PIBRKNMS-2701_-v3-Combined_第1页
PIBRKNMS-2701_-v3-Combined_第2页
PIBRKNMS-2701_-v3-Combined_第3页
PIBRKNMS-2701_-v3-Combined_第4页
PIBRKNMS-2701_-v3-Combined_第5页
已阅读5页,还剩138页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

1、How I Learned to Stop Worrying and Love Prime Infrastructure,Lewis Hickman, Consulting Systems Engineer Jennifer Valentine, Systems Engineer,BRKNMS-2701,Introduction A History Of Use Cases and Intent A Walk Through Prime Infrastructure Discovery and Inventory Configuring Devices Upgrading Software M

2、onitoring for Performance and Faults Doing It API Style Key Takeaways And A Look Ahead,Agenda,A History Of,4,Back in 1996,A History Of,5,CWSI,CiscoWorks Blue,TrafficDirector,CiscoWorks for Windows,NETSYS,AtmDirector,VlanDirector,Content Flow Monitor,nGenius Real-TimeMonitor,And where we are now,6,35

3、+ Products with the “Prime” name,Prime Common User Experience,Cisco Prime NAM,Cisco Prime Collaboration,Cisco Prime DCNM,Cisco Prime LMS,Cisco Prime Infrastructure,7,How Did We Get Here?,8,1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015,Ciscos One

4、Network - Unified Access Portfolio,Control and Visibility for IT - Predictability for Users,Ciscos One Management Prime Infrastructure,AFTER Comprehensive user and Unified Access network Visibility E.g.: #if($SerialNumber = FDO1323Z10Q),68,Pro-Tip: Interactive, Enable, and Multiline Commands,Interac

5、tive commands can be done using the #INTERACTIVE command followed by to denote a question and to specify the reply Use #ENDS_INTERACTIVE to denote the end of the interactive block Multi-line commands can be specified using the tags Enable (i.e., EXEC) mode commands can be specified within #MODE_ENAB

6、LE and #MODE_END_ENABLE comments,69,Previewing The Template Form,70,Click the Form View tab to preview what the template form will look like when it is deployed.,Deploying The Template,71,Once the template is ready, click Deploy to push the template to the Network device(s). Note: 2.2 no longer has

7、a Publishing menu, the template is automatically published, once it is saved.,Preparing To Deploy Configurations,72,Visit the configuration deployment settings to set desired values. Pro-Tip: Increasing the thread count will allow PI to deploy to more devices faster. Consider 10 or 20 for larger PI

8、servers.,Deploying The Template (cont),73,Select the template from the list of “My Templates.” Click the Deploy button to begin the workflow.,Fill In the Template Values,74,Choose the device or devices, and then fill in the parameters. Common parameters can be applied to all devices with per-device

9、overrides.,Pro-Tip: Use Import and Export to fill in values for multiple devices using a spreadsheet,Submit The Configuration Job,75,Decide on a schedule (or run the job immediately), and then click OK to deploy the template to the selected device(s).,(2.2) You can now save the running configuration

10、 to startup and change failure options as part of the job setup.,Verifying The Jobs Status,76,The jobs results will be displayed under Administration Job Dashboard User-Defined. Mouse-over the reticule to view the details pop-up,(2.2) You can now check the box for the Job and the details appear in t

11、he bottom half of the screen,Effective Software Image Management (SWIM),Ability to add images to software repository Archive from current devices Manual upload Obtain from Enhance Image meta-data with DRAM/Flash requirements for pre-qual checks Ability to push image using different transport protoco

12、ls Ability to handle boot string updates and reload Ability to handle parallelism and sequencing,77,78,Start by visiting Administration System Settings Image Management to set your desired defaults,Image Management Settings,Pro-Tip Backup all Currently deployed Images,79,Next Task: Backup all curren

13、tly deployed images Go to Inventory Software Images, Click Import Select Device Source, then All Devices,Image Backup,80,Finally the downloads will complete,Import Image into PI Software Repository,81,2.2: Add Image(s) to Software Repository from source is disabled CSCun09011-PI transmits C credenti

14、als insecurely,Import Image into PI Software Repository,82,Next Task: Add Image(s) to Software Repository from File source Go to Inventory Software Images,Click Import Select File Source, then browse to the image,Image Import (cont),83,Difference from LMS PI does not automatically pick up the image

15、meta-data used for pre-qual checks,84,Hit the Download Center to find your image and its RAM/Flash requirements Pro-Tip Use entries 10% smaller because exact number may not match math rounding,Import Image (cont),85,Next Task: Distribute/deploy an Image From the specific Image page, click the comput

16、er-looking icon in the upper-right hover-over says Distribute,Distribute Image from Repository,86,Distribute Image (cont),Next Select Device(s) to software upgrade,Upgrading Devices,87,The system advises if there are DRAM/Flash issues to handle,Upgrading Devices,88,Distribution and Scheduling Option

17、s can be specified Once submitted a job is created,Upgrading Devices (cont),89,Status can be observed and refreshed until complete,Upgrading Devices (cont),90,PI Fault Monitoring,PI does fault collection and monitoring out of the box Device-level faults Server faults Alarms and events can be sent as

18、 email notifications Alert severity can be customized for specific organizational needs Alerts can be acknowledged, cleared and annotated to help identify and prioritize operational work,91,Configuring Alarm Options,92,If not checked, then alarms (even for deleted devices) will not get deleted.,Go t

19、hrough the alarm and event options to make sure you get the most out of on-screen and in email alerts.,Changing Alarm Severities,93,Each alarm has a pre-set severity, but these can be tweaked to make alerts more relevant to your organization.,Changing Alarm Severities (cont.),94,First, select the al

20、arm or alarms to change,Then select the new severity and click Go.,PI Alarms And Events,95,PI Alarm Viewer is found under Monitor Alarms & Events An alarm is the result of one or more events detected by PI. An event is an atomic condition that occurs in the network at a specific point in time.,Filte

21、ring Alarms,96,Click the Filter button to expand the per-column filters. This makes it easy to locate specific alarms.,Viewing Alarm Details,97,Click the triangle next to the alarm to get more details about both it and the related device.,Alarm Actions,98,Each alarm can be acknowledged or cleared, a

22、ssigned to a particular user, annotated, and/or deleted.,Troubleshooting Alarms,99,Troubleshooting and support workflows can be launched, within context, directly from an alarm. E.g., if a switch is down, run a quick ping to make sure it wasnt a transient issue.,Alarms From The “Toaster”,100,Active

23、alarms are also visible throughout PI from the “toaster” popup at the bottom of all PI windows.,Event Viewer,101,Event viewer looks similar to the Alarm viewer. In addition to filtering and obtaining details, you can also perform some of the same troubleshooting steps.,Viewing Syslog Messages,102,Li

24、ke LMS, PI listens for syslog messages. The Syslog tab under Alarms & Events will show all messages with a live refresh every 60 seconds.,(2.2) Provides additional syslog severity visibility.,Client Tracking,User (or Client) Tracking in PI shows converged wired and wireless clients Clients on autono

25、mous APs, lightweight APs, and switches are supported 802.1x authentication can be detected Non-authenticated also supported Like LMS, live tracking of clients can be done by enabling MAC address notification traps on switches,103,On Friday before the show, staff is looking at network health with Pr

26、ime Infrastructure They notice a large volume of traffic, taking up a lot of WAN bandwidth Easily able to see that the traffic is all from one user, and is all Bit-Torrent !?!?! Immediately able to see the exact end-point (IP & MAC address) NAM shows hostname is “Matts MacBook” Integration with MSE

27、lets wireless maps show the exact location of “Matt”,104,Cisco Live Milan 2015: The Bit-Torrent Incident,105,Cisco Live Milan 2015: The Bit-Torrent Incident,Staff walks down and has a chat with “Matt” He shuts off Bit-Torrent ACL added to WAN interface Problem solved in less than 15 minutes - includ

28、ing the time to walk downstairs to find Matt!,Silo tools cannot do this!,Setting Up For Client Tracking,106,Before collecting clients on the network, adjust the settings for hostname resolution (a useful thing), data retention, and ,Viewing/Filtering The Clients,107,The client viewer can be found un

29、der Monitor Clients and Users. The client list can be filtered using basic per-column values with the Quick Filter “Show” option,Viewing Client Details,108,Clicking the radio button next to a client populates the client details pane.,Providing Client Information,109,Just like in LMS, notes can be ad

30、ded per-client to better describe the clients purpose.,Clicking the radio button next to a client populates the client details pane.,Pro-Tip: Bookmarking Client Details,110,The Client Details pane can be detached from the client list and bookmarked for easy access and sharing.,https:/pi1/webacs/welc

31、omeAction.do?commandType=abridgedShell#pageId=monitorClientDetail_pageId&queryParams=command%3Ddetail%26deviceIp%3D1%26mobileStationMac%3D44%3Ad3%3Aca%3Aad%3A53%3A70%26forceLoad%3Dtrue,Tracking Clients,111,The appearance of clients can trigger emails or PI alarms. Combine this with trap pr

32、ocessing, to know immediately when a specific host joins the network.,Network Monitoring,PI has a number of monitoring features Device health Interface utilization Performance and application Performance and application monitoring requires the Assurance License Many of PIs monitoring features are en

33、abled out-of-the-box Dashlets make it easy to quickly spot problems in the network,112,Enabling Monitoring Templates,113,Templates for enabling various monitoring tasks can be found under Design Monitoring Configuration. Of the built-in Metrics templates, only Interface Health is not deployed to dev

34、ices by default.,(2.2) Now done under Monitoring Monitoring Policies Automonitoring and Monitoring Monitoring Policies My Policies.,Selecting Devices For Monitoring,114,Devices (or ports) can be selected for a template based on a static list (Devices radio button) or a dynamic group of devices (Devi

35、ce Groups radio button).,Dashboards and Dashlets,115,The PI dashboards provide a “quilt” for plugging in dashlets that visualize the health and performance of the network and individual devices.,Dashboards and Dashlets,116,Each of the main dashboard tabs (Overview, Incidents, Performance, and Detail

36、 Dashboard) offer their own set of dashlets. When adding a new dashlet, its preview will show up when you mouse-over the reticle.,Custom SNMP Templates,117,If the built-in templates do not give you the visibility you want, create a custom SNMP template under Monitor Monitor Policies and click on Add

37、.,Custom SNMP Templates,118,Use Custom MIB Polling and choose from the list provided, or upload the MIB needed for the new template.,Custom SNMP Templates,119,In PI 2.2, new templates are automatically deployed. They can be deactivated by going to MonitorMonitoring PoliciesMy Policies, and selecting

38、 the new policy.,Monitoring The New Template,120,Add a new Generic Dashlet (DashboardPerformance, not Overview!) to one of the Detail Dashboards and fill in the desired parameters for your custom template.,Monitoring Application Performance,121,With the Assurance license, PI can receive NetFlow sent

39、 to UDP/9991. The Overview Service Assurance and Service Health dashboards will show per-device, per-interface, and per-application performance and utilization.,Network Topology,Network Topology Page Maps Network Topology Main landing page for viewing network topology Topology Dashlets Topology Dash

40、lets available for Overview level dashboards Multiple Topology dashlets supported Any topology map can be viewed in a dashlet Device 360 “N-Hop” contextual topology view Device 360 adds new action icon to see device context topology,Location Group Topology Campus.,Alarm Badge indicates highest alarm

41、 state of items inside the Container,Location Group Topology,Launch the Device 360 View,Click on the device to get Device Summary,Manually Create ElementsNetwork / Device / Link,Edit Interface Assignment,Doing it API Style,RESTful APIs,126,Cisco Prime Infrastructure 2.2 API Reference Guide,Automated

42、 Monitoring,Getting Started,Organized around: Device related information, such as physical and logical details, but also credentials, alarms and events. Statistics related to devices, enabling assessment of the health of Devices in the network. Report access, where you can trigger and collect result

43、 of any report defined in the system. Template Configuration access, manage, and deploy configuration templates through the API. A Representational State Transfer (RESTful) resource Supports the XML & JSON data formats,The Prime Infrastructure API,127,Getting Started,128,https:/SERVER/webacs/api/v1/

44、,Getting Started with Authentication,Poll with an account in the Admin or North Bound API group The API uses basic authentication - the user name is appended with a colon and concatenated with the password and encoded with the Base64 algorithm Example: with user name Aladdin and password open sesame

45、, Base64 encode the string Aladdin:open sesame to get QWxhZGRpbjpvcGVuIHNlc2FtZQ= The Authorization HTTP header used is Authorization: Basic QWxhZGRpbjpvcGVuIHNlc2FtZQ= curl -k -u username:password https:/your_server/webacs/api/v1/data/InventoryDetails,129,Getting Started,130,There are LOADS of metr

46、ics that can be polled most under the Statistics category,Enhanced Northbound REST APIs,Following additional RW APIs are supported in PI 2.2,131,API example,132,Example: Get all Device summary data https:/your_server/webacs/api/v1/data/Devices/2285291,Getting Started,133,Example: Get all Top 5 devic

47、es by CPU Usage https:/SERVER/webacs/api/v1/op/statisticsService/device/topNCPU?range=1&topN=5,Key Takeaways and Looking Ahead,Key Takeaways/Conclusion,135,There are many good features in Prime Infrastructure - many are better than LMS,Feature Parity with LMS has made great strides - Take advantage

48、of the flexible licensing to run both,PI 3.0 continues the progression,We hope you see the usability and highly customizable interface that PI brings to the table,Prime Infrastructure 3.0 HighlightsAvailable July/August 2015,Generic SNMP Trap Support- Support receiving any trap from any device and c

49、reating a top level Alarm,Useful Information,Cisco Prime LMS 4.2 and Cisco Prime Infrastructure 2.2 Functional Comparison Transitioning from Cisco Prime LMS to Cisco Prime Infrastructure Cisco Prime Infrastructure 2.X Deployment Guide Cisco Prime Infrastructure Best Practices,137,Call to Action,Visi

50、t the World of Solutions for Cisco Campus: EN and ACI areas for Prime Infra and APIC-EM Demos Whisper Suites: Get in touch with your Cisco Account/Partner team to schedule 1-on-1 meetings with Product Teams at SDN and Network Transformation Whisper Suites Visit the NOC to see a live version of Prime Infrastructure managing the s

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论