The unit must be installed.
•
The unit must be connected to the transport network.
•
The default AVMs (AVM 0, AVM 99, AVM 100) must be running. For more information on the status of AVMs, see Understanding AVM Status.
•
The new AVM must have a unique ID within the unit.
Note
AVMs 0-100 and AVM 199 are reserved, and cannot be used. Do not enter a reserved number.
Step 1
In the Administration perspective, click the Objects tab and click the ANA Servers drawer.
Step 2
Open the Servers tree, right-click the unit and choose New AVM.
Step 3
Enter the following information. The ANA Unit field is prepopulated with the parent unit's IP address. The unit does not have to be up to create the AVM.
Field
|
Description
|
ID
|
The name of the AVM as defined in Cisco ANA, unique to the unit (for example, AVM 18).
AVMs 0-100 and AVM 199 are reserved and cannot be used. Do not enter a reserved number. If you do, a message is displayed in the New AVM dialog box, informing you that the number is reserved.
|
Key
|
A string that uniquely identifies an AVM in the system, across all units, thus enabling a transparent failover scenario in the system. If you do not enter a key, the default key, ID + time stamp, is used.
|
Allocated Memory
|
The maximum memory allocated to the AVM, in megabytes. For information on the amount of memory to allocate to an AVM, depending on network element types, see COOKBOOK.
|
Activate on Creation
|
Loads the AVM into the bootstrap of the unit. This changes the administrative status of the AVM to up and ensures that the AVM is loaded on subsequent restarts of the unit. By default this option is unchecked, and the newly created AVM has an administrative status of down.
|
Enable AVM Protection
|
By default this check box is checked, enabling the watchdog protocol on the AVM when high availability is enabled (you have a standby unit). For more information, see Configuring AVMs for High Availability, page 13-20.
Note It is highly recommended that you do not disable this option if high availability is enabled. If you change the option when the AVM is up, you must restart the AVM for the change to take effect.
|
Step 4
Click OK. The new AVM is added to the selected unit, displayed in the workspace, and activated. Verify that the Admin Status is Enabled and the Operational Status is Up.
Creating the new AVM results in Cisco ANA providing the registry information of the new AVM in the specified unit. The AVM can now host VNEs. For more information, see Defining and Creating Individual VNEs.
Related Topics
•
Understanding AVM Status
•
Changing AVM Status (Start or Stop)
•
Configuring AVMs for High Availability, page 14-22
•
Watchdog Protocol and Process Monitoring, page 13-11
•
Roles Required to Manage AVMs
•
Cisco ANA System Health and Diagnostics, page 14-1
Viewing and Editing AVM Properties
To view and edit an AVM's properties:
Step 1
In the Administration perspective, click the Objects tab and click the ANA Servers drawer.
Step 2
Open the Servers tree, and click the AVM in which you are interested. (several of the internal Cisco ANA system AVMs are not listed.)
Step 3
Click the AVM you want to view or edit. The AVM workspace (above the tabular list) displays the following information:
Field
|
Description
|
AVM Protection Enabled
|
If checked, the watchdog protocol is enabled on the AVM (available only when high availability is enabled). For more information, see Managing the Watchdog Protocol on AVMs, page 13-20.
|
Operational Status
|
The status of the relationship between the AVM and its child VNEs (see VNE Status (Operational and Admin Status)).
|
Up Since
|
When the AVM process was last started.
|
Key
|
A string that uniquely identifies an AVM in the system, across all units, thus enabling a transparent failover scenario in the system. The default key, ID + time stamp, is used.
|
ID
|
The name of the AVM as defined in Cisco ANA, unique to the unit.
Note AVMs 0-100 and AVM 199 and cannot be used. Do not enter a reserved number. If you do, a message is displayed in the New AVM dialog box, informing you that the number is reserved.
|
Admin Status
|
The status of the relationship between the AVM and its parent gateway/unit (see VNE Status (Operational and Admin Status)).
|
Max. Memory
|
The maximum memory, in megabytes, allocated to the AVM.
|
The table below the workspace provides information about the VNEs installed on the AVM. These are described in Viewing and Editing VNE Properties and Schemes.
Step 4
Edit the details of the AVM as required.
For more information on the other fields displayed in the AVM Properties dialog box, see Creating an AVM.
Step 5
Click OK. The AVM's new properties are displayed in the workspace.
Related Topics
•
Changing AVM Status (Start or Stop)
•
Understanding AVM Status
•
Watchdog Protocol and Process Monitoring, page 13-11
•
High Availability Events and Default Settings for Failover, page 13-21
•
Creating an AVM
•
Roles Required to Manage AVMs
Changing AVM Status (Start or Stop)
Note
Stopping the AVM stops all the VNEs in the AVM. You should be aware that any change in status of the AVMs may take some time to be applied. For example, when running the Stop command, it may take several minutes before the status changes from Shutting Down to down.
To start or stop an AVM:
Step 1
In the Administration perspective, click the Objects tab and click the ANA Servers drawer.
Step 2
Open the Servers tree, and click the unit that contains the AVM you are interested in.
Step 3
Right-click the AVM and choose Start or Stop.
The AVM is started or stopped, and the appropriate status is displayed in the workspace as follows:
•
Up—The AVM is running.
•
Down—The AVM is stopped.
Related Topics
•
Understanding AVM Status
•
High Availability Events and Default Settings for Failover, page 13-21
•
Configuring AVMs for High Availability, page 14-22
•
VNE Persistency Mechanism, page F-1
•
Cisco ANA System Health and Diagnostics, page 14-1
•
Deleting an AVM
Moving an AVM
You can move an entire AVM between units.
Note
AVMs 0-100 and AVM 199 are reserved and cannot be moved.
Cisco ANA automatically checks the status of the AVM and VNE before it is moved. This information is maintained in the memory.
If the AVM is up, it is stopped, and then it is moved to the target unit. After the move is completed, the AVM is reloaded, maintaining the status it was in before the move. For example, if it was up before the move, it remains up; if it was down, it remains down.
To move an AVM:
Step 1
In the Administration perspective, click the Objects tab and click the ANA Servers drawer.
Step 2
Open the Servers tree, and click the unit that contains the AVM in which you are interested.
Step 3
Right-click the AVM and choose Move.
The Move To dialog box displays a tree-and-branch representation of the selected Cisco ANA server and its units, excluding the unit in which the AVM is currently located. The highest level of the tree displays the Cisco ANA server. The branches can be expanded and collapsed to display and hide information.
Step 4
In the servers tree, select the unit (branch) where you want to move the AVMs.
Step 5
Click OK. The AVM is moved and now appears beneath the selected unit.
For information about moving VNEs, see Moving One or More VNEs.
Related Topics
•
Understanding AVM Status
•
Changing AVM Status (Start or Stop)
•
Configuring AVMs for High Availability, page 14-22
•
Viewing and Editing AVM Properties
•
Roles Required to Manage AVMs
•
Cisco ANA System Health and Diagnostics, page 14-1
Deleting an AVM
If an AVM that you want to delete is running, it is stopped before being removed. This procedure deletes the registry information of the AVM in the specified unit. If there are VNEs running in the AVM, then an error message is displayed, and you cannot delete the AVM.
For more information, see Deleting a VNE.
Note
AVMs 0-100 and AVM 199 are reserved and cannot be deleted.
Before You Begin
Remove all VNEs from the AVM, or the deletion fails. See Deleting a VNE.
Step 1
In the Administration perspective, click the Objects tab and click the ANA Servers drawer.
Step 2
Open the Servers tree, and click the unit that contains the AVM in which you are interested.
Step 3
Right-click the AVM and choose Delete. A warning message is displayed.
Step 4
Click Yes. A confirmation message is displayed and the selected AVM is deleted from the selected unit.
Related Topics
•
Understanding AVM Status
•
Changing AVM Status (Start or Stop)
•
Configuring AVMs for High Availability, page 14-22
•
Viewing and Editing AVM Properties
•
Roles Required to Manage AVMs
•
Moving an AVM
•
Cisco ANA System Health and Diagnostics, page 14-1
Managing VNEs
Each Virtual Network Element (VNE) is assigned to manage a single network element instance and contains a replica of that element. The VNEs maintain a live model of each network element and of the entire network. As the VNE loads, Cisco ANA starts investigating the network element and automatically builds a live model of it, including its physical and logical inventory, its configuration, and its status. Cisco ANA also creates the registry information of the new VNE in the unit. The newly created VNE uses the default community strings and polling rates. The VNE inherits these properties from the configuration record that corresponds to the network element type.
The information collected by a VNE depends on the VNE type and scheme. You should choose a scheme based on the device family and on the technologies you want Cisco ANA to manage (see Choosing a Scheme when Adding Individual VNEs). The VNE uses whatever southbound management interfaces the network element implements (for example, SNMP or Telnet). Cisco ANA uses the CISCO-ENTITY-MIB, CISCO-STACK-MIB, and OLD-CISCO-CHASSIS-MIB to model Cisco devices.
Note
By default, when a VNE opens a Telnet session with a network element in order to model and monitor the element, the Telnet session remains open as long as the VNE is up. The VNE does not close the session due to timeouts. If you would like to configure a timeout, contact ask-ana@cisco.com for assistance.
A VNE must be loaded into the bootstrap of the unit before it starts monitoring its underlying network element. This changes the administrative status of the VNE to Enabled, and ensures that the VNE is loaded on subsequent restarts of the unit. Loading the VNE also starts the VNE immediately. For more information about the status of VNEs, see Understanding VNE Status and VNE States.
Each VNE should be added to the system only once. You can add VNEs to Cisco ANA in two ways:
•
Add VNEs in bulk based on the devices in your current network.
•
Add individual VNEs.
These procedures and all prerequisites are outlined in Table 2-8.
See these topics for more information:
•
Prerequisites for Adding VNEs to AVMs
•
Using Network Discovery to Add Bulk VNEs
•
Defining and Creating Individual VNEs
•
Viewing and Editing VNE Properties and Schemes
•
Changing VNE Status (Start, Stop, Maintenance)
•
Moving One or More VNEs
•
Deleting a VNE
Roles Required to Manage VNEs
Table 2-3 lists the roles that are required to manage VNEs. For more information on roles, see Creating and Managing Users, Passwords, and Scopes, page 13-34.
Table 2-5 Roles Required to Manage VNEs
Task
|
Role Required
|
Configuring network discovery settings and performing network discovery
|
Administrator
|
Importing VNEs in bulk using a seed file generated using network discovery
|
Administrator
|
Creating an individual VNE
|
Administrator
|
Viewing VNE properties
|
Administrator
|
Editing VNE properties
|
Administrator
|
Changing a VNE's status
|
Administrator
|
Finding a VNE
|
Administrator
|
Moving a VNE
|
Administrator
|
Deleting a VNE
|
Administrator
|
Related Topics
•
Understanding AVM Status
•
Cisco ANA System Health and Diagnostics, page 14-1
Understanding VNE Status and VNE States
VNE status describes the administrative condition of the VNE process on the AVM. VNE state describes the condition of the VNE as it tries to model and monitor the real network element it represents. (These states are also different from the network element management states (Managed, Maintenance, Unmanaged, Unsupported). For information on management states, see Understanding Network Element Management States, page 3-8.)
These topics provide detailed information about VNE status and VNE states:
•
VNE Status (Operational and Admin Status)
•
VNE States (Investigation and Communication States)
VNE Status (Operational and Admin Status)
VNE status describes the administrative condition of the VNE process on the unit or gateway. VNE status is determined by a combination of the VNE's admin status and operational status:
•
VNE admin status is a user-directed status that signifies if the VNE should be up or down. If you stop a VNE using the Administration perspective, the admin status is changed to Disabled. If you start the VNE, the admin status is changed to Enabled. (If you change a VNE to Maintenance mode, its admin status remains Enabled, but its Maintenance mode is displayed as True.)
•
VNE operational status describes the actual state of the VNE as seen by the gateway server.
Table 2-6 describes how the combination of VNE admin and operational status determines the overall VNE status.
Table 2-6 VNE Status
VNE Status
|
Admin Status
|
Operational Status
|
Description
|
Up
|
Enabled
|
Up
|
The VNE process is reachable, was loaded, and has started. This is the status when a Start command is issued (or when you create a VNE and choose Start as its initial status), and no problems are encountered (such as an overloaded server).
When a VNE is changed to Maintenance mode, it retains its Up status. In the VNE properties table, Maintenance is changed from false to true.
|
Down
|
Disabled
|
Down
|
The VNE process is reachable, but was stopped. This is the status when a Stop command is issued.
|
Unreachable
|
Enabled
|
Unreachable
|
The VNE cannot be reached by the gateway, so the VNE cannot be managed.
|
The admin and operational statuses are displayed in the VNEs table when you select an AVM.
When moving a VNE, its status has a bearing on whether the process is automatically reloaded. If its status is Up, it is reloaded; if its status is down, it is not reloaded. For more information about moving VNEs, see Moving One or More VNEs. For more information about starting and stopping VNEs, see Changing VNE Status (Start, Stop, Maintenance).
You can also place a VNE in Maintenance mode. The VNE status remains Up, but the Maintenance mode (displayed in the UI) changes to true. This allows you to perform maintenance operations without affecting the overall functionality of the active network. Maintenance mode is described in more detail in VNE States (Investigation and Communication States). For information on what a VNE can do when it is in Maintenance mode, see Understanding Network Element Management States, page 3-8.
VNE States (Investigation and Communication States)
A VNE's state describes the relationship between the VNE and the real network element it represents, and the VNE's ability to model and inventory the network element. There are two types of VNE states: the investigation and communication states. These important indicators are displayed both as icons (in the device browser and topology maps), and in text format (in the VNE properties area).
•
The investigation state represents the level of network element discovery that has been performed, or is being performed, by the VNE. There are a number of investigation states, and they are listed in Table 2-7.
•
The communication state tells you whether the VNE can reach the network element, according to the health of the real device. The communication state can cause a change in the investigation state. There are two communication states: Reachable and Unreachable. Reachable means that all of the enabled protocols on the network element are responding; Unreachable means that at least one of the enabled protocols is not responding.
Table 2-7 describes the VNE investigation states and the possible communication states for each.
Table 2-7 VNE Investigation States
Investigation State
|
Description
|
Communication State
|
Unknown
|
The VNE has not been created. (This investigation state is not displayed in the UI.)
|
N/A
|
Initializing
|
The VNE is discovering basic information about the network element (vendor, network element type, hardware and software versions, scheme). This is a transitional state.
|
Reachable
|
Modeling in progress
|
The VNE is discovering the network element and building the model. This is a transitional state.
If a reachable network element becomes unreachable, or vice versa, the investigation state does not change. The VNE investigation state remains in Modeling in progress.
|
Reachable or Unreachable
|
Normal
|
The VNE is managing the network element. All investigation commands have successfully completed.
If a reachable network element becomes unreachable, the VNE investigation state changes to Sync in progress. When the network element becomes reachable, the VNE investigation state remains at Sync in progress until modeling is complete.
|
Reachable
|
Preparing for maintenance
|
The VNE is changing to Maintenance mode (specifically, its status is changing) and no longer polls the network element. This is a transitional state.
|
Reachable
|
Maintenance
|
The VNE is capable of sending alarms and maintains existing links, but does not poll the network element. (See Understanding Network Element Management States, page 3-8 for information on the Maintenance management state.)
|
Reachable
|
Sync in progress
|
The VNE is synchronizing its model with the network element. (For example, the network element was unreachable but becomes reachable, or a user changes the management state from Maintenance to Managed.) This is a transitional state.
If a reachable network element becomes unreachable, or vice versa, the investigation state does not change. The VNE investigation state remains in Sync in progress.
|
Reachable or Unreachable
|
Shutting down
|
The VNE is changing to Down status and is not managing the network element. (For example, a user has selected Stop in the UI.) This is a transitional state.
|
Reachable
|
Incomplete
|
The VNE investigation encountered an issue. For example, a command expired, threw an exception, or has not yet run; or a module is unsupported. However, the VNE can still be managed.
If a reachable network element becomes unreachable, the VNE investigation state changes to Sync in progress. When the network element becomes reachable, the VNE investigation state remains at Sync in progress until modeling is complete.
|
Reachable
|
Unsupported
|
The entire network element is not supported.
|
Reachable
|
Figure 2-1 illustrates the normal flow of VNE investigation states when a network element is added to Cisco ANA.
Figure 2-1 VNE Investigation State Sequence when NE is Successfully Added to Cisco ANA
A network element can also be changed to the Maintenance state, either manually or automatically. You may want to do this manually if you need to perform a maintenance activity, such as a software upgrade, so that Cisco ANA will ignore alarms during the activity. Cisco ANA automatically changes a network element to the Maintenance state when the network element's CPU usage reaches a certain configured level. This behavior prevents the VNE from using too much of the network element's resources. When the network element is ready to be changed back to Normal state, Cisco ANA synchronizes the VNE network model with the element, as shown in Figure 2-2.
Figure 2-2 State Sequence when Attempting to Change VNE from Maintenance to Normal
Related Topics
•
Understanding Network Element Management States, page 3-8
•
Prerequisites for Adding VNEs to AVMs
•
Defining and Creating Individual VNEs
•
Viewing and Editing VNE Properties and Schemes
•
Deleting a VNE
Prerequisites for Adding VNEs to AVMs
Table 2-8 lists the tasks you must perform before adding VNEs, to ensure that Cisco ANA can fully manage your network elements.
Device Configuration Tasks to Perform Before Adding VNEs
For Cisco ANA to manage a network element, the element must have the proper configuration settings. For example, you might want to configured a device to forward traps to its identified unit (and to the standby unit, if the unit is configured for failover). If a unit goes down, when the standby unit comes up, AVM 100 on the standby unit broadcasts to the VNEs, and the VNEs register to it to start receiving traps from the new AVM 100.
The settings you must apply depend on the network element device family, and are shown in Table 2-9.
Note
A forward slash at the end of a line means the command continues on the next line.
Table 2-9 Prerequisite Device Configuration Tasks
Device Family
|
Required Settings
|
Recommended Settings
|
Cisco IOS and Cisco Cat OS
|
snmp-server community public RO
snmp-server community private RW
snmp-server host gateway_IP public
service timestamps debug datetime msec
localtime
service timestamps log datetime msec localtime
logging buffered 64000 informational
logging trap informational
logging source-interface Loopback0
|
snmp-server enable traps snmp \
authentication linkdown linkup coldstart \
warmstart
snmp-server enable traps chassis
snmp-server enable traps module
snmp-server enable traps bgp
snmp-server enable traps ospf state-change
snmp-server enable traps ospf errors
snmp-server enable traps ospf retransmit
snmp-server enable traps ospf lsa
snmp-server enable traps ospf \
cisco-specific state-change
snmp-server enable traps ospf \
cisco-specific errors
snmp-server enable traps ospf \
cisco-specific retransmit
snmp-server enable traps ospf \
cisco-specific lsa
snmp-server enable traps config
snmp-server enable traps ipmulticast
snmp-server enable traps syslog
snmp-server enable traps entity
snmp-server enable traps flash insertion \
removal
snmp-server enable traps envmon fan
shutdown supply temperature status
snmp-server enable traps rtr
snmp-server enable traps mpls ldp
|
Cisco IOS XR
|
logging events level informational
logging console debugging
logging monitor informational
logging buffered debugging
domain ipv4 host gateway_name gateway_IP
telnet ipv4 server max-servers no-limit
snmp-server community public RO
snmp-server community private RW
snmp-server host gateway_IP traps version \
[1|2c|3] community
|
snmp-server location location
snmp-server contact contact
line default exec-timeout 0 0
|
Additional Requirements for Cisco IOS XR:
• Install the Cisco IOS XR Manageability Package on top of the Cisco IOS XR version. You can get information on this package from the release notes for your Cisco IOS XR version.
• Cisco ANA should use the device login user which is a member of group root-system and cisco-support.
• To correctly model logical routers, the Cisco ANA user should use the unique login user@admin (and also be a member of groups root-system and cisco-support).
|
Redback
|
snmp community public local1
|
None
|
UTStarcom
|
snmp-server community public RO
snmp-server community public RW
|
None
|
Device Information to Gather Before Adding VNEs
Before adding a VNE, make sure you have the device information that is listed in Table 2-10. You should also be prepared to enter information about private or public keys, if you plan to use them; see Public Key and Private Key File Formats.
Note
For Cisco IOS and Cisco IOS XR elements, you must know the Telnet login sequence.
Table 2-10 Prerequisite Device Information
Information Required
|
Verify the following:
|
IP address
|
Network element IP address.
|
Name
|
Network element name.
|
Protocol and Credential Details
|
SNMP
|
• SNMP is running on the network element
• Supported version (V1, V2, V3)
• For SNMPV1/V2: The SNMP read and write community strings
• For SNMP V3: The username, and optionally the authentication or privacy configuration
|
Telnet
|
• Telnet is supported on the network element
• Port number
• Telnet login sequence: Username, password, and prompt
Note The Telnet login sequence is required for Cisco IOS and Cisco IOS XR network elements.
|
SSH
|
• SSH is supported on the network element
• Supported version (V1 or V2)
• SSH username and password and any other configuration information (cipher, authentication, key exchange (V2), MAC (V2)).
Note Cisco recommends that you first use any SSH client application (such as UNIX SSH or OpenSSH) to determine the device SSH login sequence.
|
Public Key and Private Key File Formats
There are several file formats for public and private RSA and DSA keys. The same key can be written differently according to which format is used.
This application officially supports the OpenSSH format. For more details, see http://www.openssh.com/manual.html.
Make sure that the keys you provide as input parameters are in this format. If they are not, you will need to convert them to the Open SSH format before applying them.
For example, when working with Cisco IOS software, the public key is retrieved using show crypto key mypubkey .... This format is not compatible with the OpenSSH format, and is not supported. There are several ways to convert the format to the supported version.
The easiest solution is to use public key scan, offered by the (free) OpenSSH application to retrieve the public key in the supported format. For more details, see http://www.openssh.com/manual.html.
Another option is to convert the files to the required format either manually or using a script.
The following are examples of valid file formats.
-----BEGIN RSA PRIVATE KEY-----
MIICWwIBAAKBgQDvdpW8ItfbSp/hTbWZJqCPmjRyh9S+EpTJ0Aq3fnGpFPTR+
TiOfhiuX5+M1cTaE/if8sScj6jE9A0MpShBrnDU/0A==
-----END RSA PRIVATE KEY-----
-----BEGIN DSA PRIVATE KEY-----
MIIBuwIBAAKBgQDNGO+l2XW+W+YtVnWSYbKXr6qkrH9nOl+
-----END DSA PRIVATE KEY-----
ssh-dss AAAAB3.........HfuNYu+ DdGY7njEYrN++iWs= aslehr@aslehr-wxp01
ssh-rsa AAAAB3...lot more...qc8Hc= aslehr@aslehr-wxp01
Choosing a Scheme when Adding Individual VNEs
When you create the VNE, you are prompted to choose a scheme. The VNE scheme determines what network element information is collected by a VNE and populated in its model. You should choose a scheme based on the device family, and on the technologies you want Cisco ANA to manage.
Table 2-11 lists the scheme you should use, depending on the device family.
Table 2-11 VNE Schemes
VNE Scheme
|
Description
|
Foundation
|
Used for all Cisco devices and other vendor devices.
• Cisco IOS, depending on the technologies you want Cisco ANA to manage (see Table 2-12).
• Cisco CatOS.
• Non-Cisco.
|
MPLS
|
Supports all the technologies available in Foundation scheme; in addition, it supports technologies related to MPLS and Carrier Ethernet. The MPLS scheme, however, does not support other vendor devices.
Cisco IOS, depending on the technologies you want Cisco ANA to manage (see Table 2-12).
Cisco IOS-XR. For example, Cisco XR 12000 series and Cisco CRS-1.
|
Technology support for each scheme is listed in Table 2-12. Choosing the correct scheme is important if your devices are running the Cisco IOS operating system, because those network elements can use either scheme. If you need support for technologies related to MPLS and Carrier Ethernet, you should use the MPLS scheme. See Table 2-12 for more information.
Table 2-12 Technology Support Based on Schemes
Technology
|
Foundation
|
MPLS
|
ARP
|
Yes
|
Yes
|
ATM
|
|
|
ATM-IMA
|
|
|
BGP
|
Yes
|
Yes
|
Bridge Domain
|
No
|
Yes
|
Bridging
|
Yes
|
Yes
|
Carrier Ethernet
|
|
|
CDP
|
Yes
|
Yes
|
CFM (part of E-OAM)
|
Yes
|
Yes
|
COD
|
No
|
Yes
|
ELMI
|
|
|
EoMPLS
|
No
|
Yes
|
Ethernet
|
Yes
|
Yes
|
Ethernet Channel
|
Yes
|
Yes
|
Frame Relay
|
|
|
GRE
|
|
|
IEEE dot1q
|
Yes
|
Yes
|
IP
|
Yes
|
Yes
|
IPTV Multicast
|
|
|
IPTV Multiplex over TDM
|
|
|
IPTV Video Monitor
|
|
|
ISIS
|
Yes
|
Yes
|
LAG
|
Yes
|
Yes
|
Link-OAM
|
|
|
OSPF
|
Yes
|
Yes
|
MP-BGP
|
No
|
Yes
|
MPLS
|
Yes
|
Yes
|
MPLS TE-Tunnel
|
No
|
Yes
|
MPLS Layer 3 VPN
|
No
|
Yes
|
Pseudowire
|
No
|
Yes
|
Q-in-Q
|
Yes
|
Yes
|
Layer 2 Tunneling Protocol (L2TP)
|
|
|
RTPM
|
|
|
Service Instance (part of Flex UNI)
|
No
|
Yes
|
STP/MSTP
|
Yes
|
Yes
|
SVI/VPLS/H-VPLS
|
No
|
Yes
|
TDM-IMA
|
|
|
VLAN/S-VLAN
|
Yes
|
Yes
|
VRF
|
No
|
Yes
|
VTP (VLAN Trunk and Tunneling)
|
Yes
|
Yes
|
Related Topics
•
Managing VNEs
•
Roles Required to Manage VNEs
Using Network Discovery to Add Bulk VNEs
The network discovery process creates a list of elements that are present in your network. From the output of that process, you create a seed file, which specifies the elements you want Cisco ANA to manage. Finally, you import the network elements into Cisco ANA, which discovers each element and creates a VNE for it. The result is a living model of all the network elements you want to manage.
If you want to import a small number of network elements, use the procedure that is described in Defining and Creating Individual VNEs.
These are the basic steps of the network discovery and bulkVNE import process.
1.
Use Network Discovery to find existing devices in your network.
a.
Configure the settings that Cisco ANA will use to guide the network discovery process. You specify the discovery methods, seed device IP addresses, and hop counts for the discovery process. You can also specify dependent discovery methods, so the output from the dependent method is used as the input to another method, and further refine the list with filters.
b.
Run the network discovery process from the GUI, to create the list of elements in your network.
2.
Use Bulk VNE Import to create a seed file and import the devices into Cisco ANA.
a.
From the list of devices found during the discovery process, select the devices that you want Cisco ANA to manage, and specify their credentials, polling settings, and scheme. This information is saved as the seed file.
b.
Import the seed file to create the VNEs. Cisco ANA discovers the network element details, and uses this information to create a model of all network elements you want to manage.
To use these functions, you must have sufficient privileges. See Roles Required to Manage VNEs.
Understanding the Network Discovery User Interface
The Network Discovery user interface is where you configure the criteria you want Cisco ANA to use to create the seed file, as described in Configuring and Performing Network Discovery.
Figure 2-3 Network Discovery User Interface
Related Topics
•
Configuring and Performing Network Discovery
•
Importing Network Elements from a Seed File
•
Prerequisites for Adding VNEs to AVMs
Configuring and Performing Network Discovery
To perform network discovery, you must first configure the settings that will guide the network discovery process. Once that is done, you can start the network discovery process from the GUI, to create the list of elements in your network.
To perform network discovery, follow the procedures in these sections:
•
Creating the Network Discovery Configuration File
•
Running Network Discovery to Create a List of Network Elements
Creating the Network Discovery Configuration File
Cisco ANA discovers the elements in your network based on parameters that you provide, such as discovery method, seed devices, hop counts, and filters. Cisco ANA uses the loopback address to discover a network element. (If you do not want Cisco ANA to use the loopback address, you can disable this setting; see Step 10 of the following procedure.) For your reference, a sample discovery configuration file is stored in ANAHOME/Third_Party.
Use this procedure to create or edit a discovery configuration file.
Before You Begin
Make sure you have performed all prerequisites:
•
Device Configuration Tasks to Perform Before Adding VNEs
•
Device Information to Gather Before Adding VNEs
At a minimum, SNMP should be running on all devices and the devices should be reachable; otherwise, network discovery may fail or be incomplete.
Step 1
In the Administration perspective, click the Tasks tab in the navigation pane and click the NE Discovery and VNE Import drawer.
Step 2
Click Network Discovery (see Figure 2-3).
Step 3
If you have a saved configuration file that you want to use, perform these steps (otherwise, proceed to Step 4):
a.
Click Import. The Configuration List dialog box lists all configuration files that are stored in the ANAHOME/Third_Party directory (where ANAHOME is normally /export/home/ana41). By default, two sample files are provided, and you should select User-specific_settings.ad.xml (the other file is not currently used).
b.
Select the file and click OK. The Discovery Configuration Settings tree is populated with the file information.
c.
If desired, you can rename the file by clicking Edit and entering the name in the Discovery Configuration Settings dialog box, and clicking OK.
Step 4
(Mandatory) Modify (or verify) your basic discovery methods to be used to locate devices, starting with one or more devices (called the seed devices). You must configure a discovery method.
a.
In the Discovery Configuration Settings area, choose Discovery Methods from the tree. The configured discovery methods are displayed, based on the configuration file you imported in Step 3.
b.
Click Add. The Discovery Method Settings dialog box opens.
c.
Choose a discovery method from the drop-down list. Make sure you meet the requirements for your chosen methods, or the results of the network discovery will be incomplete.
Table 2-13 Discovery Methods Used by Network Discovery
|
Description
|
Requirements
|
Neighbor
|
Uses the Cisco Discovery Protocol (CDP) to learn about the device type and SNMP agent address of network elements that are neighbors to the elements being queried.
|
CDP must be enabled.
|
Cluster
|
Processes the command switches in a DSBU cluster. The Cluster method queries the ciscoClusterMIB for all members of the cluster, then adds the members to the list.
|
CISCO-CLUSTER-MIB must be enabled.
|
Credential
|
Queries devices based on the supplied SNMP and enable credentials, and verifies the credentials for discovered devices.
|
Must have at least one dependent method from this table.
|
PingSweep
|
Pings all devices in a given IP address range. You can also limit the sweep using subnets.
|
Device must be reachable.
If dependent, must have the same seed IP address and hop counts as its parent method.
|
PingWithHop
|
Pings all IP addresses in the seed device ipTable, along with the next-hop router of those IP addresses, and adds the members to the list.
|
Device must be reachable.
|
RouterPeer
|
Queries the OSPF, BGP, or HSRP MIB.
|
OSPF MIB must be enabled.
|
RoutingTable
|
Queries and analyzes the routing table of the seed routers to find all subnets and next-hop routers in the network. Cisco ANA traverses the routers to find their directly connected subnets, known networks, and next-hop routers as clues. Eventually Cisco ANA finds a router for every known subnet.
|
IP MIB must be enabled.
|
ARP
|
Queries and analyzes the seed routers' ARP table.
|
IP MIB must be enabled.
Must have RoutingTable as a dependent method.
|
d.
Enter an IP address and (optionally) the hop count. The hop count value limits discovery to the specified maximum hop count from the given seed device.
Note
If you specify a hop count of 0, or do not specify a hop count at all, the entire network will be discovered if the devices are reachable with the given SNMP credentials.
e.
Click OK. The information is added to the Discovery Configuration tree.
f.
Add additional discovery methods, as desired.
Step 5
For the discovery methods you configured in Step 4, configure their dependent discovery methods. (All discovery methods use the System method as a dependent; the System method drives the entire discovery process.)
Note
This step is mandatory if you are using the Credential or ARP methods. See the requirements listed in Table 2-13.
To configure dependent methods (so that the output from the dependent method is used as the input to the selected discovery method):
a.
Ensure that any dependent methods you plan to use are already configured, as described in Step 4.
b.
Choose Discovery Methods and click Edit. The Discovery Method Settings dialog box opens.
c.
Choose the discovery method to which you want to add a dependent method from the Choose a Discovery Method drop-down list.
d.
From the Choose Dependent Discovery Methods field, choose dependent methods by checking the appropriate check boxes. (All discovery methods depend on the System method; it drives the entire discovery process.)
Note
The Credential method must have at least one dependent method, other than System.
The ARP method must have RoutingTable as a dependent method.
The dependent method PingSweep must have the same seed IP address and hop counts as its parent method.
e.
Click Update.
f.
Configure additional dependent methods, as desired. (You can configure multiple dependents for any of the methods you configured in Step 4.)
Step 6
Verify your discovery settings in the Discovery Methods and Dependencies area by choosing the configured methods from the drop-down list and checking the settings. If you chose PingSweep as a dependent method, click the Ping Settings link and verify the submask settings.
Step 7
(Mandatory) Specify the SNMP credentials you want the network discovery process to use when querying devices.
a.
Choose SNMP Credentials and click Add.
b.
In the SNMP Credentials Settings dialog box, enter the credentials you want the Network Discovery process to use, and click OK.
Step 8
(Optional) To refine the discovery methods by setting filters to determine whether a device should be included or excluded, choose a discovery method and click Add. The optional discovery settings are described in Table 2-14.
Note
If both exclude and include filters of the same type are used, the exclude filter is applied first.
Table 2-14 Optional Network Discovery Settings and Filters
Optional Discovery Setting
|
Description
|
Telnet Credentials
|
Uses the specified credentials when querying the discovered devices. (If the credentials match the discovered devices, the credentials are listed in the seed file; if they do not match, the credentials fields for those devices are left empty.)
|
IP Addresses Included
|
Includes the device if any of its IP addresses match the specified IP address.
|
IP Addresses Excluded
|
Excludes the device if any of its IP addresses match the specified IP address.
|
System OIDs Included
|
Includes the device if the system OID matches the specified OID.
|
System OIDs Excluded
|
Excludes the device if the system OID matches the specified OID.
|
System Locations Included
|
Excludes the device if the sysLocation in MIB2 system table matches the specified system location.
|
System Locations Excluded
|
Excludes the device if the sysLocation in MIB2 system table matches the specified system location.
|
Domain Names Included
|
Includes the device if the domain name resolved by a DNS lookup on the IP address matches the specified domain name.
|
Domain Names Excluded
|
Excludes the device if the domain name resolved by a DNS lookup on the IP address matches the specified domain name.
|
Step 9
To save the configuration file, click Generate Configuration Files. This does not start the discovery process that generates the seed file; it simply saves your criteria. By default, the file is saved on the gateway in ANAHOME/Third_Party/User-Specific settings.ad_xml (where ANAHOME is normally /export/home/ana41).
Step 10
If you do not want to use the loopback address to discover network elements—for example, if you are using an out-of-band VLAN—edit the ANAHOME/_Discovery_system_settings.ad_xml file (where ANAHOME is normally /export/home/ana41) as follows:
PreferredMgmtIPMethod="None"
Step 11
To schedule the discovery (or perform it immediately), proceed to Running Network Discovery to Create a List of Network Elements.
Running Network Discovery to Create a List of Network Elements
Once you have set your discovery settings as described in Configuring and Performing Network Discovery, you can perform (or schedule) the network discovery using the following procedure. You can then tailor the resulting list of network elements to create the seed file to add network elements to Cisco ANA.
The network discovery process creates a list of network elements in the network in ANAHOME/Main/sfresources/deviceOut.xml (where ANAHOME is normally /export/home/ana41). This file is used to populate the Bulk VNE Import page, as described in Importing Network Elements from a Seed File.
Step 1
In the Administration perspective, click the Tasks tab in the navigation pane and click the NE Discovery and VNE Import drawer.
Step 2
Click Network Discovery and Discovery Configuration Schedule.
Step 3
Set your schedule:
•
To perform the discovery immediately, choose Immediate from the Run Type drop-down list, and click Schedule Discovery Now. Cisco ANA prompts you for confirmation and then provides job information. You can use this information to check on the status of the job using Job Management (see Browsing and Controlling Jobs, page 13-3).
•
To perform the discovery at a later time, choose Schedule from the Run Type drop-down list, set your criteria, and click Schedule Discovery Now. If desired, you can set the discovery to run at regular intervals, to add new network elements.
The length of the Network Discovery process depends on the discovery methods used and the number of devices found. When the discovery process is done, the Job Management browser displays it as having a Completed state. See Browsing and Controlling Jobs, page 13-3 for more information.
Related Topics
•
Roles Required to Manage VNEs
•
Importing Network Elements from a Seed File
•
Understanding VNE Status and VNE States
•
Defining and Creating Individual VNEs
•
Prerequisites for Adding VNEs to AVMs
Importing Network Elements from a Seed File
Once the network discovery process has found the elements in the network according to your discovery criteria, you can list the elements on the Bulk VNE Import page. From this list, you can specify which elements you want to add to Cisco ANA, and save the modified list. This modified list is your seed file. Finally, you import the network elements listed in the seed file (by clicking Import Devices). After the network elements are imported, you must start the VNEs.
When the network elements are imported and VNEs are created, Cisco ANA traverses the network to fully discover the network elements and uses this information to create the model of the network. Cisco ANA uses internal algorithms (from the Cisco ANA cookbook) to allocate the VNEs among AVMs, based on the i and bandwidth required by the various network elements. (By default, Cisco ANA uses the cookbook located in ANAHOME/Main/sfresources/cookbooksample.xml. For information on adding single VNEs and allocating them to AVMs, see Defining and Creating Individual VNEs.)
Cisco ANA does not automatically start the VNEs because, in large-scale deployments, this could negatively impact system performance. If you want to change Cisco ANA's default behavior so that VNEs are started after being added, contact ask-ana@cisco.com for instructions.
When you create your seed file, it is saved in the ANAHOME/Main/sfresources directory. By default, the file is named SeedOutput-date-hhmmss.xml.
Before You Begin
•
Make sure the Network Discovery job has completed before importing any VNEs (see Browsing and Controlling Jobs, page 13-3).
•
Make sure you have the credentials and scheme information required. See Device Information to Gather Before Adding VNEs and Choosing a Scheme when Adding Individual VNEs.
Use this procedure to
Step 1
In the Administration perspective, click the Tasks tab in the navigation pane and click the NE Discovery and VNE Import drawer.
Step 2
Click Bulk VNE Import. The page is automatically populated with the devices that Cisco ANA found during the network discovery process (ANAHOME/Main/sfresources/deviceOut.xml).
Step 3
Select the devices you want Cisco ANA to manage, and enter their credentials. If desired, you can use the filter above the device list to narrow the list.
a.
On the left side of the workspace, right-click the devices which can have identical credentials and polling settings, and enter the settings. The instructions for entering VNE credentials and polling settings are described in Defining and Creating Individual VNEs, Step 4 through Step 7. (That section includes some settings you will not see when using Bulk VNE Import, such as entering a Type in the Identification Area; the VNE type is discovered by the network discovery process.)
Note
If you enter the wrong credential information when adding the VNE, the VNE will not be successfully added and managed. In this case, you will have to correct the credentials and restart the VNE (see Changing VNE Status (Start, Stop, Maintenance)). However, Telnet credentials can be changed in runtime, without having to restart the VNE.
b.
Use the various Add and Remove buttons to move your seed devices to the right side of the workspace.
Step 4
Enter a seed file name in the Enter Seed File Name field. The file is saved in the ANAHOME/Main/sfresources directory. By default, the file is named SeedOutput-date-hhmmss.xml; for example, SeedOutput-Jul02-041442.xml. If you entered MySeedFile as the name, the filename would be MySeedFile-Jul02-041442.xml.
Step 5
Click Import Devices. In the back end, the seed file is converted into a format that the VNE creator can recognize, and the VNEs are created and added to AVMs.
Step 6
Verify that the import job has completed. See Browsing and Controlling Jobs, page 13-3.
Step 7
When the import is complete, start the VNEs (you can do this in a bulk operation):
a.
Click the Objects tab and click the ANA Servers drawer.
b.
Open the Servers tree, and click the AVM that contains the VNEs which you want to start.
c.
Right-click the VNEs and choose Start. The page is updated as the VNEs are started; each VNE should list:
–
Admin Status: Enabled
–
Operational Status: Up
d.
To verify that the network element has been completely modeled, go to the Inventory perspective. In the device browser, icons indicate if there are any problems (see the network element management state icons, which are described in Icon Reference, page G-1).
To check the results of the VNE import, view the log file at ANAHOME/Main/logs/SeedFile.log (where ANAHOME is the installation directory, normally /export/home/ana40).
Related Topics
•
Roles Required to Manage VNEs
•
Configuring and Performing Network Discovery
•
Understanding VNE Status and VNE States
•
Defining and Creating Individual VNEs
•
Prerequisites for Adding VNEs to AVMs
Defining and Creating Individual VNEs
Note
A new VNE cannot be added to AVMs 0-100 and AVM 199 because those AVMs are reserved.
This topic explains how to add individual VNEs to Cisco ANA. You can define and manage SNMP, Telnet/SHH, ICMP, and polling information for the appropriate VNEs in the New VNE dialog box. If desired, you can create VNEs that perform reachability testing, through ICMP only. Do this by creating the VNE, choosing ICMP for the VNE type, and defining the details in the ICMP area.
Note
By default, when a VNE opens a Telnet session with a network element in order to model and monitor the element, the Telnet session remains open as long as the VNE is up. The VNE will not close the session due to any timeouts. If you would like to configure a timeout, contact ask-ana@cisco.com for assistance.
To add VNEs in bulk based on the devices in your current network, use the procedure described in Using Network Discovery to Add Bulk VNEs.
Before You Begin
Make sure you have performed all prerequisite activities:
•
Device Configuration Tasks to Perform Before Adding VNEs
•
Device Information to Gather Before Adding VNEs
•
Choosing a Scheme when Adding Individual VNEs
If you do not perform these prerequisite activities, the VNEs may not be correctly discovered and managed.
Step 1
In the Administration perspective, click the Objects tab and click the ANA Servers drawer.
Step 2
Open the Servers tree and find the AVM to which you want to add the VNE. Right-click the AVM and choose New VNE. The New VNE dialog box opens.
Step 3
Enter the VNE general information. At a minimum, you must enter the VNE name and IP address.
Field
|
Description
|
Identification Area
|
Name
|
The name of the VNE, which will be used as a unique key in Cisco ANA. It is also used for commands that manipulate the VNE.
|
IP Address
|
The IP address of the network element.
|
Type
|
Defines the protocol Cisco ANA will use to model the element, and the extent to which you want the element to be modeled. (If you are using network discovery, the network discovery process will automatically recognizes the type. For more information on network discovery, see Using Network Discovery to Add Bulk VNEs.)
|
Auto Detect
|
Use this type if SNMP is enabled on the element. Cisco ANA will use SNMP to gather all available inventory information.
|
Generic SNMP
|
Use this type if SNMP is enabled on the element, and either Cisco ANA does not support the element, or Cisco ANA does support the element but you only want basic information to be modeled. Cisco ANA will use SNMP to gather the most basic inventory information that is normally provided by all network elements.
|
ICMP
|
Use this type if ICMP is enabled on the element, and either Cisco ANA does not support the element, or Cisco ANA does support the element but you only want basic information to be modeled. Cisco ANA will use ICMP to gather the most basic inventory information that is normally provided by all network elements, and will perform reachability testing only.
|
Scheme
|
Defines the VNE modeling components investigated during the discovery process and then populated in the VNE model. This enables the administrator to define different behavior for some network elements; for example, some network elements poll only with SNMP, and other network elements poll with Telnet. Soft properties and activation scripts are also attached to a specific scheme. By default, the VNE inherits the VNE scheme from the default scheme. Where more than one scheme exists in the network, the VNE loads the selected scheme.
For Cisco IOS devices, you can use the Foundation or MPLS scheme, depending on the technologies you want to manage. For information on supported technologies, schemes, and device types, see Cisco Active Network Abstraction VNE Reference.
Note If desired, you can change the VNE scheme in runtime. See Viewing and Editing VNE Properties and Schemes.
|
Foundation
|
• Cisco CatOS device family.
• Cisco IOS device family, when you do not need to support technologies related to MPLS and Carrier Ethernet (see Using Network Discovery to Add Bulk VNEs).
• Other vendor device families.
|
MPLS
|
• Cisco IOS device family, when supporting technologies related to MPLS and Carrier Ethernet (see Using Network Discovery to Add Bulk VNEs).
• Cisco IOS XR device family.
|
MPLSIOSXR
|
• Cisco IOS XR device family.
|
Context
|
Specifies the default context for devices that support multiple contexts . (Context is the term that some vendors use to signify a virtual router). The key name ensures that the proper community settings are not overwritten, so that Cisco ANA can discover and investigate the devices.
|
local
|
• Redback device family
|
default
|
• Juniper device family
|
generic
|
• All other device families (this is the default)
|
Initial/VNE Status Area
|
Status
|
Sets the initial disposition of the VNE. Normally you should set it to Start. You may not want to do this if you want to verify the VNE configuration, or if you know the VNE is very complex and might need extra processing to complete the loading procedure.
|
Stop
|
Do not load the VNE (default).
|
Start
|
Load the VNE and start collecting data.
|
Maintenance
|
Start the VNE but change it to the Maintenance investigation state.
|
Location Area
|
ANA Unit
|
The IP address of the unit that hosts the VNE's AVM. This information is prepopulated.
|
AVM
|
The AVM on the unit that hosts the VNE. This information is prepopulated.
|
Step 4
Enter the VNE SNMP information to support polling and network element access:
Note
For Cisco IOS XR devices, use the default settings.
Note
If you enter the wrong credential information when adding the VNE, the VNE will not be successfully added and managed. In this case, you will have to correct the credentials and restart the VNE (see Changing VNE Status (Start, Stop, Maintenance)). However, Telnet credentials can be changed in runtime, without having to restart the VNE.
Field
|
Description
|
SNMP Version Area
|
Enable SNMP
|
Check this check box to enable the SNMP communication protocol so that the user can work with it. A VNE can have SNMP enabled or disabled at any time; however, when the Auto Detect check box is checked (in the General tab), it cannot be disabled.
|
(SNMP version)
|
Click the radio button for the SNMP version you plan to use: SNMP V1, SNMP V2, or SNMP V3.
|
SNMP V1/V2 Settings
|
Community String
|
The SNMP community string settings. These are enabled only when SNMP V1 or V2 is selected:
|
Read
|
The SNMP read community status, public (default) or private, as defined by the user.
|
Write
|
The SNMP write community status, public or private (default), as defined by the user.
|
SNMP V3 Settings
|
These settings are enabled only when SNMP V3 is selected.
|
Authentication
|
Choose one of the following authentication methods. The default is No authentication.
• No
• md5
• sha
|
User
|
This field is enabled if you choose any method other than No authentication. Enter the authentication username.
|
Password
|
This field is enabled if you choose any method other than No authentication. Enter the authentication password.
|
Encryption
|
Choose one of the following encryption methods. The default is No encryption.
• No
• des
• aes128
• aes192
• aes256
|
Password
|
This field is enabled if you choose any method other than No encryption. Enter the encryption password.
|
Auto Discover
|
Instructs Cisco ANA to automatically discovery the device's unique engine ID. We recommend that you heck this box.
|
Engine ID
|
Unique engine ID for the device. Leave this blank if you checked Auto Discover; the Engine ID will be discovered using the discovery protocol. (The Engine ID is required for the SNMP V3 connection.)
|
Step 5
Enter the VNE Telnet/SSH information to define the Telnet command sequence and to enable SSH for network element access (reachability) and investigation.
Field
|
Description
|
Protocol Settings Area
|
Enable
|
Check this check box to enable the communication protocol so Cisco ANA will investigate the network element. Checking this check box activates the Login Sequence area. You can enable or disable the communication protocol at any time.
|
Protocol
|
Choose one protocol from the drop-down list (the default is Telnet):
• Telnet
• SSHv1
• SSHv2
Note By default, when a VNE opens a Telnet session with a network element in order to model and monitor the element, the Telnet session remains open as long as the VNE is up. The VNE will not close the session due to any timeouts. If you would like to configure a timeout, contact ask-ana@cisco.com for assistance.
|
Port
|
This field is prepopulated, depending on your protocol choice:
• 23—Default port for Telnet.
• 22—Default port for SSHv1 or SSHv2.
You can also edit the port number displayed.
|
Login Sequence Area
|
Prompt and Run
|
The network element's expected prompt, and the string Cisco ANA should send to the network element (when the expected prompt is detected). Entering a string in the Prompt field activates the Run field. After making your entries in the Prompt and Run fields, click Add to add them to the login sequence. Click Remove to remove any lines.
|
Telnet
|
Enter the Telnet information. The sequence (the order of the commands) must end with a line that includes only the prompt field. (You can also change these credentials in runtime.)
• For Cisco IOS XR devices (to go to XML mode):
|
Prompt
|
Run
|
Username:
|
user name
|
Password:
|
password
|
#
|
xml
|
XML>
|
(leave blank)
|
• For Cisco IOS devices:
|
Prompt
|
Run
|
Password:
|
password
|
devicename>
|
enable
|
Password:
|
password
|
devicename#
|
enable
|
SSH V1 and V2
|
Enter the SSH information. This sequence is usually shorter than the corresponding Telnet login sequence, because the username or password may already be sent during the process of establishing the SSH session. Cisco recommends that you first use any SSH client application (such as UNIX SSH or OpenSSH) to determine the device SSH login sequence, and then enter that information.
|
Hide the Run value while typing
|
Check this check box if you do not want the Run string displayed as clear text while you enter it in the field.
|
Confirm
|
This field is activated if you checked the Hide the Run value while typing check box. Re-enter the Run string.
|
Add and Remove
|
Use these buttons to add or remove the prompt and run strings.
|
SSHv1 Area
|
Username
|
Enter the device name.
|
Password
|
Enter the device password.
|
Cipher
|
Choose the data encryption algorithm. By default, all methods are used.
• DES—Use the Data Encryption Standard algorithms.
• 3DES—Use the Triple Data Encryption Standard algorithm.
• Blowfish—Use the blowfish algorithms.
|
SSHv2 Area
|
Username
|
Enter the SSHv2 username.
|
Client Authentication
|
Choose the client-driven authentication method from the drop-down list.
|
Password
|
Use a password to authenticate the client. Enter the password in the Password field.
|
public-key
|
Optionally, use public key authentication, which uses a key pair system in which the client application is configured with the secret private key, and the device is configured with the public nonsecret key (of this pair).
• Private Key—Enter the private key, click Import to import the private key, or click Generate to generate the key.
• Public Key—Optionally, enter the public key or click Import to import the public key. The application will verify that the public and private keys are part of a pair.
|
Server Authentication
|
Choose a server authentication method from the drop-down list.
|
none
|
No server authentication. (This method does not do any authentication and is not recommended, because it poses a security risk for "man-in-the-middle" attacks.)
|
pre- configured
|
Use the server public key or fingerprint that was configured in the application event before the first connection was attempted. This is the default and is the recommended method. Selecting this method activates the Finger Print or Public Key field.
Select one of the following (and be sure to read the information in the Host Key Algorithm section):
• Finger Print—Click to use a short checksum of the server public key (this serves the same purpose, but is much shorter).
• Public Key—Click to use the public key in one of the permitted formats (see Public Key and Private Key File Formats). Enter the public key or click Import to import the key.
|
save-first- auth
|
Use the public key that was used for the first connection attempt with the server. This method assumes the first connection was legitimate. (A security risk exists if the connection was compromised.)
After the first connection, the server authentication method is changed to preconfigured, and the public key data is inserted as the preconfigured data.
|
Key Exchange1
|
Choose a key exchange algorithm. The default is none.
• diffie-hellman-group1-sha1
• diffie-hellman-group1-exchange-sha1
|
MAC1
|
Choose a MAC algorithm for key generation. The default is none.
• sha1
• md5
• sha1-96
|
Cipher1
|
Choose a cipher:
• 3des—Use the Triple Data Encryption Standard algorithms.
• aes-128—Use the Advanced Encryption Standard 128.
• aes-192—Use the Advanced Encryption Standard 192.
|
Host Key Algorithm1,2
|
Choose a host key algorithm (up to 2048-bit keys are officially supported). See Public Key and Private Key File Formats for valid file formats.
• dsa—Use the Digital Signature Algorithm.
• rsa—Use the RSA algorithm.
|
Step 6
If you chose ICMP as the VNE type in Step 3, enter the ICMP polling rate you want Cisco ANA to use to verify reachability. You can define the polling rate in seconds for the VNE.
Field
|
Description
|
Enable
|
Check this check box to instruct Cisco ANA to use the ICMP communication protocol to verify that the network element is reachable. You can enable or disable ICMP polling at any time.
|
Polling Rate
|
Enter an ICMP polling rate (in seconds).
|
Step 7
Enter the VNE Polling Information to associate a VNE with a previously created polling group, or customize different polling settings according to the type of VNE information you want (status, configuration, and so forth). For information on the settings in the default and slow polling groups, see Table 13-2 on page 13-5.)
Note
Increasing polling rates may result in excess traffic and cause the network element to crash.
Field
|
Description
|
Polling Group Area
|
Group
|
Select Group if you want to use polling rates from one of the polling groups listed in the drop-down list. If you do not select a group in the list, Cisco ANA will use the default polling group.
|
Instance
|
Select Instance to change the polling rates of any one of the built-in polling intervals displayed in the dialog box. When you select Instance, the Polling Intervals and Topology areas are activated.
|
Polling Intervals Area
|
Status
|
Sets the polling rate for status-related information, such as network element status (up or down), port status, admin status, and so on. The information is related to the operational and administrative status of the network element.
|
Configuration
|
Sets the polling rate for configuration-related information, such as VC tables, scrambling, and so on.
|
System
|
Sets the polling rate for system-related information, such as network element name, network element location, and so on.
|
Routing Forwarding
|
Sets the polling rate for routing-table related information, such as VRF and IGP/BGP routes.
|
Topology Area
|
Layer 1
|
Sets the polling rate of the topology process as an interval for the Layer 1 counter. This is an ongoing process.
|
Layer 2
|
Sets the polling rate of the topology process as an interval for the Layer 2 counter. This process is available on demand.
|
Step 8
To create the VNE, click OK. (The OK button in the New VNE dialog box is enabled only when you enter the VNE name and IP address (mandatory fields) in the General tab.)
The VNE is loaded into the bootstrap of its unit, and Cisco ANA starts investigating the network element. Cisco ANA builds a live model of the network element, including its physical and logical inventory, its configuration, and its status. Cisco ANA also creates the registry information of the new VNE in the unit. After a few minutes, verify that the Admin Status is Enabled and the Operational Status is Up.
Related Topics
•
Public Key and Private Key File Formats
•
Understanding VNE Status and VNE States
•
Changing VNE Status (Start, Stop, Maintenance)
•
Viewing and Editing VNE Properties and Schemes
•
Moving One or More VNEs
•
Deleting a VNE
•
Roles Required to Manage VNEs
Viewing and Editing VNE Properties and Schemes
After a VNE is added, you can view and edit its properties , such as the status and Telnet settings. Use this procedure to view and edit a VNE's properties.
Note
If you change the Telnet credentials, you do not have to restart the VNE. However, for all other changes, you must restart the VNE.
Step 1
In the Administration perspective, click the Objects tab and click the ANA Servers drawer.
Step 2
Open the Servers tree, and locate and click the AVM that contains the VNE in which you are interested. All VNEs in that AVM are displayed in a table below the AVM workspace.
The various fields displayed in the table are described in detail in Defining and Creating Individual VNEs; however, the following is a summary of what is provided in the table:
Field
|
Description
|
Key
|
A string that uniquely identifies a VNE in the system, across all units and AVMs.
|
Admin Status
|
The status of the relationship between the VNE and its parent AVM (see VNE Status (Operational and Admin Status)).
|
Operational Status
|
The status of the relationship between the VNE and the real network element it is managing (see VNE Status (Operational and Admin Status)).
|
IP Address
|
The IP address of the network element.
|
Maintenance
|
Whether the network element is in the Maintenance network element management state.
|
Up Since
|
When the VNE was last started.
|
SNMP
|
Whether the VNE is using SNMP for investigation and reachability.
|
Telnet
|
Whether the VNE is using Telnet for investigation and reachability.
|
Element Class
|
The VNE type, defined when the VNE was added.
|
Element Type
|
The network element family to which the network element belongs.
|
Polling Group
|
The polling group to which the parent AVM/unit belongs.
|
Step 3
To edit a VNE, or for more details about a VNE, right-click the VNE and choose Edit. You can edit the following fields:
•
VNE schemes
•
VNE SNMP version and settings
•
All VNE ICMP settings
•
All VNE Telnet/SSH settings
•
All VNE Polling settings
For more details about the fields displayed in the VNE Properties dialog box, see Defining and Creating Individual VNEs.
Step 4
Close the VNE workspace and save your changes.
Step 5
If you changed anything other than the Telnet credentials, you must restart the VNE for the changes to take effect. (Changing Telnet credentials does not require a VNE restart.)
Related Topics
•
Understanding VNE Status and VNE States
•
Changing VNE Status (Start, Stop, Maintenance)
•
Viewing and Editing VNE Properties and Schemes
•
Moving One or More VNEs
•
Deleting a VNE
•
Roles Required to Manage VNEs
Changing VNE Status (Start, Stop, Maintenance)
VNE status represents the existing condition of the VNE process, including whether the VNE is communicating with the real device it represents. You can start or stop a VNE, or change it to the Maintenance investigation state.
When you restart a VNE, Cisco ANA builds the VNE model using stored persistency information, and then starts receiving information from the network element. This saves time by enabling quick loading. For information on VNE persistency, see Appendix F, "VNE Persistency Mechanism."
To change the VNE's status:
Step 1
In the Administration perspective, click the Objects tab and click the ANA Servers drawer.
Step 2
Open the Servers tree, and click the AVM that contains the VNE in which you are interested. All VNEs in that AVM are displayed in a table in the workspace.
Step 3
Right-click the VNE and choose Start, Stop, or Maintain.
Step 4
The status of the VNE changes based on your selection:
•
If the VNE is started, a confirmation message is displayed. Click OK. An Up status is eventually displayed in the VNE properties table. (You may see a Starting Up status when, for example, the Server is overloaded or the VNE is still being loaded.)
•
If the VNE is stopped, a confirmation message is displayed. Click OK. A Down status is eventually displayed in the VNE properties table. You may see a Shutting Down status while various processes are closing down.
•
If the VNE is changed to Maintenance mode, a confirmation message is displayed. Click OK. A Maintenance status is displayed in the VNE properties table.
For information about VNE data that is persisted (saved on the unit), see VNE Persistency Mechanism, page F-1.
Related Topics
•
Understanding VNE Status and VNE States
•
Defining and Creating Individual VNEs
•
Viewing and Editing VNE Properties and Schemes
•
Moving One or More VNEs
•
Deleting a VNE
•
Roles Required to Manage VNEs
Moving One or More VNEs
You can move single and multiple VNEs between AVMs. The VNEs that are moved are unloaded from the old unit, and after they are reloaded on the new unit, their original status is maintained.
To move a single VNE or multiple VNEs:
Step 1
In the Administration perspective, click the Objects tab and click the ANA Servers drawer.
Step 2
Open the Servers tree, and locate and click the AVM that contains the VNE in which you are interested. All VNEs in that AVM are displayed in a table in the workspace.
Step 3
Right-click one or more VNEs and choose Move VNEs.
The Move To dialog box displays a tree-and-branch representation of the selected Cisco ANA server, its units, and AVMs, excluding the AVM in which the VNE is currently located. The highest level of the tree displays the Cisco ANA server. The branches can be expanded and collapsed to display and hide information.
Step 4
In the Move To dialog box, browse to and choose the AVM (branch) where you want to move the VNEs.
Step 5
Click OK. The VNE is moved to its new location, and now appears beneath the selected AVM (branch) in the VNE properties table.
Related Topics
•
Understanding VNE Status and VNE States
•
Defining and Creating Individual VNEs
•
Viewing and Editing VNE Properties and Schemes
•
Changing VNE Status (Start, Stop, Maintenance)
•
Deleting a VNE
•
Roles Required to Manage VNEs
Deleting a VNE
You can delete a VNE from an AVM (and its unit). When you delete a VNE, Cisco ANA stops the VNE and deletes all VNE references from the system and golden source, which includes the registry information of the VNE in the specified unit. A VNE that has been removed no longer appears in any future system reports. If the VNE has any static links, you must remove them before removing the VNE (dynamic links are automatically removed).
Since all VNE information is deleted, adding the VNE again requires you to enter all the VNE information.
Before You Begin
If the VNE you plan to delete has any static links, remove them. Dynamic links are automatically removed.
Step 1
In the Administration perspective, click the Objects tab and click the ANA Servers drawer.
Step 2
Open the Servers tree, and locate and click the AVM that contains the VNE in which you are interested. All VNEs in that AVM are displayed in a table in the workspace.
Step 3
Right-click the VNE and choose Delete. A warning message is displayed.
Step 4
Click Yes. A confirmation message is displayed.
Step 5
Click OK. The selected VNE is deleted from the AVM, and is no longer displayed in the VNE properties table.
Related Topics
•
Understanding VNE Status and VNE States
•
Defining and Creating Individual VNEs
•
Viewing and Editing VNE Properties and Schemes
•
Changing VNE Status (Start, Stop, Maintenance)
•
Moving One or More VNEs
•
Roles Required to Manage VNEs