logo资料库

Cisco Prime Infrastructure配置手册.pdf

第1页 / 共342页
第2页 / 共342页
第3页 / 共342页
第4页 / 共342页
第5页 / 共342页
第6页 / 共342页
第7页 / 共342页
第8页 / 共342页
资料共342页,剩余部分请下载后查看
Cisco Prime Infrastructure 2.0 User Guide
Preface
Audience
Related Documentation
Obtaining Documentation and Submitting a Service Request
Getting Started
Introduction to Cisco Prime Infrastructure
Prime Infrastructure Organization
Adding Licenses
Adding a License to Access Features
Adding Devices to Prime Infrastructure
Before You Add Devices
Configuring Server Backups
Installing Software Updates
Configuring Email Server Settings to Receive Notifications
Methods for Adding Devices
Adding Devices Using Discovery
Understanding the Discovery Process
Running Discovery
Running Quick Discovery
Verifying Discovery
Importing Devices from Another Source
CSV File Requirements for Importing Devices
Adding Devices Manually
Validating That Devices Were Added Successfully
Verifying Device Credentials
Adding NAM HTTP/HTTPs Credentials
Exporting Devices
Next Steps
Grouping Devices and Ports
Grouping Devices by Device Type
Creating Groups of Ports
Creating Customized Port Groups
Deleting a Port Group
Grouping Devices by Site
Creating Sites
Importing Site Map Data
Associating Endpoints with a Site
Creating Customized Groups
Device Accessibility in Parent-Child Device Groups
Creating Dynamic Device Groups
Assigning Devices to a Static Group
Hiding Empty Groups
Setting Up Network Monitoring
Specifying Which Interfaces and Ports to Monitor
Setting Up WAN Interface Monitoring
Getting Enhanced Client Information by Integrating with ISE
Adding an Identity Services Engine
Configuring ACS View Servers
Setting Up Assurance for Performance Monitoring
Enabling NAM Data Collection
Enabling NetFlow Data Collection
Getting Help Setting Up and Configuring Devices
Preconfiguring Devices to be Added Later
Supported Devices and Software Images for Plug and Play Setup Workflow
Prerequisites
Getting the Configuration to New Devices
Specifying Device Credentials
Saving the Plug and Play Profile
Sample Output from Plug and Play Setup
Verifying Plug and Play Provisioning Status
Getting Help Setting Up Access Switches
Before You Begin
Assign Devices to Sites
Choose Devices
Configuring Wired Features Using Guided Mode
IP Address Options
Device Credentials
VLAN and Switching Parameters
Auto Smartports and Uplinks
Confirmation
Configuring Wired Features Using Advanced Mode
Configuring Wireless Features
Create Groups
Wireless Parameters
Wireless LAN Security
Guest Access
Confirmation
Designing the Network
Planning Your Network Design
Types of Configurations
Guidelines for Planning Your Network Design
Planning Template Deployments
Deployment Scenarios
Template Workflow for Switches
Reusable Policy Objects
Template Testing
Designing Device Configurations
Creating Feature-Level Configuration Templates
Creating and Deploying Feature-Level Configuration Templates
Creating Features and Technologies Templates
Creating CLI Templates
Tagging Templates
Creating Monitoring Templates
Monitoring Network Device Metrics
Example: Creating Health Monitoring Templates
Monitoring NetFlow Traffic
Defining Thresholds
Example: Defining Health Monitoring Thresholds
Health Monitoring Template Metrics
Deploying Monitor Configuration Templates
Creating Composite Templates
Grouping Configuration Templates with Devices
Creating Shared Policy Objects
Creating Interface Roles
Creating Network Objects
Creating Wireless Configuration Templates
Creating Lightweight AP Configuration Templates
Creating Autonomous AP Configuration Templates
Creating Switch Location Configuration Templates
Creating Autonomous AP Migration Templates
Creating Controller Configuration Groups
Creating a New Configuration Group
Adding or Removing Controllers from a Configuration Group
Configuring Multiple Country Codes
Applying or Scheduling Configuration Groups
Auditing Configuration Groups
Rebooting Configuration Groups
Retrieving Configuration Group Reports
Creating wIPS Profiles
Creating Custom SNMP Polling Templates
Deploying Templates and Tasks
Planning Template Deployments
Deploying and Monitoring Configuration Tasks
Automating Device Deployment
Automating Device Deployment Using Plug and Play Profiles
Prerequisites for Using Plug and Play Profiles
Creating Plug and Play Profiles
Delivering and Applying the Bootstrap
Configuring Controller Deployments
Using the Auto Provisioning Filter List
Adding an Auto Provisioning Filter
Auto Provisioning Primary Search Key Settings
Managing Scheduled Configuration Task Templates
Managing AP Template Tasks
Viewing WLAN Configuration Scheduled Task Results
Managing Software Downloads
Troubleshooting Template Deployment
Operating the Network
Operating and Monitoring the Network
Monitoring Dashboards
Monitoring Background Tasks
Device Work Center
Import Policy Updates
Restarting the Prime Infrastructure Server
Monitoring Jobs
Monitoring the System Using Reports
Monitoring and Troubleshooting Network Traffic
Diagnosing Site Connectivity Issues and Comparing Configurations
Monitoring a Controller or a Specific AP
Post-Deployment Application Monitoring
Securing Network Services
Monitoring Alarms
What Is an Event?
Recurring Alarms and Events
What Is an Alarm?
Where to Find Alarms
Where to Find Syslogs
Defining Alarm Thresholds
Changing Alarm Status
When to Acknowledge Alarms
Including Acknowledged and Cleared Alarms in Searches
Changing Alarm and Event Options
Configuring Alarm Severity Levels
Getting Help for Alarms
Updating Device Inventory
Changing Discovery Settings
Scheduling Discovery Jobs
Monitoring the Discovery Process
Discovery Protocols and CSV File Formats
Updating Device Inventory Manually
Importing Device Inventory
Troubleshooting Unmanaged Devices
Managing Device Groups
Device Accessibility in Parent-Child Device Groups
Creating Dynamic Device Groups
Assigning Devices to a Group
Synchronizing Devices
Configuring Device Features
Configuring the Device using WSMA
Configuring Application Visibility
Estimating CPU, Memory and NetFlow Resource on ASR Devices
NBAR Protocol Packs
Creating an Application Visibility Template
Enabling Default Application Visibility on an Interface
Application Visibility Troubleshooting Sessions
Activating or Deactivating a Troubleshooting Session
Editing or Deleting a Troubleshooting Session
Creating a VPN Component Template
Creating an IKE Policies Template
Creating an IKE Settings Template
Creating an IPsec Profile Template
Creating a Preshared Keys Template
Creating RSA Keys Template
Creating a Transform Sets Template
Configuring an Easy VPN Server
Creating an Easy VPN Server Proxy Setting Template
Creating an Easy VPN Remote Template
Creating an Easy VPN Server Template
Creating a GSM Profile Template
Creating a Cellular Profile Template
Redirecting HTTP and HTTPs Traffic
Configuring Interfaces
Configuring a Serial Interface
Configuring POS Interface
Configuring a Service Module
Configuring Controllers
Creating a Gigabit Ethernet or Fast Ethernet Interface
Creating a Loopback Interface
Creating a VLAN Interface
Editing a VLAN Interface
Creating a Tunnel Interface
Editing an Existing Tunnel Interface
Creating a Virtual Template Interface
Editing an Existing Virtual Template Interface
Configuring Cellular WAN Interfaces
Configuring a CDMA Interfaces
Configuring a GSM Interfaces
Configuring Network Address Translation (NAT)
NAT Types
Configuring NAT for IP Address Conservation
Creating NAT IP Pools
Creating NAT44 Rules
Configuring Interfaces
Setting Up NAT MAX Translation
Configuring DMVPN
Creating a DMVPN Tunnel
Configuring Hub and Spoke Topology
Configuring a DMVPN Fully Meshed Topology
Configuring a Cluster Topology
Editing a DMVPN
Deleting a DMVPN
Configuring GETVPN
Creating a GETVPN Group Member
Creating a GETVPN Key Server
Editing a GETVPN Group Member or Key Server
Deleting a GETVPN Group Member or Key Server
Configuring VPN Components
Configuring IKE Policies
Configuring IKE Settings
Configuring IPsec Profiles
Creating Preshared Keys
Creating RSA Keys
Configuring Transform Sets
Creating a Zone-Based Firewall
Configuring a Zone-Based Firewall Template
Creating an Interface Role
Creating an IPv4 Network Object
Defining Device Override
Creating a Zone-Based Firewall Policy Rules Template
Configuring a Zone-Based Firewall on a Single Device
Creating a Routing Protocol
Creating a Static Route
Creating a RIP Route
Creating an EIGRP Route
Creating an OSPF Route
Working with Device Configurations
Configuration Archives
Changing Prime Infrastructure Device Configuration Settings
Comparing Current and Previous Device Configurations
Overview of Device Configurations
Changing a Single Device Configuration
Adding a Wireless LAN Controller
Changing Wireless LAN Controller Configuration Settings
Rebooting Controllers
Configuration Rollbacks
Rolling Back Device Configuration Versions
Deleting Device Configurations
Configuring Redundancy on Controllers
Prerequisites and Limitations for Redundancy
Configuring Redundancy Interfaces
Configuring Redundancy on a Primary Controller
Configuring Redundancy on a Secondary Controller
Monitoring and Troubleshooting the Redundancy States
Configuring Peer Service Port IP and Subnet Mask
Adding a Peer Network Route
Administration Commands for Redundancy
Disabling Redundancy on Controllers
Maintaining Software Images
Setting Image Management and Distribution Preferences
Managing Software Images
Importing Software Images
Changing Software Image Requirements
Deploying Software Images to Devices
Distributing Software Images from Cisco.com
Analyzing Software Image Upgrades
Working with Wireless Operational Tools
Configuring Guest User Templates
Running a Voice Audit on a Controller
Running Voice Diagnostics
Location Accuracy Tool
Enabling the Location Accuracy Tool
Scheduling a Location Accuracy Test
Running an On-Demand Location Accuracy Test
Configuring Audit Summary
Configuring Migration Analysis
Upgrading Autonomous Access Points
Changing Station Role to Root Mode
Running Migration Analysis
Viewing the Migration Analysis Report
Viewing a Firmware Upgrade Report
Viewing a Role Change Report
RRM
Monitoring RFID Tags
Searching RFID Tags
Checking RFID Tag Search Results
Viewing Tag List
Chokepoints
Adding a Chokepoint to the Prime Infrastructure Database
Adding a Chokepoint to a Prime Infrastructure Map
Removing a Chokepoint from the Prime Infrastructure Database
Removing a Chokepoint from a Prime Infrastructure Map
Editing a Chokepoint
Monitoring Interferers
Spectrum Experts
Adding a Spectrum Expert
Spectrum Experts Details
Wi-Fi TDOA Receivers
Enhancing Tag Location Reporting with Wi-Fi TDOA Receivers
Adding Wi-Fi TDOA Receivers to Prime Infrastructure and Maps
Ensuring Consistent Application Experiences
Evaluating Service Health
Health Rules
Creating Custom Applications
Identifying Optimization Candidates
Establishing Performance Baselines
Enabling Baselining
Validating Optimization ROI
Monitoring Optimized Flows
Working with Wireless Mobility
What Is Mobility?
Mobility Work Center
Creating a Mobility Domain
Creating a Switch Peer Group
Changing a Mobility Role
Mobility Anchors
Configuring a Guest Anchor Controller for a WLAN
Configuring the Cisco AppNav Solution
Overview of Cisco AppNav
Components of Cisco AppNav
Prerequisites for Configuring Cisco AppNav
Configuring Cisco AppNav
Configuring Cisco AppNav from the Device Work Center
Configuring Cisco AppNav Using Templates
Deploying a Cisco AppNav Template
Configuring Cisco AppNav Automatically During ISR-WAAS Container Activation
Configuring the Cisco WAAS Container
Prerequisites for Installing an ISR-WAAS Container
Cisco WAAS Central Manager Integration
Cisco WAAS Central Manager Integration
Configuring Single Sign-On
Creating a Username in Cisco WAAS Central Manager
Cross-Launching Cisco WAAS Central Manager
Defining Interface Roles
Importing an OVA image
Configuring Cisco AppNav Automatically During ISR-WAAS Container Activation
Installing an ISR-WAAS Container
Installing and Activating an ISR-WAAS Container
Installing an ISR-WAAS Container on a Single Router
Installing an ISR-WAAS Container on Multiple Routers
Uninstalling and Deactivating a Cisco WAAS Container
Uninstalling a Single Cisco ISR-WAAS Container
Uninstalling a Multiple Cisco ISR-WAAS Container
Deactivating a Cisco ISR-WAAS Container
Troubleshooting
Getting Help from Cisco
Launching the Cisco Support Community
Opening a Support Case
Checking an End User’s Network Session Status
Troubleshooting Authentication and Authorization
Troubleshooting Network Attachments
Troubleshooting Network Attachment Devices
Troubleshooting Site Network Devices
Troubleshooting Applications
Troubleshooting the User Application and Site Bandwidth Utilization
Troubleshooting User Problems
Troubleshooting the User’s Experience
Troubleshooting Voice/Video Delivery to a Branch Office
Troubleshooting Unjoined Access Points
Troubleshooting RTP and TCP Flows Using Mediatrace
Using the Mediatrace Tables
Running Mediatrace from Selected RTP or TCP Flows
Launching an Ad Hoc Mediatrace From Endpoints
Troubleshooting Worst RTP Endpoints Using Dashlets
Comparing Flow Data From Multiple Sources
Managing Reports
Managing Reports
Creating, Scheduling, and Running a New Report
Customizing Report Results
Managing Scheduled Run Results
Managing Saved Report Templates
Prime Infrastructure Reports
Autonomous AP Reports
CleanAir Reports
Client Reports
Compliance Reports
Device Reports
Guest Reports
MSE Analytics Reports
Mesh Reports
Network Summary Reports
Performance Reports
Raw NetFlow Reports
Security Reports
A
Prime Infrastructure User Interface Reference
Prime Infrastructure UI Components
Global Toolbars
Dashboards and Dashlets
Filters
Data Entry Features
Common UI Tasks
Changing Your Password
Changing Your Active Domain
Monitoring Alarms
Getting Device Details from the Device 360 View
Getting User Details from the User 360 View
Getting Help
Search Methods
Performing a Quick Search
Performing an Advanced Search
Performing a Saved Search
Configuring the Search Results Display (Edit View)
Index
Cisco Prime Infrastructure 2.0 User Guide September 2013 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 Text Part Number: OL-27936
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R) Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental. Cisco Prime Infrastructure 2.0 User Guide © 2011-2013 Cisco Systems, Inc. All rights reserved.
C O N T E N T S Preface xvii xvii Audience Related Documentation Obtaining Documentation and Submitting a Service Request xvii xvii xvii P A R T 1 Getting Started C H A P T E R 1 Introduction to Cisco Prime Infrastructure 1-1 Prime Infrastructure Organization 1-1 C H A P T E R 2 Adding Licenses 2-1 Adding a License to Access Features 2-1 C H A P T E R 3 Adding Devices to Prime Infrastructure 3-1 Before You Add Devices 3-1 Configuring Server Backups Installing Software Updates Configuring Email Server Settings to Receive Notifications 3-1 3-2 3-2 Methods for Adding Devices Adding Devices Using Discovery 3-3 3-3 Understanding the Discovery Process Running Discovery 3-3 Running Quick Discovery Verifying Discovery 3-7 3-6 3-3 Importing Devices from Another Source 3-7 CSV File Requirements for Importing Devices 3-8 Adding Devices Manually Validating That Devices Were Added Successfully 3-9 3-9 Verifying Device Credentials 3-10 Adding NAM HTTP/HTTPs Credentials Exporting Devices Next Steps 3-11 3-11 3-10 OL-27936 Cisco Prime Infrastructure 2.0 User Guide iii
4-1 4-3 Grouping Devices and Ports 4-1 Grouping Devices by Device Type Creating Groups of Ports Creating Customized Port Groups 4-3 Deleting a Port Group Grouping Devices by Site 4-4 4-2 4-3 Contents C H A P T E R 4 Creating Sites Importing Site Map Data Associating Endpoints with a Site 4-4 4-6 Creating Customized Groups 4-6 Device Accessibility in Parent-Child Device Groups Creating Dynamic Device Groups Assigning Devices to a Static Group Hiding Empty Groups 4-7 4-8 4-8 4-7 C H A P T E R 5 Setting Up Network Monitoring 5-1 Specifying Which Interfaces and Ports to Monitor 5-2 Setting Up WAN Interface Monitoring 5-1 Getting Enhanced Client Information by Integrating with ISE 5-3 Adding an Identity Services Engine Configuring ACS View Servers 5-3 5-3 Setting Up Assurance for Performance Monitoring 5-4 Enabling NAM Data Collection Enabling NetFlow Data Collection 5-4 5-4 C H A P T E R 6 Getting Help Setting Up and Configuring Devices 6-1 Preconfiguring Devices to be Added Later 6-1 6-3 Supported Devices and Software Images for Plug and Play Setup Workflow 6-2 Prerequisites Getting the Configuration to New Devices Specifying Device Credentials Saving the Plug and Play Profile Sample Output from Plug and Play Setup 6-5 6-5 6-4 6-4 Verifying Plug and Play Provisioning Status Getting Help Setting Up Access Switches 6-6 6-6 Before You Begin 6-7 Assign Devices to Sites Choose Devices 6-7 6-7 Cisco Prime Infrastructure 2.0 User Guide iv OL-27936
Configuring Wired Features Using Guided Mode 6-8 Contents 6-8 6-9 IP Address Options Device Credentials VLAN and Switching Parameters Auto Smartports and Uplinks Confirmation 6-10 6-9 6-9 Configuring Wired Features Using Advanced Mode Configuring Wireless Features 6-11 6-10 Create Groups 6-11 Wireless Parameters Wireless LAN Security Guest Access Confirmation 6-11 6-11 6-11 6-11 P A R T 2 Designing the Network C H A P T E R 7 Planning Your Network Design 7-1 7-1 Types of Configurations Guidelines for Planning Your Network Design Planning Template Deployments 7-2 Template Workflow for Switches Reusable Policy Objects Template Testing 7-4 Deployment Scenarios 7-2 7-3 7-3 7-2 C H A P T E R 8 Designing Device Configurations 8-1 Creating Feature-Level Configuration Templates 8-2 Creating and Deploying Feature-Level Configuration Templates Creating Features and Technologies Templates Creating CLI Templates Tagging Templates 8-2 8-3 8-11 Creating Monitoring Templates 8-12 8-2 8-13 Monitoring Network Device Metrics Example: Creating Health Monitoring Templates Monitoring NetFlow Traffic Defining Thresholds 8-14 Example: Defining Health Monitoring Thresholds Health Monitoring Template Metrics 8-13 8-15 8-13 8-14 OL-27936 Cisco Prime Infrastructure 2.0 User Guide v
Contents Deploying Monitor Configuration Templates 8-17 Creating Composite Templates Grouping Configuration Templates with Devices Creating Shared Policy Objects 8-18 8-20 Creating Interface Roles Creating Network Objects 8-20 8-21 Creating Wireless Configuration Templates 8-22 8-19 Creating Lightweight AP Configuration Templates Creating Autonomous AP Configuration Templates Creating Switch Location Configuration Templates Creating Autonomous AP Migration Templates 8-23 8-22 8-22 8-23 8-24 8-24 Creating Controller Configuration Groups Creating a New Configuration Group Adding or Removing Controllers from a Configuration Group Configuring Multiple Country Codes Applying or Scheduling Configuration Groups Auditing Configuration Groups Rebooting Configuration Groups 8-28 Retrieving Configuration Group Reports Creating wIPS Profiles 8-29 8-27 8-26 8-27 8-29 Creating Custom SNMP Polling Templates 8-32 C H A P T E R 9 9-1 Deploying Templates and Tasks Planning Template Deployments Deploying and Monitoring Configuration Tasks Automating Device Deployment 9-1 9-2 9-2 9-4 Automating Device Deployment Using Plug and Play Profiles Prerequisites for Using Plug and Play Profiles Creating Plug and Play Profiles 9-6 Delivering and Applying the Bootstrap 9-10 Using the Auto Provisioning Filter List Adding an Auto Provisioning Filter Auto Provisioning Primary Search Key Settings Managing Scheduled Configuration Task Templates Configuring Controller Deployments 9-11 9-11 9-11 9-10 9-7 8-25 9-3 Managing AP Template Tasks Viewing WLAN Configuration Scheduled Task Results Managing Software Downloads 9-13 9-12 9-12 Cisco Prime Infrastructure 2.0 User Guide vi OL-27936
Troubleshooting Template Deployment 9-16 P A R T 3 Operating the Network C H A P T E R 10 Operating and Monitoring the Network 10-1 Contents Monitoring Dashboards 10-1 Monitoring Background Tasks Device Work Center Import Policy Updates 10-4 10-6 10-3 Restarting the Prime Infrastructure Server 10-6 10-6 10-7 Monitoring Jobs Monitoring the System Using Reports Monitoring and Troubleshooting Network Traffic Diagnosing Site Connectivity Issues and Comparing Configurations Monitoring a Controller or a Specific AP Post-Deployment Application Monitoring Securing Network Services 10-12 10-10 10-8 10-9 10-9 C H A P T E R 11 Monitoring Alarms What Is an Event? 11-1 11-1 Recurring Alarms and Events 11-2 11-3 What Is an Alarm? Where to Find Alarms Where to Find Syslogs Defining Alarm Thresholds Changing Alarm Status 11-4 11-5 11-6 11-5 When to Acknowledge Alarms Including Acknowledged and Cleared Alarms in Searches 11-6 11-6 Changing Alarm and Event Options Configuring Alarm Severity Levels Getting Help for Alarms 11-7 11-7 11-7 C H A P T E R 12 Updating Device Inventory 12-1 Changing Discovery Settings Scheduling Discovery Jobs 12-1 Monitoring the Discovery Process 12-1 12-2 OL-27936 Cisco Prime Infrastructure 2.0 User Guide vii
Contents 12-2 Discovery Protocols and CSV File Formats Updating Device Inventory Manually Importing Device Inventory Troubleshooting Unmanaged Devices Managing Device Groups 12-5 12-3 12-3 12-4 Device Accessibility in Parent-Child Device Groups Creating Dynamic Device Groups Assigning Devices to a Group 12-6 12-7 12-6 Synchronizing Devices 12-7 C H A P T E R 13 Configuring Device Features 13-1 Configuring the Device using WSMA Configuring Application Visibility 13-2 13-1 13-4 13-5 Estimating CPU, Memory and NetFlow Resource on ASR Devices NBAR Protocol Packs Creating an Application Visibility Template Enabling Default Application Visibility on an Interface Application Visibility Troubleshooting Sessions 13-8 Activating or Deactivating a Troubleshooting Session Editing or Deleting a Troubleshooting Session 13-9 13-7 13-9 13-5 Creating a VPN Component Template Creating an IKE Policies Template Creating an IKE Settings Template Creating an IPsec Profile Template Creating a Preshared Keys Template Creating RSA Keys Template 13-11 Creating a Transform Sets Template 13-12 Configuring an Easy VPN Server 13-10 13-10 13-10 13-10 13-11 13-12 Creating an Easy VPN Server Proxy Setting Template Creating an Easy VPN Remote Template Creating an Easy VPN Server Template Creating a GSM Profile Template Creating a Cellular Profile Template 13-13 13-14 13-15 13-15 13-12 Redirecting HTTP and HTTPs Traffic Configuring Interfaces 13-17 13-16 13-17 Configuring a Serial Interface Configuring POS Interface Configuring a Service Module 13-18 13-18 Cisco Prime Infrastructure 2.0 User Guide viii OL-27936
分享到:
收藏