Cisco prime network analysis module software user guide

cisco prime network analysis module software user guide

Before you can monitor data, you must direct specific traffic flowing through a switch or router to the Prime NAM software for monitoring. This chapter contains getting started information for both users that want to use the NAM quickly without customizing the product or that want. It contains details on network performance management as well as usage scenarios for the Cisco Prime Network Analysis Module Software. HOW TO OPEN A DOWNLOADED FILE ON SLACK Сообщаю Для вас, что.

View dashboards which give you a quick view of traffic performance information, and various incidents. Use interactive reports filter data when monitoring specific network traffic and troubleshooting problems. Monitor your network and perform other day-to-day operations related to proactive and reactive traffic analysis and troubleshooting. Analyze QoS policy traffic using alarms, syslogs, traps, and e-mail alerts.

Change default system display, notification, and user settings, as well as manage database access control and view system diagnostics. See Performing User and System Administration. Configure devices to share data with NAM. Configure managed devices and data sources. Perform customized setup of NAM including sites, alarms and thresholds, scheduled exports, and so on.

Determine which locations are ingress or egress points of a logical network boundary aggregation layer, core, campus edge, and so on that can offer valuable insights into the network activity within that partition. Create a baseline of current metrics including applications, bandwidth per application, top conversations and hosts, QoS values used in the network, unrecognized protocols, and current server and end-to-end response time measurements.

Resolve common NAM issues including login problems and unresponsiveness, understand error messages, and troubleshoot network issues using Prime NAM. Cisco NAM is supported on a variety of platforms. This guide focuses on functions and capabilities of the platforms. It is important to note that the portfolio of Cisco NAM models differ in memory, performance, disk size, and other capabilities.

Therefore, some allow for more features and capabilities for example, the amount of memory allocated for capture. Throughout this guide, there may be notes explaining that some features apply only to specific platforms. If there is no note, then that feature or aspect applies to all Cisco NAM platforms. For details on memory, performance, disk size, and other capabilities, see the NAM Compatibility Matrix.

Prime NAM 6. The Cisco Prime NAM appliance has the option for one of two interface card types according to your requirement:. NAM 6. NAM software enables network managers to understand, manage, and improve how applications and services are delivered to end-users. The NAM offers flow-based traffic analysis of applications, hosts, and conversations, performance-based measurements on application, server, and network latency, quality of experience metrics for network-based services such as voice over IP VoIP and video, and problem analysis using deep, insightful packet captures.

To understand which types of monitoring are supported by specific NAM data sources, see Table Table Data Source Monitoring Capabilities. For information about which traffic sources are supported on each platform, see the NAM Compatibility Matrix. For detailed instructions, see your platform installation guide, except where noted:.

For optional advanced customizations, such as adding sites or configuring alarms and thresholds, see Advanced Configuration Overview. Skip to content Skip to search Skip to footer. Book Contents Book Contents. You can specify whether syslog messages should be logged locally on the NAM, on a remote host, or both. If logging on a remote host, in most Unix-based systems, the syslog collector that handles the incoming syslog messages uses the facility field to determine what file to write the message to, and it will use a facility called local7.

Check the syslog collector configuration to ensure that local7 is handled properly. Each address you enter receives syslog messages from all three alarms Alarm Thresholds, Voice Signaling Thresholds, and System. Step 3 Click Submit to save your changes, or click Reset to cancel. Traps are used to store alarms triggered by threshold crossing events. When an alarm is triggered, you can trap the event and send it to a separate host. Trap-directed notifications can result in substantial savings of network and agent resources by eliminating the need for frivolous SNMP requests.

To configure, edit, or delete a host destination to which Prime NAM will send traps:. Step 2 Click Create. Step 4 In the IP Address field, enter the IP address to which the trap is sent if the alarm and trap community strings match. Step 6 Click Submit to save your changes, or click Reset to cancel and leave the configuration unchanged.

See Table C describes the fields of the Preferences window and why you may want to change the defaults. Certain software-only NAM platforms require software licenses to run. You can see your NAM platform installation guide for details. Follow the instructions on this page to obtain a NAM license file.

Store this license file on an available FTP server. Use the license install command to install the license after the NAM software installation completes. Several Cisco Prime Network Analysis Module platforms require you to install a product license in the form of a text file see your release notes as platform support changes with each release. An evaluation license allows you to use the software for up to 60 days.

The NAM login window indicates how many days remain before the evaluation license expires. You can provide licensing information, also known as node-locking information, during software installation or after software installation using the NAM CLI. There is no license required for the protocol pack usage in Prime NAM. The Diagnostics option of the Administration menu provides tools to aid in troubleshooting. There are options for:.

You can view any failures or problems that the NAM has detected during normal operations. Each alert includes a date, the time the alert occurred, and a message describing the alert. The NAM displays up to one thousand 1, of the most-recent alerts.

If more than 1, alerts have occurred, you need to use the NAM CLI command show tech-support to see all of the alerts. If you notice an alert condition and troubleshoot and attempt to solve the condition causing the alert, you might want to click Clear to remove the list of alerts to see if additional alerts occur.

The Audit Trail option displays a listing of recent critical activities that have been recorded in an internal syslog log file. The following user activities are logged in the audit trail:. The Audit Trail window provides a way to view the user access log and filter entries based on time, user, IP address from or activity.

The internal log files are rotated after reaching certain size limits. The NAM syslog records NAM system alerts that contain event descriptions and date and timestamps, indicating unexpected or potentially noteworthy conditions. This feature generates a potentially extensive display of the results of various internal system troubleshooting commands and system logs.

For a list of user activities logged in the audit trail window, see Audit Trail. This information is unlikely to be meaningful to the average user. It is intended to be used by your technical support team for debugging purposes. You are not expected to understand this information; instead, you should save the information and attach it to an e-mail message to your support team or, if applicable, Cisco TAC. After a few minutes, extensive diagnostic information generates and displays in the window.

Step 2 To save the information, click Download log files. Save the files to your local disk. You can analyze the files locally or, if requested forward on to your technical support team for review. To download core files from the Tech Support page, click Download log files and follow the instructions. In order to make your Cisco NAM solution more secure, you can take several steps including:.

After setting up the initial user accounts root, admin, and webuser , you can create additional accounts, enabling or disabling different levels of access independently for each user. Table C provides information about User Privileges and describes each privilege. If you have forgotten your password, use the helper utility to reset your root or user passwords see Resetting Passwords.

There are several methods you can use to reset your NAM passwords. Use the options documented in Table based on your needs. Table Password Reset Options. The easiest way to reset NAM passwords. This command resets both the root and guest user passwords to the factory default state. You must have appropriate privileges to reset passwords. See your platform installation guide.

Delete the user for whom you have forgotten the password; then create a new one. Use if no other local users are configured other than the user for whom you have forgotten the password. Then enable http or https to prompt for the creation of a NAM user. The GUI displays the users in the local database.

Checks indicate the privileges each user has for the functions listed. Step 3 Enter the information required to create new user and select each privilege to grant to the user. See Table C for an explanation of user privileges. Note If you delete user accounts while users are logged in, they remain logged in and retain their privileges. The session remains in effect until they log out. Deleting an account or changing permissions in mid-session affects only future sessions.

To force off a user who is logged in, restart the NAM. Step 4 Select a single or multiple check box to set user privileges. Table C provides information about each privilege. Step 5 Click Submit to create the user or Reset to clear the dialog of any characters you entered. For root or guest user passwords, only the single quote is not allowed.

With TACACS, user passwords and privileges are administered in a central database instead of an individual switch or router to provide scalability. Step 3 Do one of the following:. Continue to the section specific to your particular version:.

To configure a version 4. Step 1 Log into the ACS server. Step 2 Click Network Configuration. Step 3 Click Add Entry. Step 5 Enter the secret key. Note The secret key must be the same as the one configured on the NAM. Step 1 Click User Setup. Step 2 Enter the user login name. Step 4 Enter the user data. Step 5 Enter a user password. Step 6 If necessary, assign a user group. Select Shell.

Select IOS Command. Select Permit. Select Command. Enter web. In the Arguments field, enter:. Step 8 In Unlisted Arguments, select Deny. Step 9 Click Submit. To configure a version 5. There is an additional configuration task that enables you to set up policy rules for your users or groups. Use the following sections to configure your Cisco ACS server:. Step 7 Click Submit. Step 3 Enter the user login name. Step 5 If necessary, assign a user group. Step 6 Enter the password information.

In versions 5. For example, if you want to provide full access to the NAM, create a command set called NAMfullAccess and check the check box Permit any command that is not in the table below. Ensure you include all of the following commands:. Replace namAdmin with the service you created in this step. NAM devices use these conditions and follow the command set created in Step 1. The Current User Sessions table is a record of the users who are logged into the application. The user session times out after 30 minutes of inactivity.

After a user session times out, that row is removed from the table. The following sections explain how to achieve these goals, and how to perform other data management tasks. It is critical to have your system backed up so that you can restore your configuration and data if required.

Ensure you have sufficient data backups scheduled. Use the config upload command to back up your current configuration. For detailed instructions see your installation guide on Cisco. Network administrators are consistently looking for ways to shrink their network storage requirements and improve bandwidth efficiency on tasks like backup and recovery.

By configuring Prime NAM packet deduplication on supported platforms, packets whose inspected segments match another packet within the specific time window are marked as duplicates and not forwarded. For configuration guidelines and instructions, see Configuring Hardware Deduplication.

You can also move capture files to an external storage location to save on local disk space. See About Capturing to Data Storage.

Cisco prime network analysis module software user guide tightvnc administrator password default

CISCO SX20 SOFTWARE VERSION

Сообщаю Для вас, что.

Сообщаю Для вас, что.

Cisco prime network analysis module software user guide 1494 port citrix

Cisco Prime - Basic overview for beginners cisco prime network analysis module software user guide

Really. happens. splashtop remote security opinion

Следующая статья cisco free vpn software

Другие материалы по теме

  • Teamviewer 11 mac download
  • Database not connecting mysql dbeaver
  • Anydesk consume paquete d eadtos
  • Ultravnc ultravnc ultravnc
  • 1 комментариев к “Cisco prime network analysis module software user guide”

    1. Ditaur :

      mysql workbench linux


    Оставить отзыв