Cisco IP Solution Center Infrastructure Reference, 4.0
Service Inventory > Inventory and Connection Manager > Inventory Manager

Table Of Contents

Service Inventory > Inventory and Connection Manager > Inventory Manager

Overview of Inventory Manager

Prerequisites and Limitations

Inventory Manager from End to End

Launching Inventory Manager

Importing Devices

Importing Devices from Configuration Files

Importing Devices with Auto Discovery

Configuring Device Credentials and SNMP Parameters

Collecting Configuration Files

Marking Interfaces for IPsec, Firewall, NAT, or QoS

Creating a New Customer with Devices

Creating a New Provider with Devices

Importing Connections with NPC Auto Discovery

Importing Services with Service Discovery

Introducing the Inventory Manager GUI

Spreadsheet Features

Understanding the Spreadsheet

Editing the Spreadsheet

Provider Spreadsheet

General

Passwords

SNMPv3 Attributes

PE Attributes

PE Interfaces

CNS Attributes

Platform Information

Customer Spreadsheet

General

Passwords

SNMPv3 Attributes

CPE Attributes

CPE Interfaces

CNS Attributes

Platform Information

Device Group Spreadsheet

General

Passwords

SNMPv3 Attributes

CNS Attributes

Platform Information

Inventory Manager GUI Reference

Viewer and Task Watcher Tabs

File Menu

New

Open

Required Attributes

Save

Close

Exit

Edit Menu

Insert More Devices

Remove Selected Devices

Move to New Customer

Move to New Provider

Move to Customer

Move to Provider

Edit Selected Devices

Edit Default Attributes

Load Default Values to Selected Cells

Apply Interface Marking Rules to Selection

Select All

View Menu

Fit Columns in Window

Show Color Coded Column Headers

Tasks Menu

Collect Latest Configuration Files

Start Auto Discovery

Start NPC Auto Discovery

Start Service Discovery

Tools Menu

File

Edit

Help

Logging Menu

Help

About

Auto Discovery

Auto Discovery Overview

Auto Discovery Prerequisites

Process Flow

User Interface

Inventory Manager GUI

UNIX Command Line Interface (UNIX CLI)

Service Discovery

MPLS Service Discovery

MPLS Service Discovery Overview

Limitations

MPLS Service Discovery Process

Synchronization

CERC Creation

User Input After Discovery

Grey Management Discovery

Layer 2 VPN Discovery

Topology

Logic (MPLS Core)

Logic (L2TPv3)

VPLS Service Discovery

Topology

Logic

Restrictions

Ring Topology Discovery (Connection Discovery)


Service Inventory > Inventory and Connection Manager > Inventory Manager


This chapter describes how to use Inventory Manager to prepare service inventory for the IP Solution Center (ISC) provisioning process. It contains the following subsections:

Overview of Inventory Manager

Prerequisites and Limitations

Inventory Manager from End to End

Introducing the Inventory Manager GUI

Inventory Manager GUI Reference

Auto Discovery

Service Discovery

Ring Topology Discovery (Connection Discovery)

Overview of Inventory Manager

Inventory Manager provides a method of managing mass changes to inventory and service model data in the ISC provisioning process. In this process, Inventory Manager enables an operator to import network specific data into the ISC Repository (Repository) in bulk mode.

Inventory Manager performs three primary functions:

Imports devices and configures CPE and PE by associating devices with a Customer or Provider.

Collects live configuration files from a variety of devices (for example, routers, firewalls, and switches) in a network.


Note IPsec, firewall, NAT: These features are not supported in this release.


Discovers logical, physical, and service level connectivity in a network.

Auto Discovery is an important tool in this process and is invoked from Inventory Manager. It can also be invoked from a Unix command line interface although this method is not recommended (see UNIX Command Line Interface (UNIX CLI)). For a detailed description of Auto Discovery, see Auto Discovery.

Prerequisites and Limitations

This document is intended for network engineers who have sufficient experience with MPLS VPN, L2VPN, and IPsec to provision these technologies using ISC.


Note IPsec: This feature is not supported in this release.


All of the network elements that you plan to provision should support the required hardware features and Cisco IOS versions.

Client Requirements

Java Runtime Environment (JRE) and Java Web Start must be installed to run Inventory Manager. If you are having trouble getting them to function properly, or need to update your local JRE, you can download and install the version appropriate for your operating system:

Windows (all languages, including English): 1.4.2_04

Solaris SPARC 32-bit self-extracting file: 1.4.2_04

Linux self-extracting file: 1.4.2_04 (Not Supported)

Name Resolution

Inventory Manager requires name resolution. The ISC HTTP server host must be in the Domain Name System (DNS) that the web client is using or the name and address of the ISC server must be in the client host file.

SNMP

Prior to device discovery, SNMP must be enabled. All devices in the ISC provisioning environment must support SNMP. ISC supports SNMP versions 1, 2c, and 3.

CDP

CDP must be enabled to discover devices. Inventory Manager uses CDP to perform the service discovery task. CDP should be enabled globally and at the interface level for each device in the ISC provisioning environment.

NAT

This feature is not supported in this release.

Prior to device discovery, no Network Address Translation (NAT) mapping for router IP addresses is allowed.

Role Requirements

To run the Inventory Manager you need to use the predefined roles, CollectionRole and DeviceImportRole. This is the minimum requirement to successfully create physical or logical devices and to upload configuration files from the client to the ISC server.

Inventory Manager from End to End

This section describes how you use Inventory Manager to import and configure devices, collect configuration files, and perform service discovery.

These tasks should be carried out in the following order:

1. Launching Inventory Manager

2. Importing Devices

Importing Devices from Configuration Files

Importing Devices with Auto Discovery

3. Configuring Device Credentials and SNMP Parameters

4. Collecting Configuration Files

5. Marking Interfaces for IPsec, Firewall, NAT, or QoS

6. Creating a New Customer with Devices

7. Creating a New Provider with Devices

8. Importing Connections with NPC Auto Discovery

9. Importing Services with Service Discovery

Launching Inventory Manager

To launch Inventory Manager, follow these steps:


Step 1 Log in to ISC.

Step 2 Navigate Service Inventory > Inventory and Connection Manager > Inventory Manager and you receive a window, as shown in Figure 4-1, "Inventory Manager." If you choose or need to click on an installation of Java Runtime Environment (JRE) for an operating system, follow that path, then quit the browser, log in again, and navigate the path in this step again.

Figure 4-1 Inventory Manager

Step 3 Click Inventory Manager in Figure 4-1, "Inventory Manager" to launch Inventory Manager on the web client. The Java Web Start window appears.

Step 4 From the Security Warning window, click Start to automatically complete the configuration, as shown in Figure 4-2.

Figure 4-2 Start Java Web Start

Step 5 You receive a login window, as shown in Figure 4-3, "Log On to ISC."

Figure 4-3 Log On to ISC

Step 6 Enter your User Name and Password and click OK.Inventory Manager launches and connects to the Master ISC server.

The Inventory Manager Opening Screen in Figure 4-4 appears.

Figure 4-4 Inventory Manager Opening Screen


Importing Devices

As described in the introduction to this chapter, devices can either be imported or created. The fastest way to bring device information into the Repository is to import devices using Inventory Manager.

Importing Devices from Configuration Files

If the configuration files are for a particular customer or provider, you can create a new customer or provider and associate the configuration files with CPEs or PEs. If the customer or provider currently exists in the Repository, you can open them and insert more CPEs or PEs to be associated with new or existing sites or regions.

To import devices with configuration files, follow these steps:


Step 1 From Inventory Manager, choose File > New > New Device Group.

This step creates a container for target devices that can be moved to a provider or customer during the initialization process.

Step 2 Enter a device group name and click OK.

You receive a prompt to import configuration files. You probably have a repository of configuration files on an existing network management device or TFTP server. Copy these files to the web client machine for import or make them available with a shared directory.

Step 3 At the No Config Files Specified for Import prompt, click Yes.

The configuration files on the web client can be located by normal file browsing with both Shift and Ctrl+Click selected for multiple selections. When creating a new device group, only one filtering option is available: All Files.


Note When creating new Providers, there are filters for files containing a specific BGP autonomous system number, or files that do not contain BGP configuration. The BGP filters can also be used to select PE devices that must have BGP configured or CE devices that do not require BGP.


Step 4 At the Open dialog box, browse to the location of the configuration files you want to import.

You may select multiple configuration files to import using SHIFT or CTRL + click. Please make sure that no more than X (250 or a number to be determined) configuration files are selected for import. There may be performance issues with Inventory Manager if more than X config files are selected for import at once.

Inventory Manager now imports a row in a spreadsheet workbook for each selected configuration file. By default, Inventory Manager inspects the configuration files and determines the device type, which includes Cisco IOS, CatOS, PIX, and VPN 3000 (IPsec, firewall, NAT, VPN 3000: These features are not supported in this release). It also parses passwords, SNMP information, interfaces, and virtual circuits.

If cells in the resulting spreadsheet are empty, Inventory Manager was not able to determine the value and, if it is required, the operator must provide the data or choose the information from a defined set of choices before saving.

These operations are described in more detail in the following sections as they are common to all methods of importing device information and administration.

Step 5 Once the appropriate files are selected, click Open, then click OK.


Importing Devices with Auto Discovery


Note The Auto Discovery process can either be activated from Inventory Manager or from the command line on the ISC server using the Cisco Cornerstone Bridge Auto Discovery scripts.


To import devices with Auto Discovery, follow these steps:


Step 1 From Inventory Manager, select File > New > New Dynamic Device List.

This creates a spreadsheet where each row represents a potential seed device for discovery. For each seed device, the management interface must be provided. The management interface is the address on the device that the ISC host uses to reach the device.

After creating a new device list, a discovery starting point needs to be configured. This starting point is a device that can be reached from the ISC host. For each seed device, an accessible interface on the starting point is configured, because the management interface must be provided. The management interface is the address on the device that the ISC host uses to reach the device.

New dynamic device discovery requires the following manual tasks:

Entering a seed IP address

Entering a maximum hop count on the initialization of the task

A policy.xml file is created and a hop count is set automatically.

To choose the seed devices and hub, pick a seed device that can reach a large section of the network. Pick one or more of them until you think these devices will enable you to reach your entire managed network.

Point-of-presence (POP) routers are usually good choices. If you choose all the POPs in your network as the collection of seed devices and put in the appropriate number of hubs, you discover the entire managed network.

To pick the hub number, go to the CE that is the furthest from its associated POP, and count the number of devices between them. If this number is N, the hub number is N+1, assuming you are picking the POP as the seed.

Step 2 Click on the Management Address cell and enter the seed IP address for the new dynamic device list

Step 3 Choose Tasks > Start Auto Discovery.

A maximum hop count is specified for the Auto Discovery process. The Auto Discovery process queries the starting point device for its CDP table. From this table, all of those devices are queried for their CDP information. This CDP query process continues until the maximum hop count from the starting point is reached. Please note that only devices running the CDP process are discovered.

Step 4 Specify the maximum hop count when you receive the prompt.


Note Only devices running the CDP process are discovered.


You are prompted to save two files. One file contains the list of the discovered devices and the other contains information related to connectivity between the devices. The discovered device information can be saved in XML to use as a starting point for future discovery efforts.

Step 5 Save the devices discovery.

Step 6 To view the Auto Discovery logs, go to Administration > Control Center > Hosts > machine-name > cornerstone bridge.


Configuring Device Credentials and SNMP Parameters

After the discovered devices are rendered in the spreadsheet, they must have several parameters set before the devices can be saved to the Repository and perform a successful live configuration collection. These parameters include:

SNMP read and write community strings

Telnet login password

Device enable password


Note The reachable management address is usually Loopback 0.


First remove any devices that are not required in the provisioning process. These items include core network devices or non-PE, CPE, and CLE devices that are used within the operator's network.

To remove unwanted devices, follow these steps:


Step 1 Select the rows for the devices to be deleted.

Shift-select and Control-select are useful for multiple devices.

Step 2 Choose Edit > Remove Selected Devices.


It is common in networks for devices to share many parameters. The Defaults option allows these common parameters to be entered for many devices at the same time; for example, login password, enable password, and SNMP strings.

To edit multiple devices, follow these steps:


Step 1 Choose Edit > Edit Default Attributes.

A row for default values can be edited for each tab of the device list. The next step of the configuration process collects live configurations that require login and enable passwords.

Step 2 Enter login and enable passwords into the defaults row.

After entering the default values, select all of the devices that share those common parameters. For devices that have values other than the default values, you can perform multiple editing techniques.

Step 3 Select multiple rows or columns using standard selection techniques and choose Edit > Edit Selected Devices.

A dialog box, similar to the defaults window appears, allowing you to enter values to be applied to the selection.


Note You can right click on the column name and a menu appears showing you choices for sorting and selecting or de-selecting of columns.


Step 4 To configure these devices, choose Load Default Attributes to Selected Cells.

The management IP address is the address that ISC uses to communicate with the element. This address must be reachable from the ISC host. When the devices were imported or discovered, ISC attempts to select the proper address as a management address starting with a loopback address. Verify the selected address for accessibility from the ISC host. ISC must be able to reach the network element for the configuration process to progress.

Step 5 Click on the Management Address cell and enter the IP address in the dialog box.


Collecting Configuration Files

Collecting configuration files serves two purposes. It loads the current configuration information for the device, which populates many of the cells. It also verifies reachability and passwords for the reachable devices.

This task is created in the Repository and starts immediately. Logs can be viewed as normal for a collection spawned using only the Web GUI.

The task name is Inventory_Manager_Collection_xxxxxx_username, where xxxxxx is a unique number and the username is admin, or whatever the logged in username is in ISC.

To collect configurations, follow these steps:


Step 1 Select all the devices that have valid passwords and could be reached.

Step 2 Choose Tasks > Collect Latest Configuration Files.


Marking Interfaces for IPsec, Firewall, NAT, or QoS

IPsec, firewall, NAT: These features are not supported in this release

The interface marking process is only required for provisioning IPsec, Firewall, NAT, or QoS services. Marking interfaces on a one-by-one basis can be a very time consuming and tedious task. Inventory Manager provides a helpful tool to create rules for marking interfaces based on predefined criteria. You can apply one or more rules to selected devices to mark the interfaces in a bulk fashion.

For IPsec, the public interfaces are the interfaces where the IPsec or GRE tunnels terminate and the private interfaces are the interfaces behind which the subnets to be protected reside.

For firewalls, the outside interfaces connect to the outside, typically unsecured, networks and the inside interfaces are for the subnets residing behind the firewall.

To mark interfaces with Inventory Manager, follow these steps:


Step 1 Choose Tools > Interface Rule Marking Editor.

A window appears allowing you to create, modify, or delete existing rules or folders. One simple rule can mark all Loopback0 interfaces as public for IPsec.

Step 2 To apply a rule to one or more devices, select the device(s) in the spreadsheet.

Step 3 Choose Edit > Apply Interface Marking Rule(s) to the selection. A rule chooser appears allowing you to select one or more rules to be applied.


Note After completing the device configuration process, all the red X marks on the Device List tabs should be converted to either yellow or green Check Marks. These marks indicate that you have completed the required configuration and can save the device list, provider, and/or customer. Save all the completed lists by selecting Save under the file menu. Now all the device preparation should be complete and provisioning setup can begin.



Creating a New Customer with Devices

The devices should now be assigned roles, either PE or CE. For customers, you can assign roles by highlighting each device group and adding it to a new or existing Customer. Routers can be moved in bulk to customers with Inventory Manager.

To move CE routers to a new customer, follow these steps:


Step 1 Select the desired routers and choose Edit > Move to New Customer.

Step 2 You are prompted to enter a customer name.

Step 3 Enter a customer name and click OK.

A new tab is created at the bottom of the device list and the routers are associated with the customer.

Each customer router must be put into a site. A site can have more than one router in it. All routers in a site should share routing information with the external provider network.

Step 4 Shift-select the Site Name cells for each customer router in the CPE Attributes tab.

Step 5 Choose Edit Selected Devices.

Step 6 Choose CUSTOMER_ID+"SITE"+HOST_NAME.

Repeat this process for all the CPEs.

All customer routers must have a Management Type selected. As with customer site, a range of router Management Type cells can be selected for bulk editing.

Step 7 Click the Management Type cell for all CEs.

Step 8 Choose Edit Selected Devices.

Step 9 Select the Management Type.


Creating a New Provider with Devices

A provider or provider administrative domain (PAD) is a group of Provider Edge (PE) devices that share a common BGP AS.

To move PE routers to a new provider and create a region, follow these steps:


Step 1 Highlight the devices with a common BGP AS to be added to a new provider.

Step 2 Choose Edit > Move to New Provider.

When the devices are assigned a PAD, they become Provider Edge (PE) routers. PEs must be placed into regions. Each PAD must have one or more regions. A region is a collection of PEs that may share an address pool.

Step 3 To place a PE into a region, click on the Region cell for the PE.

If the desired region has already been created, it can be selected.

Step 4 Choose Create Region to add a region.

You can also add multiple PEs to a single region in one step using standard multiple selection techniques and choosing the Edit > Edit Selected Devices menu. As with single PE editing, you are prompted to choose an existing region or create a new region.

This completes the assignment of roles to devices.


Note The tabs at the top of the device list pane of the Inventory Manager window corresponds to a grouping of information about the devices. The symbol to the left of the tab name indicates whether all the information required on that tab has been configured. A red X means that additional information is required. A yellow check mark indicates that all required information has been entered but not all possible information. A green check mark shows that all information for that tab has been entered. To save the devices to the Repository, each tab must show a check mark of green or yellow.



Importing Connections with NPC Auto Discovery

To discover connections, referred to as Named Physical Circuits (NPC), run NPC Auto Discovery. This task defines the PE and CE link information, which is used by Common Discovery in the final stage of the Auto Discovery process. NPC Auto Discovery has one prerequisite, the connection.xml file. Ensure that this file has been uploaded from the ISC server to the client workstation before running this task.

To import connections with NPC Auto Discovery, follow these steps:


Step 1 Choose Tasks > Start NPC Auto Discovery.

You are prompted to provide the path to the correct connection.xml file.

Step 2 Select the correct connection.xml file and click OK.

A dialog box appears, indicating that the NPC discovery process has started.

Step 3 You are prompted if the task completes successfully. Select OK to finish this portion of the NPC Auto Discovery process.

To find the discovered NPCs, go to Service Inventory > Inventory and Connection Manager > Named Physical Circuits.


Importing Services with Service Discovery

At this point, you can choose to run the Common Discovery process. ISC manages Ethernet over MPLS (L2VPN) and MPLS networks with IPsec (IPsec: This feature is not supported in this release). To detect free interfaces on each device for provisioning purposes, existing services either need to be discovered automatically or entered into the system manually.

For very large networks with many provisioned services, manual entry is time consuming and prone to human error. These issues are alleviated by the Common Discovery process. The Common Discovery process discovers:

Layer 3 MPLS VPN services

Layer 2 VPN (Metro) services

Layer 2 VPN (L2TPv3) services.

To specifically import services with Auto Discovery, follow these steps:


Step 1 Choose Tasks > Start Service Discovery.

The Service Discovery window in Figure 4-112 appears (see Start Service Discovery, for the GUI description). You are prompted to select which type of Common Discovery to perform.

Step 2 Select one or more types of service discovery by checking the corresponding Service Discovery box.

If you select L2VPN (L2TPv3), the bottom L2TPv3 Options section become available:

Step 3 Make the desired selections

You are notified when Service Discovery is finished.

Step 4 To find the discovered service requests, go to Service Inventory > Inventory and Connection Manager > Service Requests.


Introducing the Inventory Manager GUI

Although Inventory Manager has the physical look and feel of many windows applications, with File, Edit, View, Tasks, Tools, Logging, and Help menus, the application is designed to have the logical view of a spreadsheet. When you learn how to use one spreadsheet in Inventory Manager, you learn how to use them all.

After starting up Inventory Manager by following the steps outlined in Launching Inventory Manager, the main Inventory Manager window in Figure 4-4 appears.

Figure 4-5 Inventory Manager GUI

The various GUI elements are explained in the following sections and in Inventory Manager GUI Reference.

This section contains the following sections:

Spreadsheet Features

Provider Spreadsheet

Customer Spreadsheet

Device Group Spreadsheet

Spreadsheet Features

This section contains the following sections:

Understanding the Spreadsheet

Editing the Spreadsheet

Understanding the Spreadsheet

Before using Inventory Manager, you need to know about these spreadsheet features:

Spreadsheets

Contain Device Group and physical device information.

Contain PE and CPE logical device information.

Group information or attributes by tabs.

Tabs

Contain a unique table of rows and columns within a spreadsheet.

Show the status of the entire spreadsheet with icons.

Signify with a Red X that the tab is missing required information.

Signify with a Yellow Arrow that the tab contains all required information, but not all optional information.

Signify with a Green Arrow that all required and optional information in the tab is provided.

Rows

Contain information or attributes about a single device, module, or interface.

Columns

Contain one type of information or attribute.

Have a unique description.

Have a Column Heading

Have referenced tabs. (For example, Domain Name is in every general tab for each spreadsheet.)

Sort up or down by clicking on the column header or clicking the column header and choosing a sort menu.

Sort a column in one tab of a spreadsheet to affect all other tables in the spreadsheet.

Column Heading

Has a popup menu to click for selection, de-selection, and sorting.

Can have a color, depending on the column status (all cells combined for one column ordered together).

Indicates the status of the individual column with color. (As opposed to the Tab icon referenced above, which displays the status of the entire spreadsheet.)

Host Name Column

Does not scroll and is always the first column on the left.

Selects or de-selects an entire row.

Available in every tab for a given logical or physical device.

Acts as a reference point when switching among tabs and scrolling to the right when columns exceed the window width (see menu View > Fit Columns in Window).


Note When debugging why a tab has a Red X, this can help to identify the column in error, or missing data, very quickly.


Editing the Spreadsheet

When you learn how to set defaults or edit columns in one spreadsheet, you can set defaults or edit columns for each type of spreadsheet in Inventory Manager.

Cell Editing

Cell editing has the following features:

Provides dialog box when you click a cell.

Provides choices for each attribute. (Device Role is either Cisco IOS, CATOS, PIX, or VPN 3000. (IPsec, firewall, NAT, VPN 3000: These features are not supported in this release))

Provides a simple input text dialog for some columns.

Provides a password editor for some columns.

Provides a choice dialog with a list of available options for some columns.

Cells

Cells have the following editing features:

Can be edited by clicking. (Most individual cells can be edited, but not all columns.)

Select or de-select multiple cells spanning multiple columns using standard selection techniques (Click, Shift-Click, or Ctrl-Click).

Edit multiple cells in a single column at once using Edit > Edit Selected Devices.

Edit multiple cells spanning multiple columns all at once using Edit > Edit Selected Devices.


Note Close a spreadsheet by choosing File > Close filename. Do not forget to save your edits.


Provider Spreadsheet

The Provider spreadsheets contain the following tabs:

General

Passwords

SNMPv3 Attributes

PE Attributes

PE Interfaces

CNS Attributes

Platform Information

General

Figure 4-6 shows an example of the General tab:

Figure 4-6 Provider Spreadsheet - General Tab

The General tab contains the following columns:

Host Name—Must begin with a letter, digit, or underscore followed by letters, digits, underscores, spaces, hyphens, or dots ending with a letter, digit, or underscore. This field is required and must match the name configured on the target router device. Limited to 256 characters.

Device Type—The device type includes the following devices:

Cisco Router

Catalyst OS device

Terminal server

VPN 3000 (This feature is not supported in this release)

PIX firewall (This feature is not supported in this release)

IE2100 (Cisco CNS appliance)

Device Description—Can contain any pertinent information about the device, such as the type of device, its location, or other information that might be helpful to service provider operators. Limited to 80 characters.

Management Address—Valid IP address of the device that ISC uses to configure the target router device. This IP address must be reachable from the ISC host.

Domain Name—Must begin with a letter, digit, or underscore followed by letters, digits, underscores, spaces, hyphens, or dots ending with a letter, digit, or underscore. The name must match the domain name on the target router device.

Access Protocol—Administers the access protocol for config upload and download. Choices include: Telnet, Secure Shell (SSH), and CNS. Default: Telnet

Config Upload/Download—Protocol for downloading configurations. Choices include: Terminal, TFTP, and FTP. Default: Terminal.

SNMP Version—Configures the version of SNMP to use when communicating with the device. Choices include: SNMP v1/v2c and SNMP v3. Default: SNMP v1/v2c.

Device Groups—Lists the names of the Device Groups. You can add and modify Device Groups in this column.

Passwords

Figure 4-7 shows an example of the Passwords tab:

Figure 4-7 Provider Spreadsheet - Password Tab

The Passwords tab contains the following columns:

Host Name—Must begin with a letter, digit, or underscore followed by letters, digits, underscores, spaces, hyphens, or dots ending with a letter, digit, or underscore. This field is required and must match the name configured on the target router device. Limited to 256 characters.

Login User—Not required by ISC. However, collection and upload/download will not function without the Login User and Login Password, as ISC will not be able to access the device. Should match what is configured on the target router device. Limited to 80 characters.

Login Password—Displayed as stars (*). Not required by ISC. However, collection and upload/download will not function without the Login User and Login Password, as ISC will not be able to access the device. Should match what is configured on the target router device. Limited to 80 characters.

Enable User—Not required by ISC. However, collection and upload/download only function if the Login User has sufficient privileges to configure the router in EXEC mode. Should match what is configured on the target router device. Limited to 80 characters.

Enable Password—Displayed as stars (*). Not required by ISC. However, collection and upload/download only function if the Login User has sufficient privileges to configure the router in EXEC mode. Should match what is configured on the target router device. Limited to 80 characters.

SNMP Read-Only—SNMP Read-Only (Community String RO). Many tasks use SNMP to access the device. This field must match what is configured on the target router device. Limited to 80 characters.

SNMP Read-Write—SNMP Read-Write (Community String RW). Many tasks use SNMP to access the device. This field must match what is configured on the target router device. Limited to 80 characters.

SNMPv3 Attributes

Figure 4-8 shows an example of the SNMPv3 Attributes tab:

Figure 4-8 Provider Spreadsheet - SNMPv3 Attributes Tab

The SNMPv3 Attributes contains the following columns:

Host Name—Must begin with a letter, digit, or underscore followed by letters, digits, underscores, spaces, hyphens, or dots ending with a letter, digit, or underscore. This field is required and must match the name configured on the target router device. Limited to 256 characters.

Security Level—Choices include: No Authentication/No Encryption, Authentication/No Encryption, and Authentication/Encryption. Default: No Authentication/No Encryption.

Authentication User—User name configured on the specified device router. User must have permission to the object identification numbers (OIDs) specified in the security request (that is, write permission for a set request, and read permission for a get request). Should match what is configured on the target router device. Should be provisioned if the SNMP Security Level is Authentication/No Encryption or Authentication/Encryption. Limited to 80 characters.

Authentication Password—Displayed as stars (*). Should be provisioned if the SNMP Security Level is Authentication/No Encryption or Authentication/Encryption. Should match what is configured on the target router device. Limited to 80 characters.

Authentication Algorithm—Should be provisioned if the SNMP Security Level is Authentication/No Encryption or Authentication/Encryption. Choices include: None, Authentication. Message Digest 5 (MD5), and the Secure Hash Algorithm (SHA). Default: None.

Encryption Password—Displayed as stars (*). In previous versions, this field was called Privacy Password. Should match what is configured on the target router device. Should be provisioned if the SNMP Security Level is Authentication/Encryption. Limited to 80 characters.

Encryption Algorithm—In previous versions, this field was called Privacy Protocol. Should be provisioned if the SNMP Security Level is Authentication/Encryption. Choices include: None and IPsec Data Encryption Standard (DES 56). Default: None.


Note IPsec: This feature is not supported in this release.


PE Attributes

Figure 4-9 shows an example of the PE Attributes tab:

Figure 4-9 Provider Spreadsheet - PE Attributes Tab

The PE Attributes tab contains the following columns:

Host Name—Must begin with a letter, digit, or underscore followed by letters, digits, underscores, spaces, hyphens, or dots ending with a letter, digit, or underscore. This field is required and must match the name configured on the target router device. Limited to 256 characters.

Provider Name—Lists the names of providers. Must begin with a letter. Can contain letters, numbers, and these punctuation characters: period, underscore, and dash. Limited to 80 characters. You can sort the list by provider name.

Region Name—Lists the names of regions. Must begin with a letter. Can contain letters, numbers, and these punctuation characters: period, underscore, and dash. Limited to 80 characters. You can sort the list by region name.

Role—Choices include: PE POP, PE CLE, PE CORE, and PE MVRF.

Loopback Interface—Loopback address is the IP address of any loopback interface on the device. You can select one of the loopback interfaces for this field and use the IP address on that loopback interface.

IS Managed—Provisioned by ISC. Click the check box for yes. Default is no.

PE Interfaces

Figure 4-10 shows an example of the PE Interfaces tab:

Figure 4-10 Provider Spreadsheet - PE Interfaces Tab

The PE Interfaces tab contains the following columns:

Host Name—Must begin with a letter, digit, or underscore followed by letters, digits, underscores, spaces, hyphens, or dots ending with a letter, digit, or underscore. This field is required and must match the name configured on the target router device. Limited to 256 characters.

IP Address—IP address associated with this interface.

Type—Specifies the type of interface. It is a display-only field. Types include:

VLAN

UNKNOWN

STATIC

UNNUMBERED

DHCP

PPP

DOCSIS

Encapsulation—The Layer 2 Encapsulation for this device. It is a display-only field. Choices include:

UNKNOWN

DEFAULT

DOT1Q

ETHERNET

ISL

FRAME_RELAY

FRAME_RELAY_IETF

HDLS

PPP

ATM

AAL5SNAP

AAL0

AAL5

AAL5MUX

AAL5NLPID

AAL2

ENCAP_QinQ

GRE

IPsecThis feature is not supported in this release.
View or edit (mark) interface settings for IPsec. Choices include:

None

Public

Interface to the public network (internet). All traffic is encrypted.

Private

Interface to the private network (internal LAN). All traffic is not encrypted.

FirewallThis feature is not supported in this release
View or edit (mark) interface settings for Firewall. If Device Type is VPN 3000, Firewall is not available. Choices include:

Inside

Highest security interface.

Outside

Lowest security interface.

DMZ 1, ..., DMZ N

The Demilitarized Zone services to both inside and outside interfaces.

NATThis feature is not supported in this release
View or edit (mark) interface settings for NAT. If Device Type is PIX firewall or VPN 3000, NAT is not available. Choices include:

None

Inside

Highest security interface.

Outside

Lowest security interface.

QoS Candidate—View or edit (mark) interface settings for QoS. If Device Type is VPN 3000 (This feature is not supported in this release), QoS is not available. Choices include:

None

Marking Rate Limit

This setting marks the Customer LAN facing interface with the set and police commands.

Endpoint

This setting marks the PE facing interface on the CE device and the CE facing interface on the PE device.

On the PE side, all QoS commands go on this interface.

On the CE side, all QoS commands, including the set and police commands, go on this interface if no interface on the CE device is identified as the Marking Rate Limit interface.

If one or more interfaces have been identified as Marking Rate Limit interfaces, then all QoS commands except the set and police commands go on this interface.

PIX Logical-Name—Logical name of this interface. This field is displayed only. Field is populated by a collection/import of config file.

PIX Security-Level—Security level of this interface. This field is display-only. Field is populated by importing a configuration file.

Description—Description of the interface. This field is display-only. Field is populated by importing a configuration file.

CNS Attributes

Figure 4-11 shows an example of the CNS Attributes tab:

Figure 4-11 Provider Spreadsheet - CNS Attributes Tab

The CNS Attributes tab contains the following columns:

Host Name—Must begin with a letter, digit, or underscore followed by letters, digits, underscores, spaces, hyphens, or dots ending with a letter, digit, or underscore. This field is required and must match the name configured on the target router device. Limited to 256 characters.

IE2100-Name—Disabled unless the Device-State field is Inactive or the Terminal Session Protocol field is CNS. A valid Cisco CNS appliance (CNS) must be selected if the Terminal Session Protocol is CNS. Choices include: None and the list of existing CNS names. Default: None.

Device-State—Choices include: Active and Inactive. Active indicates that the router has been plugged on the network and can be part of ISC tasks such as collect config and provisioning. Inactive indicates the router has not been plugged-in. Default: Active.

Event-Identification—Indicates whether the CNS Identification field contains a HOST NAME or CNS ID. Default: HOST NAME.

CNS-Identification—Required if the Event Identification field is set to CNS ID. Can contain letters, numbers, and these punctuation characters: period, underscore, and dash.

Platform Information

Figure 4-12 shows an example of the Platform Information tab. These fields are typically filled in from the physical device during the collection process.

Figure 4-12 Provider Spreadsheet - Platform Information Tab

The Platform Information tab contains the following columns:

Host Name—Must begin with a letter, digit, or underscore followed by letters, digits, underscores, spaces, hyphens, or dots ending with a letter, digit, or underscore. This field is required and must match the name configured on the target router device. Limited to 256 characters.

Platform—Should match what is configured on the target router device. Limited to 80 characters.

Software—Should match what is configured on the target router device. Limited to 80 characters.

Image—Should match what is configured on the target router device. Limited to 80 characters.

Serial—Should match what is configured on the target router device. Limited to 80 characters

Customer Spreadsheet

The Customer spreadsheets contain the following tabs:

General

Passwords

SNMPv3 Attributes

CPE Attributes

CPE Interfaces

CNS Attributes

Platform Information

General

Figure 4-13 shows an example of the General tab:

Figure 4-13 Customer Spreadsheet - General Tab

The General tab contains the following columns:

Host Name—Must begin with a letter, digit, or underscore followed by letters, digits, underscores, spaces, hyphens, or dots ending with a letter, digit, or underscore. This field is required and must match the name configured on the target router device. Limited to 256 characters.

Device Type—The device type includes the following devices:

Cisco Router

Catalyst OS device

Terminal server

VPN 3000 (This feature is not supported in this release)

PIX firewall (This feature is not supported in this release)

IE2100 (Cisco CNS appliance)

Device Description—Can contain any pertinent information about the device, such as the type of device, its location, or other information that might be helpful to service provider operators. Limited to 80 characters.

Management Address—Valid IP address of the device that ISC uses to configure the target router device. This IP address must be reachable from the ISC host.

Domain Name—Must begin with a letter, digit, or underscore followed by letters, digits, underscores, spaces, hyphens, or dots ending with a letter, digit, or underscore. The name must match the domain name on the target router device.

Access Protocol—Administers the access protocol for config upload and download. Choices include: Telnet, Secure Shell (SSH), and CNS. Default: Telnet

Config Upload/Download—Choices include: Terminal, TFTP, and FTP. Default: Terminal.

SNMP Version—Configures the version of SNMP to use when communicating with the device. Choices include: SNMP v1/v2c and SNMP v3. Default: SNMP v1/v2c.

Device Groups—Lists the names of the Device Groups. You can add and modify Device Groups in this column.

Passwords

Figure 4-14 shows an example of the Passwords tab:

Figure 4-14 Customer Spreadsheet - Passwords Tab

The Passwords tab contains the following columns:

Host Name—Must begin with a letter, digit, or underscore followed by letters, digits, underscores, spaces, hyphens, or dots ending with a letter, digit, or underscore. This field is required and must match the name configured on the target router device. Limited to 256 characters.

Login User—Not required by ISC. However, collection and upload/download will not function without the Login User and Login Password, as ISC will not be able to access the device. Should match what is configured on the target router device. Limited to 80 characters.

Login Password—Displayed as stars (*). Not required by ISC. However, collection and upload/download will not function without the Login User and Login Password, as ISC will not be able to access the device. Should match what is configured on the target router device. Limited to 80 characters.

Enable User—Not required by ISC. However, collection and upload/download only function if the Login User has sufficient privileges to configure the router in EXEC mode. Should match what is configured on the target router device. Limited to 80 characters.

Enable Password—Displayed as stars (*). Not required by ISC. However, collection and upload/download only function if the Login User has sufficient privileges to configure the router in EXEC mode. Should match what is configured on the target router device. Limited to 80 characters.

SNMP Read-Only—SNMP Read-Only (Community String RO). Many tasks use SNMP to access the device. This field must match what is configured on the target router device. Limited to 80 characters.

SNMP Read-Write—SNMP Read-Write (Community String RW). Many tasks use SNMP to access the device. This field must match what is configured on the target router device. Limited to 80 characters.

SNMPv3 Attributes

Figure 4-15 shows an example of the SNMPv3 Attributes tab:

Figure 4-15 Customer Spreadsheet - SNMPv3 Attributes Tab

The SNMPv3 Attributes contains the following columns:

Host Name—Must begin with a letter, digit, or underscore followed by letters, digits, underscores, spaces, hyphens, or dots ending with a letter, digit, or underscore. This field is required and must match the name configured on the target router device. Limited to 256 characters.

Security Level—Choices include: No Authentication/No Encryption, Authentication/No Encryption, and Authentication/Encryption. Default: No Authentication/No Encryption.

Authentication User—User name configured on the specified device router. User must have permission to the object identification numbers (OIDs) specified in the security request (that is, write permission for a set request, and read permission for a get request). Should match what is configured on the target router device. Should be provisioned if the SNMP Security Level is Authentication/No Encryption or Authentication/Encryption. Limited to 80 characters.

Authentication Password—Displayed as stars (*). Should be provisioned if the SNMP Security Level is Authentication/No Encryption or Authentication/Encryption. Should match what is configured on the target router device. Limited to 80 characters.

Authentication Algorithm—Should be provisioned if the SNMP Security Level is Authentication/No Encryption or Authentication/Encryption. Choices include: None, MD5, and SHA. Default: None.

Encryption Password—Displayed as stars (*). In previous versions, this field was called Privacy Password. Should match what is configured on the target router device. Should be provisioned if the SNMP Security Level is Authentication/Encryption. Limited to 80 characters.

Encryption Algorithm—In previous versions, this field was called Privacy Protocol. Should be provisioned if the SNMP Security Level is Authentication/Encryption. Choices include: None and DES 56. Default: None.

CPE Attributes

Figure 4-16 shows an example of the CPE Attributes tab:

Figure 4-16 Customer Spreadsheet - CPE Attributes Tab

The CPE Attributes tab contains the following columns:

Host Name—Must begin with a letter, digit, or underscore followed by letters, digits, underscores, spaces, hyphens, or dots ending with a letter, digit, or underscore. This field is required and must match the name configured on the target router device. Limited to 256 characters.

Customer Name —Lists the names of the customer. The first character must be a letter. Can contain letters, numbers, and these punctuation characters: period, underscore, and dash. Limit: 80 characters. You can sort the list by customer name.

Site Name —Lists the names of sites. The first character must be a letter. Can contain letters, numbers, and these punctuation characters: period, underscore, and dash. Limit: 80 characters. You can sort the list by site name.

Management Type—Choices include: Managed, Unmanaged, Managed - Management LAN, Unmanaged - Management LAN, Directly Connected, Directly Connected Management Host, and Multi-VRF.

CPE Interfaces

Figure 4-17 shows an example of the CPE Interfaces tab:

Figure 4-17 Customer Spreadsheet - CPE Interfaces Tab

The CPE Interfaces tab contains the following columns:

Host Name—Must begin with a letter, digit, or underscore followed by letters, digits, underscores, spaces, hyphens, or dots ending with a letter, digit, or underscore. This field is required and must match the name configured on the target router device. Limited to 256 characters.

IP Address—IP address associated with this interface.

Type—Specifies the type of interface. It is a display-only field.

Encapsulation—The Layer 2 Encapsulation for this device. It is a display-only field. Choices include:

UNKNOWN

DEFAULT

DOT1Q

ETHERNET

ISL

FRAME_RELAY

FRAME_RELAY_IETF

HDLS

PPP

ATM

AAL5SNAP

AAL0

AAL5

AAL5MUX

AAL5NLPID

AAL2

ENCAP_QinQ

GRE

IPsecThis feature is not supported in this release
View or edit (mark) interface settings for IPsec. Choices include:

None

Public

Interface to the public network (internet). All traffic is encrypted.

Private

Interface to the private network (internal LAN). All traffic is not encrypted.

FirewallThis feature is not supported in this release
View or edit (mark) interface settings for Firewall. If Device Type is VPN 3000, Firewall is not available. Choices include:

Inside

Highest security interface.

Outside

Lowest security interface.

DMZ 1, ..., DMZ N

The Demilitarized Zone services to both inside and outside interfaces.

NATThis feature is not supported in this release
View or edit (mark) interface settings for NAT. If Device Type is PIX firewall or VPN 3000, NAT is not available. Choices include:

None

Inside

Highest security interface.

Outside

Lowest security interface.

QoS Candidate—View or edit (mark) interface settings for QoS. If Device Type is VPN 3000 (This feature is not supported in this release), QoS is not available. Choices include:

None

Marking Rate Limit

This setting marks the Customer LAN facing interface with the set and police commands.

Endpoint

This setting marks the PE facing interface on the CE device and the CE facing interface on the PE device.

On the PE side, all QoS commands go on this interface.

On the CE side, all QoS commands, including the set and police commands, go on this interface if no interface on the CE device is identified as the Marking Rate Limit interface.

If one or more interfaces have been identified as Marking Rate Limit interfaces, then all QoS commands except the set and police commands go on this interface.

PIX Logical-Name—Logical name of this interface. This field is displayed only. Field is populated by a collection/import of config file.

PIX Security-Level—Security level of this interface. This field is display-only. Field is populated by importing a configuration file.

Description—Description of the interface. This field is display-only. Field is populated by importing a configuration file.

CNS Attributes

Figure 4-18 shows an example of the CNS Attributes tab:

Figure 4-18 Customer Spreadsheet - CNS Attributes Tab

The CNS Attributes tab contains the following columns:

Host Name—Must begin with a letter, digit, or underscore followed by letters, digits, underscores, spaces, hyphens, or dots ending with a letter, digit, or underscore. This field is required and must match the name configured on the target router device. Limited to 256 characters.

IE2100-Name—Disabled unless the Device-State field is Inactive or the Terminal Session Protocol field is CNS. A valid Cisco CNS IE2100 appliance must be selected if the Terminal Session Protocol is CNS. Choices include: None and the list of existing Cisco CNS IE2100 appliance names. Default: None.

Device-State—Choices include: Active and Inactive. Active indicates that the router has been plugged on the network and can be part of ISC tasks such as collect config and provisioning. Inactive indicates the router has not been plugged-in. Default: Active.

Event-Identification—Indicates whether the CNS Identification field contains a HOST NAME or CNS ID. Default: HOST NAME.

CNS-Identification—Required if the Event Identification field is set to CNS ID. Can contain letters, numbers, and these punctuation characters: period, underscore, and dash.

Platform Information

Figure 4-19 shows an example of the Platform Information tab. These fields are typically filled in from the physical device during the collection process.

Figure 4-19 Customer Spreadsheet - Platform Information Tab

The Platform Information tab contains the following columns:

Host Name—Must begin with a letter, digit, or underscore followed by letters, digits, underscores, spaces, hyphens, or dots ending with a letter, digit, or underscore. This field is required and must match the name configured on the target router device. Limited to 256 characters.

Platform—Should match what is configured on the target router device. Limited to 80 characters.

Software—Should match what is configured on the target router device. Limited to 80 characters.

Image—Should match what is configured on the target router device. Limited to 80 characters.

Serial—Should match what is configured on the target router device. Limited to 80 characters.

Device Group Spreadsheet

The Device Group spreadsheets contain the following tabs:

General

Passwords

SNMPv3 Attributes

CNS Attributes

Platform Information

General

Figure 4-20 shows an example of the General tab:

Figure 4-20 Device Group Spreadsheet - General Tab

The General tab contains the following columns:

Host Name—Must begin with a letter, digit, or underscore followed by letters, digits, underscores, spaces, hyphens, or dots ending with a letter, digit, or underscore. This field is required and must match the name configured on the target router device. Limited to 256 characters.

Device Type—The device type includes the following devices:

Cisco IOS router

Catalyst OS device

Terminal server

VPN 3000 (This feature is not supported in this release)

PIX firewall (This feature is not supported in this release)

IE2100 (Cisco CNS appliance)

Device Description—Can contain any pertinent information about the device, such as the type of device, its location, or other information that might be helpful to service provider operators. Limited to 80 characters.

Management Address—Valid IP address of the device that ISC uses to configure the target router device. This IP address must be reachable from the ISC host.

Domain Name—Must begin with a letter, digit, or underscore followed by letters, digits, underscores, spaces, hyphens, or dots ending with a letter, digit, or underscore. The name must match the domain name on the target router device.

Access Protocol—Administers the access protocol for config upload and download. Choices include: Telnet, Secure Shell (SSH), and CNS. Default: Telnet

Config Upload/Download—Choices include: Terminal, TFTP, and FTP. Default: Terminal.

SNMP Version—Configures the version of SNMP to use when communicating with the device. Choices include: SNMP v1/v2c and SNMP v3. Default: SNMP v1/v2c.

Device Groups—Lists the names of the Device Groups. You can add and modify Device Groups in this column.

Passwords

Figure 4-21 shows an example of the Passwords tab:

Figure 4-21 Device Group Spreadsheet - Passwords Tab

The Passwords tab contains the following columns:

Host Name—Must begin with a letter, digit, or underscore followed by letters, digits, underscores, spaces, hyphens, or dots ending with a letter, digit, or underscore. This field is required and must match the name configured on the target router device. Limited to 256 characters.

Login User—Not required by ISC. However, collection and upload/download will not function without the Login User and Login Password, as ISC will not be able to access the device. Should match what is configured on the target router device. Limited to 80 characters.

Login Password—Displayed as stars (*). Not required by ISC. However, collection and upload/download will not function without the Login User and Login Password, as ISC will not be able to access the device. Should match what is configured on the target router device. Limited to 80 characters.

Enable User—Not required by ISC. However, collection and upload/download only function if the Login User has sufficient privileges to configure the router in EXEC mode. Should match what is configured on the target router device. Limited to 80 characters.

Enable Password—Displayed as stars (*). Not required by ISC. However, collection and upload/download only function if the Login User has sufficient privileges to configure the router in EXEC mode. Should match what is configured on the target router device. Limited to 80 characters.

SNMP Read-Only—SNMP Read-Only (Community String RO). Many tasks use SNMP to access the device. This field must match what is configured on the target router device. Limited to 80 characters.

SNMP Read-Write—SNMP Read-Write (Community String RW). Many tasks use SNMP to access the device. This field must match what is configured on the target router device. Limited to 80 characters.

SNMPv3 Attributes

Figure 4-22 shows an example of the SNMPv3 Attributes tab:

Figure 4-22 Device Group Spreadsheet - SNMPv3 Attributes Tab

The SNMPv3 Attributes contains the following columns:

Host Name—Must begin with a letter, digit, or underscore followed by letters, digits, underscores, spaces, hyphens, or dots ending with a letter, digit, or underscore. This field is required and must match the name configured on the target router device. Limited to 256 characters.

Security Level—Choices include: No Authentication/No Encryption, Authentication/No Encryption, and Authentication/Encryption. Default: No Authentication/No Encryption.

Authentication User—User name configured on the specified device router. User must have permission to the object identification numbers (OIDs) specified in the security request (that is, write permission for a set request, and read permission for a get request). Should match what is configured on the target router device. Should be provisioned if the SNMP Security Level is Authentication/No Encryption or Authentication/Encryption. Limited to 80 characters.

Authentication Password—Displayed as stars (*). Should be provisioned if the SNMP Security Level is Authentication/No Encryption or Authentication/Encryption. Should match what is configured on the target router device. Limited to 80 characters.

Authentication Algorithm—Should be provisioned if the SNMP Security Level is Authentication/No Encryption or Authentication/Encryption. Choices include: None, MD5, and SHA. Default: None.

Encryption Password—Displayed as stars (*). In previous versions, this field was called Privacy Password. Should match what is configured on the target router device. Should be provisioned if the SNMP Security Level is Authentication/Encryption. Limited to 80 characters.

Encryption Algorithm—In previous versions, this field was called Privacy Protocol. Should be provisioned if the SNMP Security Level is Authentication/Encryption. Choices include: None and DES 56. Default: None.

CNS Attributes

Figure 4-23 shows an example of the CNS Attributes tab:

Figure 4-23 Device Group Spreadsheet - CNS Attributes Tab

The CNS Attributes tab contains the following columns:

Host Name—Must begin with a letter, digit, or underscore followed by letters, digits, underscores, spaces, hyphens, or dots ending with a letter, digit, or underscore. This field is required and must match the name configured on the target router device. Limited to 256 characters.

IE2100-Name—Disabled unless the Device-State field is Inactive or the Terminal Session Protocol field is CNS. A valid Cisco CNS IE2100 appliance must be selected if the Terminal Session Protocol is CNS. Choices include: None and the list of existing Cisco CNS IE2100 appliance names. Default: None.

Device-State—Choices include: Active and Inactive. Active indicates that the router has been plugged on the network and can be part of ISC tasks such as collect config and provisioning. Inactive indicates the router has not been plugged-in. Default: Active.

Event-Identification—Indicates whether the CNS Identification field contains a HOST NAME or CNS ID. Default: HOST NAME.

CNS-Identification—Required if the Event Identification field is set to CNS ID. Can contain letters, numbers, and these punctuation characters: period, underscore, and dash.

Platform Information

Figure 4-24 shows an example of the Platform Information tab. These fields are typically filled in from the physical device during the collection process.

Figure 4-24 Device Group Spreadsheet - Platform Information Tab

The Platform Information tab contains the following columns:

Host Name—Must begin with a letter, digit, or underscore followed by letters, digits, underscores, spaces, hyphens, or dots ending with a letter, digit, or underscore. This field is required and must match the name configured on the target router device. Limited to 256 characters.

Platform—Should match what is configured on the target router device. Limited to 80 characters.

Software—Should match what is configured on the target router device. Limited to 80 characters.

Image—Should match what is configured on the target router device. Limited to 80 characters.

Serial—Should match what is configured on the target router device. Limited to 80 characters.

Inventory Manager GUI Reference

This section describes the Inventory Manager GUI. It is organized by the external design of the GUI: what you see when you look at the windows, menus, and options. It is intended for new users who want to get started with Inventory Manager, and for experienced users who need a reference for the GUI workflow.

To access the Inventory Manager GUI, follow these steps:


Step 1 Log in to ISC.

Step 2 Choose Service Inventory > Inventory and Connection Manager > Inventory Manager.

Step 3 Click the Inventory Manager icon.

After initializing Java Web Start, Inventory Manager appears, as shown in Figure 4-25.

Figure 4-25 Inventory Manager

You now have access to the Inventory Manager Task Bar.


This section contains a section for each Inventory Manager menu:

Viewer and Task Watcher Tabs

File Menu

Edit Menu

View Menu

Tasks Menu

Tools Menu

Logging Menu

Help

Viewer and Task Watcher Tabs

The tabs at the bottom of the main Inventory Manager GUI in Figure 4-4 are used to monitor events and perform troubleshooting.

They serve the following purpose:

Log Viewer—Displays Log messages.

Event Viewer—Displays Inventory Manager and TIBCO events.

Task Watcher—Can be used to monitor tasks used by Inventory Manager.

File Menu

The File menu has the following options:

New

Open

Required Attributes

Save

Close

Exit

New

From the Inventory Manager main menu, New is the first option under the File menu on the Task Bar. The New option has the following options:

New Device Group

New Provider

New Region

New Customer

New Site

New Dynamic Device List (without existing configs)

New IE2100 Device List

New IPsec VPN Service Module (VPNSM)

Additionally, Open, is an option from alternate tabs.

New Device Group

To create a new Device Group, follow these steps:


Step 1 From the Inventory Manager menu, choose File > New > New Device Group, as shown in Figure 4-26.

Figure 4-26 Choose New Device Group

The New Device Group window appears, as shown in Figure 4-27.


Note You have the option to add configuration files to a Device Group using the New Device Group window, by choosing the Config Files tab.


Figure 4-27 Create New Device Group

Step 2 Device Group Name: Enter the name of the device group.

Step 3 Description: Enter a description.

Step 4 Click the Config Files tab.

The Config Files tab appears, as shown in Figure 4-28.

Figure 4-28 Config Files Tab

Step 5 Click Add to search for your configuration files.

Step 6 Navigate to your configuration file folder, select it, and click OK.

The Open Config Files window appears, as shown in Figure 4-29.

Figure 4-29 Open Config Files

Step 7 Use Ctrl+click to select the files.

The files appear highlighted, as shown in Figure 4-30.

Figure 4-30 Highlighted Config Files

Step 8 Click Open.

The Config File List appears, as shown in Figure 4-31.

Figure 4-31 Config Files List

Step 9 Click OK.

The Device Group spreadsheet appears, as shown in Figure 4-32.

Figure 4-32 Device Group Spreadsheet

When you create devices this way, no CPEs or PEs are created. To create CPEs or PEs, devices must be associated with a Customer, Site, Provider, or Region.

You have created a new Device Group and added the configuration files. The Spreadsheet Editor enables you to specify attributes for the devices. The following examples show how to edit or specify fields in the device workbook.

Cell Editing Examples

To enter the Domain Name, click the cell. The Domain Name dialog box appears, as shown in Figure 4-33.

Figure 4-33 Domain Name

Enter the Domain Name and click OK.

To enter the Management Address, click the cell. The Management Address dialog box appears, as shown in Figure 4-34.

Figure 4-34 Management Address

Enter the Management Address, or select one from the list, and click OK.

To enter the Device Type, click the cell. The Device Type dialog box appears, as shown in Figure 4-35.

Figure 4-35 Device Type

Enter the Device Type, or select one from the list, and click OK.

To enter the Device Description, click the cell. The Device Description dialog box appears, as shown in Figure 4-36.

Figure 4-36 Device Description

Enter the Device Description and click OK.

To enter the Access Protocol, click the cell. The Access Protocol dialog box appears, as shown in Figure 4-37.

Figure 4-37 Access Protocol

Enter the Access Protocol, or select one from the list, and click OK.

To enter the Config Upload/Download, click the cell. The Config Upload/Download dialog box appears, as shown in Figure 4-38.

Figure 4-38 Config Upload/Download

Enter the Config Upload/Download, or select one from the list, and click OK.

To enter the Login User, click the cell. The Login User dialog box appears, as shown in Figure 4-39.

Figure 4-39 Login User

Enter the Login User and click OK.

To enter the Login Password, click the cell. The Login Password dialog box appears, as shown in Figure 4-40.

Figure 4-40 Login Password

Enter the Login Password in both dialog boxes and click OK.

To enter the Enable Password, click the cell. The Enable Password dialog box appears, as shown in Figure 4-41.

Figure 4-41 Enable Password

Enter the Enable Password in both dialog boxes and click OK.

To enter the SNMP Read-Only, click the cell. The SNMP Read-Only dialog box appears, as shown in Figure 4-42.

Figure 4-42 SNMP Read-Only

Enter the SNMP Read-Only value, or select one from the list, and click OK.

To enter the SNMP Read-Write value, click the cell. The SNMP Read-Write dialog box appears, as shown in Figure 4-43.

Figure 4-43 SNMP Read-Write

Enter the SNMP Read-Write value, or select one from the list, and click OK.

Step 10 To finish, choose File > Save.


New Provider

To create a new Provider, follow these steps:


Note You have the option to add regions or configuration files to a Provider using the New Provider window, by choosing the appropriate tab. For an example of how to add regions, see the "New Region" section.



Step 1 From the Inventory Manager menu, choose File > New > New Provider.

The New Provider window appears, as shown in Figure 4-44.

Figure 4-44 New Provider

Step 2 Provider Name: Enter the name of the Provider.

Step 3 BGP AS Number: Enter the BGP Autonomous System Number.

Step 4 Contact Information: Enter the contact information.

Step 5 Click the Config Files tab.

The Config Files tab appears, as shown in Figure 4-45.

Figure 4-45 Config Files Tab

Step 6 Click Add to search for configuration files.

Step 7 Navigate to your configuration file folder, select it, and click OK.

The Open Config Files window appears.

Step 8 Use Ctrl+click to select the files.

The files appear highlighted, as shown in Figure 4-46.

Figure 4-46 Highlighted Config Files

Step 9 Click Open.

The Config File List appears, as shown in Figure 4-47.

Figure 4-47 Config Files List

Step 10 Click OK.

The New Provider spreadsheet appears, as shown in Figure 4-48.

Figure 4-48 New Provider Spreadsheet

You have created a new Provider and added the configuration files. The Spreadsheet Editor enables you to specify attributes for the devices. When you create devices this way, PEs are created.

To finish, choose File > Save.


New Region

To create a new Region, follow these steps:


Note You have the option to add configuration files to a New Region using the New Region for Provider window, by choosing the Config Files tab.



Step 1 From the Inventory Manager menu, choose File > New > New Region.

The New Region for Provider window appears, as shown in Figure 4-49.

Figure 4-49 New Region for Provider

Step 2 Region Name: Enter the name of the Region and click OK.

The Inventory Manager menu appears with a spreadsheet for the Provider, as shown in Figure 4-50.

Figure 4-50 New Provider Spreadsheet

For a description of the tabs and definition of the fields in the Provider, Region, and PE spreadsheets, see the "Spreadsheet Features" section.


New Customer

To create a new Customer, follow these steps:


Note You have the option to add sites or configuration files to a Customer using the New Customer window, by choosing the appropriate tab. For an example of how to add sites, see the "New Site" section.



Step 1 From the Inventory Manager menu, choose File > New > Customer.

The New Customer window appears, as shown in Figure 4-51.

Figure 4-51 New Customer

Step 2 Customer Name: Enter the name of the Customer.

Step 3 Contact Information: Enter contact information and click OK.

The Inventory Manager menu appears with a spreadsheet for the Customer, as shown in Figure 4-52.

Figure 4-52 New Customer Spreadsheet

You now have access to the Customer spreadsheet.


New Site

To create a new Site, follow these steps:


Note You have the option to add configuration files to a New Site using the New Site window, by choosing the Config Files tab.



Step 1 From the Inventory Manager menu, choose File > New > Site, as shown in Figure 4-53.

Figure 4-53 New Site

Step 2 Site Name: Enter the name of the Site.

Step 3 Site Information: Enter contact information and click OK.

The Inventory Manager menu appears with a spreadsheet for the Customer, as shown in Figure 4-54.

Figure 4-54 New Customer Spreadsheet

You now have access to the Customer spreadsheet.


New Dynamic Device List (without existing configs)

If you do not have existing configuration files, you can discover devices on your network, using the Dynamic Device List. The devices can be associated with logical CPE and PE devices at a later time.

To create a new Device List, follow these steps:


Step 1 From the Inventory Manager menu, choose File > New > New Dynamic Device List (without existing configs).

A new Device Spreadsheet appears, as shown in Figure 4-55.

Figure 4-55 New Device Spreadsheet

Step 2 To discover devices on your network, click the Management Address cell.

A Management Address window appears, as shown in Figure 4-56.

Figure 4-56 Enter IP Address

Step 3 Enter the IP address and click OK.

A new Device Spreadsheet appears.

Step 4 Start the Device Discovery process.

For an example of how to start the device discovery process, see the "Start Auto Discovery" section.


New IE2100 Device List

ISC supports the Cisco CNS IE2100 appliance Device Access Protocol for communication with any Cisco IOS device. Inventory Manager supports the same functionality for the Cisco CNS IE2100 appliance as the other devices described in the chapter.

New IPsec VPN Service Module (VPNSM)

This feature is not supported in this release

To create a new VPNSM Device, follow these steps:


Step 1 From the Inventory Manager menu, choose File > New > New IPsec VPN Service Module (VPNSM), as shown in Figure 4-57.

Figure 4-57 Choose New IPsec VPN Service Module

The New IPsec VPN Service Module spreadsheet appears, as shown in Figure 4-58.

Figure 4-58 Create New IPsec VPN Service Module

Step 2 Click the Catalyst 6500 cell.

The Catalyst 6500 window appears (not shown).

Step 3 Choose a Catalyst 6500 Device.

Step 4 Click the Slot Number cell and then enter a slot number.

Step 5 Choose File > Save to create a VPNSM in the Repository.


Open

From the Inventory Manager main menu, shown in Figure 4-26, Open is the second option under the File menu on the Task Bar. The Open option has the following options:

Open Devices

Open Discovery Seed File

Open Device Group

Open Provider

Open Region

Open Customer

Open Site

Open IPsec VPN Service Modules

Open Devices

This section describes how to open a Device with Inventory Manager. To open a Device, follow these steps:


Step 1 From the Inventory Manager task bar (not shown), choose File > Open > Open Devices.

The Open Devices window appears, as shown in Figure 4-59.

Figure 4-59 Open Devices

Step 2 Click Find.

The Open Devices window now displays available devices, as shown in Figure 4-60.

Figure 4-60 Open Devices Found

Step 3 Choose a Device and click OK. (mlpe3)

The Devices spreadsheet appears, as shown in Figure 4-61.

Figure 4-61 Devices Spreadsheet


Open Discovery Seed File


Note A discovery seed file is an XML representation of the devices found during Auto Discovery.


To open a discovery seed file, follow these steps:


Step 1 From the Inventory Manager menu, choose File > Open > Open Discovery Seed File.

The Open window appears, as shown in Figure 4-62.

Figure 4-62 Open Discovery Seed File

Step 2 Select the devices file, which you saved after discovering your devices, and choose Open.

The Device Information spreadsheet appears, as shown in Figure 4-63.

Figure 4-63 Device Information

If a device has already been created in the Repository, a message window appears, as shown in Figure 4-64.

Figure 4-64 Device in the Repository

Step 3 Click OK and the Device Chooser window appears, as shown in Figure 4-65.

Figure 4-65 Device Chooser

Step 4 Click the device name and domain to save the device as is. To create a new domain for the device and save it, click Create new device for new domain.

The Device Information spreadsheet appears, as shown in Figure 4-66.

Figure 4-66 Device Information

Now you can edit your devices and collect the latest configuration files.


Open Device Group

To open an existing Device Group, follow these steps:


Step 1 From the Inventory Manager menu, choose File > Open > Open Device Group.

A search dialog appears, as shown in Figure 4-67.

Figure 4-67 Open Device Group

Step 2 Click the Find button to download all Device Groups, enter the name to search for the one you want, or enter a partial name with an asterisk to get a list of available device names.

Step 3 Select the Device Group and click OK.

A Device Spreadsheet Editor appears, where you can edit device parameters such as passwords and SNMP information, as shown in Figure 4-68.

Figure 4-68 Device Spreadsheet Editor

You now have access to the Device spreadsheet.


Open Provider

To open an existing Provider, follow these steps:


Step 1 From the Inventory Manager menu, choose File > Open > Open Provider.

A search dialog appears, as shown in Figure 4-69.

Figure 4-69 Open Provider

Step 2 Click the Find button to download all Providers, enter the name to search for the one you want, or enter a partial name with an asterisk to get a list of available Providers.

Step 3 Select the Provider and choose OK.

A PE Spreadsheet Editor appears with all Regions and PEs for that Provider listed in the Spreadsheet Editor, as shown in Figure 4-70.


Note In the following example, the Spreadsheet Editor is empty.


Figure 4-70 Provider Spreadsheet Editor

You now have access to the Provider spreadsheet.


Open Region

To open an existing Region, follow these steps:


Step 1 From the Inventory Manager menu, choose File > Open > Open Region.

A search dialog appears, as shown in Figure 4-71.

Figure 4-71 Open Provider

Step 2 Click the Find button to download all Providers, enter the name of the provider to search for the one you want, or enter a partial name with an asterisk to get a list of available Providers.

Step 3 Select the Provider and choose OK.

Step 4 Choose from the list of existing Regions, as shown in Figure 4-72.

You can also create a Region for the Provider by choosing Create Region.

Figure 4-72 Open Region

A PE Spreadsheet Editor appears with all PEs for the Region listed in the Spreadsheet Editor, as shown in Figure 4-73.

Figure 4-73 PE Spreadsheet Editor

You now have access to the Provider spreadsheet.


Open Customer

To open an existing Customer, follow these steps:


Step 1 From the Inventory Manager menu, choose File > Open > Open Customer.

A search dialog appears, as shown in Figure 4-74.

Figure 4-74 Open Customer

Step 2 Click the Find button to download all Customers, enter the name of the Customer to search for the one you want, or enter a partial name with an asterisk to get a list of available Customers.

Step 3 Select the Customer and choose OK.

A CPE Spreadsheet Editor appears with all Sites and CPE for the Customer listed in the Spreadsheet Editor, as shown in Figure 4-75.

Figure 4-75 CPE Spreadsheet Editor

You now have access to the Customer spreadsheet.


Open Site

To open an existing Site, follow these steps:


Step 1 From the Inventory Manager menu, choose File > Open > Open Site.

A search dialog appears, as shown in Figure 4-76.

Figure 4-76 Open Customer

Step 2 Click the Find button to download all Customers, enter the name to search for the one you want, or enter a partial name with an asterisk to get a list of available Customers. You must specify a Customer first.

Step 3 Select the Customer and choose OK.

Choose from the list of existing Sites, as shown in Figure 4-77. You can also create a Site for the Customer by choosing Create Site.

Figure 4-77 Open Site

A CPE Spreadsheet Editor appears with all the CPEs for that Site listed in the Spreadsheet Editor, as shown in Figure 4-78.

Figure 4-78 CPE Spreadsheet Editor

You now have access to the Customer spreadsheet.


Open IPsec VPN Service Modules

This feature is not supported in this release

To open an existing VPNSM, follow these steps:


Step 1 From the Inventory Manager menu, choose File > Open > Open IPsec VPN Service Modules.

Open Device Blades window appears (not shown).

Step 2 Choose a De`vice Blade.

Step 3 Choose File > Save to save your changes to the VPNSM in the Repository.


Required Attributes

From the Inventory Manager main menu, shown in Figure 4-26, Required Attributes is the third option under the File menu on the Task Bar. To specify required attributes, you must open a Spreadsheet Editor for one of the following options:

Discovery Seed File (No example is provided)

Device Groups

Providers

Regions

PEs

Customers

Sites

CEs

The Spreadsheet Editors work the same for each inventory group. They default to the General tab and display a list of attributes. Some attributes in each Spreadsheet Editor are required and others are not. You can make some of the non-system required attributes required by clicking a checkbox for that attribute.

If an attribute is required, the spreadsheet tab will have a red X indicating that more information is required by the system for all later processing to proceed without errors. For example, errors can occur when processing service requests or creating a VPN. When all required information is filled out, the red X changes to either a yellow or green Continue Image. When you see a red X on a tab, it means you need to fill out more information for the tab.

From the Required Attributes option, you can specify required attributes for the following inventory groups:

Device Groups

Providers, Regions, and PE

Customers, Sites, and CE

Device Groups

To specify required attributes for a Device Group, follow these steps:


Step 1 From the Inventory Manager menu, choose File > Open > Open Device Group.

A search dialog appears.

Step 2 Select the Device Group and a Spreadsheet Editor appears, as shown in Figure 4-79.

Figure 4-79 Open Device Group

Step 3 Choose File > Required Attributes.

The General tab on the Required Attributes window for a Device Group appears, as shown in Figure 4-80.

Step 4 To set an attribute to Required, click the appropriate checkbox. A blank box signifies Optional.

Figure 4-80 Generic Device - General Attributes

The General tab contains the following attributes:

Device Name

Device Description

Management Address

Domain Name

Access Protocol

Config Upload/Download

SNMP Version

Device Groups

Step 5 To modify attributes for passwords, choose the Passwords tab.

The Passwords tab on the Required Attributes window appears, as shown in Figure 4-81.

Step 6 To set an attribute to Required, click the appropriate checkbox. A blank box signifies Optional.

Figure 4-81 Generic Device - Password Attributes

The Passwords tab contains the following attributes:

Login User

Login Password

Enable User

Enable Password

SNMP Read-Only

SNMP Read-Write

Step 7 To modify attributes for SNMPv3, choose the SNMPv3 Attributes tab.

The SNMPv3 tab on the Required Attributes window appears, as shown in Figure 4-82.

Step 8 To set an attribute to Required, click the appropriate checkbox. A blank box signifies Optional.

Figure 4-82 Generic Device - SNMPv3 Attributes

The SNMPv3 Attributes tab contains the following attributes:

Security Level

Authentication User

Authentication Password

Authentication Algorithm

Encryption Password

Encryption Algorithm

Step 9 To modify attributes for CNS, choose the CNS Attributes tab.

The CNS tab on the Required Attributes window appears, as shown in Figure 4-83.

Step 10 To set an attribute to Required, click the appropriate checkbox. A blank box signifies Optional.

Figure 4-83 Generic Device - CNS Attributes

The CNS Attributes tab contains the following attributes:

IE2100-Name

Device-State

Event-Identification

CNS-Identification

Step 11 To modify attributes for Platform Information, choose the Platform Information tab.

The Platform Information tab on the Required Attributes window appears, as shown in Figure 4-84.

Step 12 To set an attribute to Required, click the appropriate checkbox. A blank box signifies Optional.

Figure 4-84 Generic Device - Platform Information Attributes

The Platform Information tab contains the following attributes:

Platform

Software Version

Image Name

Serial Number


Providers, Regions, and PE

To specify required attributes for a Provider, follow these steps:


Step 1 From the Inventory Manager menu, choose File > Open > Open Provider.

A search dialog appears.

Step 2 Select the Provider and a Spreadsheet Editor appears, as shown in Figure 4-85.

Figure 4-85 Open Provider

Step 3 Choose File > Required Attributes.

The General tab on the Required Attributes window for the provider appears, as shown in Figure 4-86.

Step 4 To set an attribute to Required, click the appropriate checkbox. A blank box signifies Optional.

Figure 4-86 PE Device - General Attributes

The General tab contains the following attributes:

Device Name

Device Description

Management Address

Domain Name

Access Protocol

Config Upload/Download

SNMP Version

Device Groups

Step 5 To modify attributes for passwords, choose the Passwords tab.

The Passwords tab on the Required Attributes window appears, as shown in Figure 4-87.

Step 6 To set an attribute to Required, click the appropriate checkbox. A blank box signifies Optional.

Figure 4-87 PE Device - Password Attributes

The Passwords tab contains the following attributes:

Login User

Login Password

Enable User

Enable Password

SNMP Read-Only

SNMP Read-Write

Step 7 To modify attributes for SNMP attributes, choose the SNMPv3 Attributes tab.

The SNMPv3 Attributes tab on the Required Attributes window appears, as shown in Figure 4-88.

Step 8 To set an attribute to Required, click the appropriate checkbox. A blank box signifies Optional.

Figure 4-88 PE Device - SNMPv3 Attributes

The SNMPv3 Attributes contains the following attributes:

Security Level

Authentication User

Authentication Password

Authentication Algorithm

Encryption Password

Encryption Algorithm

Step 9 To modify attributes for PE attributes, choose the PE Attributes tab.

The PE Attributes tab on the Required Attributes window appears, as shown in Figure 4-89.

Step 10 To set an attribute to Required, click the appropriate checkbox. A blank box signifies Optional.

Figure 4-89 PE Device - PE Attributes

The PE Attributes tab contains the following attributes:

Provider Name

Region Name

Role

Loopback Interface

IS Managed

Step 11 To modify attributes for PE interfaces, choose the PE Interfaces tab.

The PE Interfaces tab on the Required Attributes window appears, as shown in Figure 4-90.

Step 12 To set an attribute to Required, click the appropriate checkbox. A blank box signifies Optional.

Figure 4-90 PE Device - PE Interfaces

The PE Interfaces tab contains the following attributes:

IP Address

Type

Encapsulation

IPsec (This feature is not supported in this release)

Firewall (This feature is not supported in this release)

NAT (This feature is not supported in this release)

QoS Candidate

PIX Logical Name

PIX Security-Level

Description

Step 13 To modify attributes for CNS attributes, choose the CNS Attributes tab.

The CNS Attributes tab on the Required Attributes window appears, as shown in Figure 4-91.

Step 14 To set an attribute to Required, click the appropriate checkbox. A blank box signifies Optional.

Figure 4-91 PE Device - CNS Attributes

The CNS Attributes tab contains the following attributes:

IE2100-Name

Device-State

Event-Identification

CNS-Identification

Step 15 To modify attributes for Platform Information, choose the Platform Information tab.

The Platform Information tab on the Required Attributes window appears, as shown in Figure 4-92.

Step 16 To set an attribute to Required, click the appropriate checkbox. A blank box signifies Optional.

Figure 4-92 PE Device - Platform Information

The Platform Information tab contains the following attributes:

Platform

Software Version

Image Name

Serial Number


Customers, Sites, and CE

To specify required attributes for a Customer, follow these steps:


Step 1 From the Inventory Manager menu, choose File > Open > Open Customer.

A search dialog appears.

Step 2 Select the Customer and a Spreadsheet Editor appears, as shown in Figure 4-93.

Figure 4-93 Open Customer

Step 3 Choose File > Required Attributes.

The General tab on the Required Attributes window appears, as shown in Figure 4-94.

Step 4 To set an attribute to Required, click the appropriate checkbox. A blank box signifies Optional.

Figure 4-94 CPE Device - General Attributes

The General tab contains the following attributes:

Device Name

Device Description

Management Address

Domain Name

Access Protocol

Config Upload/Download

SNMP Version

Device Groups

Step 5 To modify attributes for passwords, choose the Passwords tab.

The Passwords tab on the Required Attributes window appears, as shown in Figure 4-95.

Step 6 To set an attribute to Required, click the appropriate checkbox. A blank box signifies Optional.

Figure 4-95 CPE Device - Password Attributes

The Passwords tab contains the following attributes:

Login User

Login Password

Enable User

Enable Password

SNMP Read-Only

SNMP Read-Write

Step 7 To modify attributes for SNMPv3, choose the SNMPv3 Attributes tab.

The SNMPv3 Attributes tab on the Required Attributes window appears, as shown in Figure 4-96.

Step 8 To set an attribute to Required, click the appropriate checkbox. A blank box signifies Optional.

Figure 4-96 CPE Device - SNMPv3 Attributes

The SNMPv3 Attributes contains the following attributes:

Security Level

Authentication User

Authentication Password

Authentication Algorithm

Encryption Password

Encryption Algorithm

Step 9 To modify attributes for CPE, choose the CPE Attributes tab.

The CPE Attributes tab on the Required Attributes window appears, as shown in Figure 4-97.

Step 10 To set an attribute to Required, click the appropriate checkbox. A blank box signifies Optional.

Figure 4-97 CPE Device - CPE Attributes

The CPE Attributes tab contains the following attributes:

Customer Name

Site Name

Management Type

Step 11 To modify attributes for CPE interfaces, choose the CPE Interfaces tab.

The CPE Interfaces tab on the Required Attributes window appears, as shown in Figure 4-98.

Step 12 To set an attribute to Required, click the appropriate checkbox. A blank box signifies Optional.

Figure 4-98 CPE Device - CPE Interfaces

The CPE Interfaces tab contains the following attributes:

IP Address

Type

Encapsulation

IPsec (This feature is not supported in this release)

Firewall (This feature is not supported in this release)

NAT (This feature is not supported in this release)

QoS Candidate

PIX Logical-Name

PIX Security-Level

Description

Step 13 To modify attributes for CNS, choose the CNS Attributes tab.

The CNS Attributes tab on the Required Attributes window appears, as shown in Figure 4-99.

Step 14 To set an attribute to Required, click the appropriate checkbox. A blank box signifies Optional.

Figure 4-99 CPE Device - CNS Attributes

The CNS Attributes tab contains the following attributes:

IE2100-Name

Device-State

Event-Identification

CNS-Identification

Step 15 To modify attributes for Platform Information, choose the Platform Information tab.

The Platform Information tab on the Required Attributes window appears, as shown in Figure 4-100.

Step 16 To set an attribute to Required, click the appropriate checkbox. A blank box signifies Optional.

Figure 4-100 CPE Device - Platform Information Attributes

The Platform Information tab contains the following attributes:

Platform

Software Version

Image Name

Serial Number


Save

From the Inventory Manager main menu, shown in Figure 4-26, Save is the fourth option under the File menu on the Task Bar.

This option saves your work.

Close

From the Inventory Manager main menu, shown in Figure 4-26, Close is the fifth option under the File menu on the Task Bar.

This option name changes depending on which Spreadsheet Editor you choose. For example, if you are editing a Customer named CustomerA, the menu would show File Close CustomerA.

If there are changes to be saved, the system prompts you to save, and then the Spreadsheet Editor closes. You have an opportunity to cancel the operation if saving is required.

Exit

From the Inventory Manager main menu, shown in Figure 4-26, Exit is the sixth option under the File menu on the Task Bar.

This option shuts down the Inventory Manager. If there are changes to be made, the system prompts you to save changes before exiting.

Edit Menu

From the Inventory Manager main menu, shown in Figure 4-25, Edit is the second menu on the Task Bar. The Edit menu has the following options:

Insert More Devices

Remove Selected Devices

Move to New Customer

Move to New Provider

Move to Customer

Move to Provider

Edit Selected Devices

Edit Default Attributes

Load Default Values to Selected Cells

Apply Interface Marking Rules to Selection

Select All

Insert More Devices

When editing a Device Group, Provider, or Customer, choosing this option causes a File Open Dialog to appear, where you can select more configuration files to be inserted. A new row is created for each new configuration file that is added:

If you are editing a Provider or a Region, a physical device and a logical PE are created in the Repository.

If you are editing a Customer or a Site, a physical device and a logical CPE are created in the Repository.

If you are editing a Device Group, only a physical device is created and you must associate it with a PE or CPE using the Edit > Move To menu options.

If you are editing in a Dynamic Device List spreadsheet, choosing this option adds one more empty row into the spreadsheet for editing.

To insert more devices in a Spreadsheet Editor, choose Edit > Insert More Devices from the Inventory Manager Task Bar.

Remove Selected Devices

When editing a Device Group, Provider, or Customer, choosing this option allows selected rows to be removed from the spreadsheet.

To delete rows in a Spreadsheet Editor, choose Remove Selected Devices from the Inventory Manager Task Bar.

Use the Host Name Column to select rows of device information. A confirmation dialog appears. If you choose Yes, the selected rows are removed from the Spreadsheet Editor.


Note These objects are not removed from the Repository.


Move to New Customer

This option is enabled only when you create devices using the Open Discovery Seed File or New Dynamic Device List options. You must select rows using the Host Name Column or the Select All option. The selected rows in the spreadsheet are moved to a new tab for a Customer in a CPE Spreadsheet Editor.

To create a new Customer and move the selected rows to a new CPE Spreadsheet Editor, follow these steps:


Step 1 Select the desired rows using the host name column of a device spreadsheet.

Step 2 From the Inventory Manager Task Bar, choose Edit > Move to New Customer to create a new Customer and move the selected rows to a new CPE Spreadsheet Editor.

Step 3 A dialog box prompts you to enter the new Customer information such as Name and Contact information.

Step 4 Click OK and the selected rows are removed from the current spreadsheet and moved into a new Customer CPE spreadsheet. In the process, each moved physical device is associated with a new CPE logical device in the Repository.

Step 5 Proceed to edit the CPE as you would for any Customer, by associating it with new Site objects. If the originating spreadsheet is empty after the operation, it automatically closes.


Move to New Provider

This option is enabled only when you create devices using the Open Discovery Seed File or New Dynamic Device List options. You must select rows using the Host Name Column or the Select All option. The selected rows in the spreadsheet are moved to a new tab for a Provider in a PE Spreadsheet Editor.

To create a new Provider and move the selected rows to a new PE Spreadsheet Editor, follow these steps:


Step 1 Select the desired rows using the host name column of a device spreadsheet.

Step 2 From the Inventory Manager Task Bar, choose Edit > Move to New Provider to create a new Provider and move the selected rows to a new PE Spreadsheet Editor.

Step 3 A dialog box prompts you to enter the new Provider information such as Name, BGP AS number, and Contact information.

Step 4 Click OK and the selected rows are removed from the current spreadsheet and moved into a new Customer PE spreadsheet. In the process, each moved physical device is associated with a new PE logical device in the Repository.

Step 5 Proceed to edit the PE as you would for any Provider, by associating it with new Region objects. If the originating spreadsheet is empty after the operation, it automatically closes.


Move to Customer

This option is enabled only when you create devices using the Open Discovery Seed File or New Dynamic Device List. You must use the Host Name Column or the Select All options to select rows. The selected rows in the spreadsheet are moved to a new tab for the customer in a CPE Spreadsheet Editor.

To select rows in a table, open an existing customer, and move the rows to a new CPE Spreadsheet Editor, and follow these steps:


Step 1 Select the desired rows using the host name column.

Step 2 From the Inventory Manager Task Bar, choose Edit > Move to Customer.

A dialog box appears asking you to enter the existing Customer name.

Step 3 Click the Find button and a list of customers appears.

Step 4 Choose a customer.

If you click OK, the selected rows are removed from the current spreadsheet into an existing customer CPE spreadsheet.


Note In the process, each moved physical device is associated with a new CPE logical device in the Repository.


Edit the CPEs as you would for any customer by associating them with new or existing Region objects. If the originating spreadsheet is empty after the operation, it automatically closes.


Move to Provider

This option is enabled only when you create devices using the Open Discovery Seed File or New Dynamic Device List. You must use the Host Name Column or the Select All options to select rows. The selected rows in the spreadsheet are moved to a new tab for the Provider in a PE Spreadsheet Editor.

To select rows in a table, open an existing provider, and move the rows to a new PE Spreadsheet Editor, and follow these steps:


Step 1 Select the desired rows using the host name column.

Step 2 From the Inventory Manager Task Bar, choose Edit > Move to Provider.

A dialog box appears asking you to enter the existing Provider name.

Step 3 Click the Find button and a list of providers appears.

Step 4 Choose a provider.

If you click OK, the selected rows are removed from the current spreadsheet into an existing Provider PE spreadsheet.


Note In the process, each moved physical device is associated with a new PE logical device in the Repository.


Step 5 Edit the PEs as you would for any provider by associating them with new or existing Region objects. If the originating spreadsheet is empty after the operation, it automatically closes.


Edit Selected Devices

To edit selected devices from rows in a spreadsheet, follow these steps:


Step 1 Choose Edit > Edit Selected Devices from the Inventory Manager Task Bar.

A Multi-Attribute Cell Editor appears where you can set a value that is applied to all selected cells for each respective column in the selection.

Step 2 Click the Multi-Attribute Editor cell to set the value.

Step 3 To edit an individual cell in a column, click the cell.

A column-specific editor appears.

Step 4 Use the column-specific editor to specify a value for the cell.

A new dialog appears showing a table with one row. Each column containing selected cells in the originating spreadsheet is represented in the dialog.

Step 5 Click each cell in the new dialog and a column specific editor appears allowing you to enter a value or select from a list of existing values.

Step 6 When you are finished filling in the one row spreadsheet, click OK and the values are applied to each selected cell in the original spreadsheet respectively.

Step 7 To edit a single value in a cell, click the cell.

You are prompted with a search dialog to specify the value. The type of search dialog depends on the column you are editing. For example, if you edit a username you are prompted with a single input editor. If you are editing a password column, you get a password editor.


To edit multiple attributes at one time, select the cells using the following standard techniques for multiple selections:

Select a single cell that represents the upper boundary. Press the Shift Key and select the lower boundary of the selection.

Click and drag to and from a boundary.

To toggle your selection, press the Ctrl Key and click on a cell.

To select entire rows, use the Host Name Column as your main point of selection.

Edit Default Attributes

Each spreadsheet editor (Device Group, CPE, PE, and Dynamic Device List) has the ability to store separate default attributes. Defaults for passwords and other parameters for PEs can be different from those of CPEs.

For example, all PEs in a provider network can share the same passwords, SNMP attributes, and so on. Using Inventory Manager, you can store default attributes for most of the attributes in each spreadsheet. These default attributes can then be applied to selected cells using the Edit > Load Default Attributes to Selected Cells menu.

To edit default attributes, follow these steps:


Step 1 Choose Edit > Edit Default Attributes from the Inventory Manager Task Bar.

A new dialog appears containing a table with one row.

Step 2 To specify the default attribute for a particular column, click it and specify the value in the column-specific editor.

Step 3 When you are finished editing the desired defaults, click the OK button and the default attributes are stored.


Each specific Spreadsheet Editor has its own unique set of columns. Each editor allows the specification for default values to be stored and retrieved at a later time. It is the standard spreadsheet format, and to specify the values you must click on each cell. These values are automatically saved between sessions and are stored per user on the client machine running the Inventory Manager.

When specifying default values for the Management Address or PE Loopback Interface columns, you may enter more than one interface name.

For example, Loopback0;FastEthernet0;Ethernet0, where the separator between names must be a semicolon. When attempting to set the Management Interface using the default supplied for any given device, the interfaces stored on the device must be checked against the value provided. If the value provided is Loopback0 and the interface does not exist on the device, it can not be set. The interface must actually exist on the device before Inventory Manager allows it as a valid value.

In the example of Loopback0;FastEthernet0;Ethernet0, Inventory Manager uses a left to right precedence rule. For each selected device it first checks to see whether Loopback0 exists. If it is found on the device, it is used as the correct value, otherwise it looks for FastEthernet0 and continues down the list until it finds an acceptable result. If no interfaces on the device match the request string, the value remains unchanged.

Load Default Values to Selected Cells

To load default values to selected cells, follow these steps:


Step 1 From the Inventory Manager Task Bar, choose Edit > Edit Default Attributes.

Step 2 Select the desired cells in the spreadsheet.

Step 3 Choose Edit > Load Default Attributes to Selected Cells option.

Step 4 Specify the default attributes for desired columns.

Step 5 Modify the selected cell values with the default attribute, if possible.

Step 6 Select the cells you want to edit.

Step 7 Choose Edit > Load Default Values to Selected Cells.

The values that you stored using the Edit > Edit Default Attributes menu are applied to each selected cell.

For example, if all the devices you are editing belong to the same provider and share the same passwords, you can specify the default password and apply it to the entire spreadsheet without having to remember it.


Apply Interface Marking Rules to Selection

This option is only enabled when you are editing CPE and PE devices in a spreadsheet. To apply the rules, select the desired cells in the spreadsheet and, from the Inventory Manager Task Bar, choose Tools > Apply Interface Marking Rules to Selection.

A Rule chooser dialog appears. Select one or more rules to apply on interfaces.

If you select one or more devices, the rules are applied to each interface on the selected devices.

If you select one or more interfaces in the Interface tab, the rules are only applied to the selected interfaces.

For each interface encountered, marking will only occur if the interface and/or parent device properties meet those specified in the rule.

Before you apply interface marking rules to selected devices, you must first create a set of rules for your organization. For an example of how to create interface marking rules, see the "New Rule" section.

Select All

From the Inventory Manager Task Bar, choose Edit > Select All to use this option.

This option selects all the cells in a spreadsheet, except the host name column. Typically, the host name column is not editable and does not participate in typical edit operations.

If you want to select all rows in the spreadsheet, first click on the Host Name column and press the Ctrl+A accelerator key. This operation selects all the cells in a Spreadsheet Editor that are currently open.

View Menu

From the Inventory Manager Task Bar, shown in Figure 4-25, View is the third menu on the Task Bar. The View menu has the following options:

Fit Columns in Window

Show Color Coded Column Headers

Fit Columns in Window

From the Inventory Manager Task Bar, choose View > Fit Columns in Window to expand or contract the cells in the Spreadsheet Editor to fit the window.

Show Color Coded Column Headers

From the Inventory Manager Task Bar, choose View > Show Color Coded Column Headers to show the colors of the column headers.

If you choose View > Show Color Coded Column Headers, you could see three colors:

Red—some required data is missing in this column.

Yellow—all required data is in this column, but not all optional data.

Green—all data is provided.

Tasks Menu

From the Inventory Manager Task Bar, shown in Figure 4-25, Tasks is the fourth menu on the Task Bar. The Task menu has the following options:

Collect Latest Configuration Files

Start Auto Discovery

Start NPC Auto Discovery

Start Service Discovery

Collect Latest Configuration Files

This option is applied to selected rows in a spreadsheet, if rows are selected. If no rows are selected, all devices contained in the spreadsheet are visited and their configurations are downloaded to the ISC server. It is important for the login and enable passwords to be specified correctly, together with the management address, for each device to be reached and files to be successfully collected.

A persistent task is created on the Master server and Inventory Manager waits for the collection process to complete. When the task completes, you are notified of success or failure. You can use the Web GUI to view the task logs on the Master server to see why a task has failed. If successful, you are prompted to refresh from the Repository. This is recommended, because it is possible that the configuration has changed since the last time the configuration was retrieved.

From the Inventory Manager Task Bar, choose Tasks > Collect Latest Configuration Files to collect the latest configuration files.

Start Auto Discovery


Note This option is designed to work in conjunction with the New Dynamic Device List option.


If you do not have existing configuration files, you can discover devices on your network, using the Dynamic Device List.

To create a new Device List and start Auto Discovery, follow these steps:


Step 1 From the Inventory Manager menu, choose File > New > New Dynamic Device List (without existing configs).

A new Device Spreadsheet appears, as shown in Figure 4-101.

Figure 4-101 New Device Spreadsheet

Step 2 Click the Management Address cell.

A Management Address window appears, as shown in Figure 4-56.

Figure 4-102 Enter IP Address

Step 3 Enter the IP address of the device from which you want to start the device discovery process and click OK.

A Device Information spreadsheet appears, as shown in Figure 4-103.

Step 4 From the Inventory Manager Task Bar, choose Tasks > Start Auto Discovery to start the device discovery process.

Figure 4-103 Start Device Discovery

The Discovery Policy window appears, as shown in Figure 4-104.

Figure 4-104 Discovery Policy

Step 5 Enter the Number of Hops.

This number represents the number of hops from the device with the IP address. For example, the number 1.

The Please Wait window appears, as shown in Figure 4-105.

Figure 4-105 Please Wait


Note This waiting period depends on the number of hops and number of devices in the network.


When the waiting period ends, the Device Information spreadsheet appears with the discovered devices, as shown in Figure 4-106.

Figure 4-106 Discovered Devices

The Save Connection Information window also appears, as shown in Figure 4-107.

Figure 4-107 Save Connection Information

Step 6 To save the connection information, click Yes. This information will be used in the Start NPC Auto Discovery process.

A Save Connection Information Confirmation window appears, as shown in Figure 4-108.

Figure 4-108 Save Connection Information Confirmation

Step 7 To save the connection information, give the file a name and click Save.

Another Save Device Information window appears, as shown in Figure 4-109.

Figure 4-109 Save Device Information

Step 8 To save the device information, click Save.

The Save Device Information Confirmation window appears, as shown in Figure 4-110.

Figure 4-110 Save Device Information Confirmation

Step 9 To save the device information, give the file a name and click Save.

The Device Information spreadsheet appears, as shown in Figure 4-111.

Figure 4-111 Device Information

Now you can edit your devices and collect the latest configuration files.


Start NPC Auto Discovery

From the Inventory Manager Task Bar, choose Tasks > Start NPC Auto Discovery to start the connection discovery process.

To import connections with NPC Auto Discovery, follow these steps:


Step 1 Choose Tasks > Start NPC Auto Discovery.

You are prompted to provide the path to the correct connection.xml file.

Step 2 Select the correct connection.xml file and click OK.

A dialog box appears, indicating that the NPC discovery process has started.

Step 3 You are prompted if the task completes successfully. Select OK to finish this portion of the NPC Auto Discovery process.

To find the discovered NPCs, go to Service Inventory > Inventory and Connection Manager > Named Physical Circuits.


Start Service Discovery

To import services with Auto Discovery from Inventory Manager, in the Task Bar choose Tasks > Start Service Discovery to start the service discovery process.

The Service Discovery window in Figure 4-112 appears.

Figure 4-112 Service Discovery

You can choose between the following Service Discovery options:

MPLS VPN—Create a MPLS VPN Service Request for each VRF-enabled interface.

L2VPN (Metro)—Create a L2VPN (Metro) Service Request.

L2VPN (L2TPv3)—Create a L2VPN (L2TPv3) Service Request


Note L2TPv3 auto discovery is limited to L2TPv3 L2VPN service requests.


Checking the L2VPN (L2TPv3) box enables the bottom L2TPv3 Options (see Figure 4-112):

Just in time configuration collection—Upload the PE configurations from the routers

before auto discovery.

Select PEs—Opens the Select PE POPs window, where you can select one or more PE POPs

Grouping Options:

No Grouping—One auto-discovered L2TPv3 session (link) will become one SR.

Group by Description—(Currently not implemented)

Group by Connect Name—More than one auto-discovered L2TPv3 session will be grouped into one SR if they share the same connect name.

Special Instructions—(Currently not implemented)

You are notified when service discovery is finished.


Tools Menu


Note IPsec, firewall, NAT: These features are not supported in this release.


To open a rule editor where you can create and modify rules for marking interfaces, import and export rule files, and specify values for IPsec, NAT, QoS, and Firewall, choose Tools > Interface Marking Rule Editor from the Inventory Manager Task Bar, as shown in Figure 4-113.

Figure 4-113 Interface Marking Rule Editor

The Interface Rule Editor Task Bar appears with an interface-rules dialog box, as shown in Figure 4-114.

Figure 4-114 Interface Rule Editor Task Bar

The Task Bar has the following options:

File

Edit

Help

File

The File option has the following options:

New Rule

New Folder

Open

Close

Import

Export

Save Rule

New Rule

To create a new rule, follow these steps:


Step 1 Click the interface-rules folder and choose New Rule from the File option or New Rule icon. A dialog box appears, as shown in Figure 4-115.

Figure 4-115 Interface Rule Editor Dialog Box

Step 2 Enter the following information:

Name—Name of the rule (required).

Description—Description of the rule (optional).

Step 3 From the If clause drop-down buttons, click Please Choose Property and a Property drop-down list appears, as shown in Figure 4-116.

Figure 4-116 Property Drop-Down List

Step 4 Select a Property.


Note The Property that you select determines the content of subsequent drop-down lists.


Step 5 Click is and a Relationship drop-down list appears, as shown in Figure 4-117.

Figure 4-117 Relationship Drop-Down List

Step 6 Select a Relationship.

Step 7 If you had chosen Interface Type for the Property and is for the Relationship, the drop-down button would show pos, as shown in Figure 4-118.

Figure 4-118 Pos Drop-Down Button

Step 8 Click pos and a Type drop-down list appears, as shown in Figure 4-119.

Figure 4-119 Type Drop-Down List

Step 9 Select a Type.

If you chose ethernet, for example, you would have defined the following interface type If clause in the new rule:

If the interface type is Ethernet

You can define how to mark the interface with the Then clause drop-down buttons, as shown in Figure 4-120.

Figure 4-120 Then Clause Drop-Down List

You can create a new rule to mark interfaces for the following security and quality features:

IPsec

NAT

QoS

Firewall

Step 10 To change the interface marking for IPsec, click the IPsec drop-down list, and make the appropriate selection. An IPsec drop-down list appears, as shown in Figure 4-121.

Figure 4-121 IPsec Drop-Down List

Step 11 Select a setting.

Step 12 To change the interface marking for NAT, click the NAT drop-down list, and make the appropriate selection. A NAT drop-down list appears, as shown in Figure 4-122.

Figure 4-122 NAT Drop-Down List

Step 13 Select a setting.

Step 14 To change the interface marking for QoS, click the QoS drop-down list, and make the appropriate selection. A QoS drop-down list appears, as shown in Figure 4-123.

Figure 4-123 QoS Drop-Down List

Step 15 Select a setting.

Step 16 To change the interface marking for Firewall, click the Firewall drop-down list, and make the appropriate selection. A Firewall drop-down list appears, as shown in Figure 4-124.

Figure 4-124 Firewall Drop-Down List

Step 17 Select a setting.

If you selected the security and quality features above, you would have formulated the following Then clause in the new rule:

Set:

IPsec to private

NAT to outside

QoS to Link Endpoint

Firewall to DMZ1

The as is for each service shows the changed value in the Then clause drop-down buttons, as shown in Figure 4-125.

Figure 4-125 Then Clause Drop-Down List

You can create additional If clause statements with more complicated logic, by using the And, Or, and Not drop-down buttons, as shown in Figure 4-126.

Figure 4-126 Additional If Clause Drop-Down List

You can remove the additional statements by using the Remove Last button.

Figure 4-127 show an example of a rule with an additional If clause.

Figure 4-127 Example of a Rule


Note One rule can mark all Loopback0 interfaces as public for IPsec, outside for NAT, link endpoint for QoS, and DMZ1 for Firewall.



New Folder

Creates a new folder under the selected folder.

Open

Opens the selected rule.

Close

Closes the selected rule.

Import

Imports external rules to an existing folder. Each rule and folder contained in the file is created under the selected folder in the tree.

Export

If you select one or more rules without a folder, the rules are exported to a file of your choice. You can then share this file with other users of Inventory Manager.

If you select a folder, all child folders and contained rules can be exported to a file of your choice. You can then share this file with other users of Inventory Manager.

If used with a single rule, it exports that rule, to a single file.

If used on a folder, it will export all the rules from that folder, to a single file.

Save Rule

Saves the modified rule.

Edit

Delete

Deletes the selected rule or folder.

Moves To

Moves a rule or folder to an existing folder.

Help

About

Contains information on Cisco Systems and the ISC software version.

License

Contains the ISC software license agreement.

Logging Menu

From the Inventory Manager Task Bar, shown in Figure 4-25, Logging is the sixth menu on the Task Bar. The Logging menu allows you to specify the following log output levels to the Logging UI:

All

All log messages are sent to the Log Viewer located near the bottom of Inventory Manager

Severe

Only severe log messages are sent to the Log Viewer located near the bottom of the Inventory Manager

Warning

Only warning and severe log messages are sent to the Log Viewer located near the bottom of the Inventory Manager

Info

Only informational, warning, and severe log messages are sent to the Log Viewer located near the bottom of the Inventory Manager

Fine

Only fine, informational, warning, and severe log messages are sent to the Log Viewer located near the bottom of the Inventory Manager

Finer

Only finer, fine, informational, warning, and severe log messages are sent to the Log Viewer located near the bottom of the Inventory Manager

Finest

Only finest, finer, fine, informational, warning, and severe log messages are sent to the Log Viewer located near the bottom of the Inventory Manager

Off

No log messages are sent to the Log Viewer located near the bottom of the Inventory Manager.

Help

From the Inventory Manager Task Bar, shown in Figure 4-25, Help is the seventh menu on the Task Bar. The Help menu has the following option:

About

About

Loads the About dialog showing version information and some web URLs for Cisco Systems Inc.

Auto Discovery

This section describes the Auto Discovery features. It contains the following sections:

Auto Discovery Overview

Auto Discovery Prerequisites

Process Flow

User Interface

Auto Discovery Overview

With Auto Discovery, ISC can automatically perform the following operations:

Discover all the devices and the physical links between the devices.

Discover Ether channels, loopback addresses, interfaces, and encapsulation types for interfaces on each device.

Discover all L2VPN/VPLS and L3VPN services.

To understand the benefits of Auto Discovery, consider the following business scenario. ISC is connected to a network that contains more than 50 devices with some L2VPN and L3VPN services already provisioned.

Without Auto Discovery, the operator would need to manually enter the following information in ISC:

Information about all the devices and the physical links between these devices.

Information about all the existing L2VPN services and L3VPN services.

Auto Discovery Prerequisites

Before running Auto Discovery, you should do the following:

Enable SNMP on all devices.

Enable CDP on all devices you want to discover.

Have a lab diagram that shows how the network is set up.

Disable all NAT IP address mapping in the network. (This feature is not supported in this release.)

Not have multiple installations of ISC in one subnet.

Process Flow

Figure 4-128 shows the Auto Discovery Process.

Figure 4-128 Auto Discovery Process Flow

Cornerstone Bridge Log is available for viewing from an internet browser.

User Interface

There are two user interfaces available for running Auto Discovery:

Inventory Manager GUI

UNIX Command Line Interface (UNIX CLI)

Inventory Manager GUI

To use Auto Discovery within Inventory Manager, follow these steps:


Step 1 Choose File > New > New Dynamic Device List to create a policy.xml file.

Step 2 Choose Tasks > Start Auto Discovery.

Step 3 Choose your own location and names to save the seed file and connection output file.

Step 4 Assign roles and passwords.

Step 5 Choose Tasks > Collect Latest Config Files.

Step 6 Choose Tasks > Start NPC Discovery using the connection output file.

Step 7 Choose Tasks > Start Service Discovery to do Common and Service Discovery.

To see the results of the Auto Discovery and Service Discovery processes, the following screens are available:

Choose Service Inventory > Inventory and Connection Manager > Service Requests to see Service Requests.

Choose Service Inventory > Inventory and Connection Manager > Named Physical Circuits to see NPC.

Choose Service Inventory > Inventory and Connection Manager > NPC Rings to see Ring Topologies.


UNIX Command Line Interface (UNIX CLI)

To use the UNIX CLI, follow these steps:


Step 1 Edit policy.xml in $ISC_HOME/bin.

Step 2 Run $ISC_HOME/bin/invokeDiscovery.sh for device and connection discovery.

Step 3 Output files are saved in $ISC_HOME/tmp/seed.xml and $ISC_HOME/tmp/connection.xml automatically.

Step 4 Use Inventory Manager to assign roles and passwords for devices and collect configuration files. See Creating a New Customer with Devices.

Step 5 Run $ISC_HOME/bin/runDiscoverNPC.sh to populate connections.

Step 6 Run $ISC_HOME/bin-/runCommonDiscovery.sh for all service discovery.

Step 7 Log available via standard output.


Service Discovery

This section describes the types of Service Discovery that ISC currently supports. It contains the following sections:

MPLS Service Discovery

Grey Management Discovery

Layer 2 VPN Discovery

VPLS Service Discovery

MPLS Service Discovery

This section describes the process for MPLS Service Discovery. This section contains the following sections:

MPLS Service Discovery Overview

Limitations

MPLS Service Discovery Process

MPLS Service Discovery Overview

The IP Solution Center (ISC) provides a mechanism to discover the state of the network. Using Inventory Manager, you can discover information about the following network features:

Devices (Network hardware)

Connections (Named Physical Circuits)

Services (L2 VPN and L3 MPLS VPN service requests)

MPLS VPN Service Discovery provides the following benefits:

When you create an MPLS VPN service request, less information needs to be added.

Services provisioned by non-ISC applications can be discovered and managed by ISC.

An MPLS VPN service request consists of one or more MPLS VPN links. ISC supports Service Discovery for two types of MPLS VPN links:

PE-CE

PE-NoCE

The Unmanaged CE option is also supported for the PE-CE type.

Limitations

In cases where Auto Discovery is used, ISC has the following Auto Discovery limitations:

Auto Discovery does not support creating Service Requests with an MVRF CE PE-CE links.

Auto Discovery does not support creating Service Requests for commands not supported by ISC.

MPLS Service Discovery Process

The MPLS Service Discovery process creates one MPLS VPN Service Request for each VRF-enabled interface. A VRF-enabled interface is an interface on which the ip vrf forwarding command is configured on the PE.


Note MPLS Service Discovery can be invoked only after Device Discovery and NPC Discovery have been completed successfully.


The following steps describe the logic MPLS Service Discovery uses to create Service Requests and populate the Repository:


Step 1 Find all the PE devices in the Repository with the role of PE-POP.

Step 2 Analyze the configuration file for each PE found in the previous step.

Step 3 Identify all the VRF-enabled interfaces (these interfaces can also be sub-interfaces).

Step 4 Check each VRF-enabled interface for valid Service Requests (SR).

Step 5 If a valid SR exists, ignore the VRF-enabled interface.

Otherwise, for each VRF-enabled interface, find the CE connected to the interface in the Named Physical Circuit (NPC) table, which was populated by the NPC Discovery process.


Note An NPC is a collection of physical links. By traversing the physical links, you can find the terminating logical device for the VPN link.


Step 6 Find the sub-interface on the CE that connects the MPLS link with the PE.

Step 7 If no terminating CE is found in the NPC table, create an SR without the CE.

Step 8 Create a generic MPLS Service Policy for each PE-CE link, and attach it to the Customer associated with the CE.


Note An MPLS Service Policy provides defaults to simplify the provisioning of service requests.


Step 9 Create a generic MPLS Service Policy for each PE-Only link, and attach it to the Provider associated with the PE.

Step 10 Analyze the PE and CE configuration files, and determine the routing protocols, based on the IP addresses of the participating interfaces.


Note Some of the routing protocols, for example BGP and EIGRP, cannot be deduced in the PE-Only SR, because the CE configuration file is not available.


Step 11 Analyze the configuration files, capture all the available redistribution related information, and then populate the Repository.

Step 12 Analyze a list of export and import route targets for each VRF.

Step 13 Create CERCs and CERC Membership.

Step 14 Turn on the override VRF Name and RD Flag for the MPLS VPN Link. (This information is captured from the configuration file.)

Step 15 Save the MPLS SR with the MPLS VPN Link in the Repository with a flag indicating that this service request was discovered.


Synchronization

The MPLS Service Discovery process does not synchronize existing services. If it is determined that an SR exists in the Repository for a particular interface, the Discovery process ignores the interface. But, if you have manually added a service on a new interface and ISC is not aware of it, the Service Discovery process creates the newly added service in the Repository.

CERC Creation

Given a list of Route Targets in the configuration files for each of the VRFs, the MPLS VPN Service Discovery module needs to re-create the CERC according to the ISC service model. MPLS VPN Service Discovery assumes that the services provisioned on the network are provisioned manually and do not follow the conventions adopted by ISC for topologies (CERC Route Target Allocation). As a result, a CERC created to fit into the service model supported by ISC is not associated with any VPN. You must create the VPN and associate it to the CERC created by discovery.

User Input After Discovery

After Service Discovery, a Policy and an SR are created. When a CE is discovered, a Customer-owned Policy is created. When no CE is discovered, a Provider-owned Policy and Global SR are created. After the Service Discovery process is complete, you cannot modify the relationship between the Customer and the SR. This restriction applies to both the Customer-owned and Global SRs.

The Service Discovery process ends with the newly created Service Requests in a PENDING state and the related objects in the Repository. After the completion of the Discovery process, you must go to the GUI, create the VPN, and connect the VPN with the CERC.

You cannot modify the Policy or the SR or associate an SR with a Customer or Provider at this point.

Because the CERC is a logical concept used within ISC to represent topologies, Service Discovery is unable to connect the way you have manually configured the services with CERC.


Note The configuration files that Discovery processes upload from device are logged under $ISC_HOME/tmp/autodiscovery.


Grey Management Discovery

This section describes the process of Grey Management Discovery.

The following steps describe the logic MPLS Service Discovery uses to create Grey Management Service Requests and populate the Repository:


Step 1 The discovery process scans the PE configuration files to determine if there is a VRF provisioned by ISC (VRF name starts with grey_mgmt_vpn).

Step 2 After finding a VRF, the discovery process scans the NPC connection table to determine if there is an NPC on that interface, and if a Managed CE (MCE) is connected to the PE on this interface.

Step 3 If an MCE is found, the discovery process scans the Route Target entries in the Management VRF for the Management CERC, and attaches it to the Management VPN.

The discovery process also caches the route target of the Management VRF.

Step 4 A Management SR with a corresponding Management Link for the MCE and PE connection is created in the Repository.

Step 5 If, when the new Links are created, Management Route Targets are found, they are ignored and the join Grey Management flag is turned on.


Layer 2 VPN Discovery

This section contains the following sections:

Topology

Logic (MPLS Core)

Logic (L2TPv3)

Topology

L2 VPN Discovery:

Discovers inter-POP EWS and ERS (with No-CE) services.

Creates all Service Requests in PENDING state. One generic VPN is generated for all discovered services.

Figure 4-129 shows the L2VPN Discovery Topology.

Figure 4-129 L2VPN Discovery Topology

Logic (MPLS Core)

The following steps describe the logic that L2VPN Service Discovery uses to create Service Requests and populate the Repository for an MPLS core:


Step 1 Gets all POPs and parses their configuration files.

Step 2 Discovers the VCs between the POPs (a pseudo wire is discovered).

Step 3 Discovers the VLAN ID that maps to the VC for each POP.

Step 4 Gets all UNIs on each POP, which is associated with a VC tunnel endpoint, and the UNIs on the associated CLE (linked via trunk mode) that allows the VLAN ID to pass.

Step 5 If there is a pair of UNIs on each side of the CORE, which shares the same VC, an SR is discovered.


Logic (L2TPv3)

L2TPv3 service discovery can be performed from Inventory Manager as described in Start Service Discovery.

In the case of L2TPv3, the L2VPN Service Discovery uses the following steps to create Service Requests and populate the Repository:


Step 1 Gets all POPs and parses their configuration files.

Step 2 Looks for all ATM, Serial and MFR interfaces and gets all the VCs with L2TPv3 encapsulation (for ATM the VC is under the PVC).

Step 3 Sets the interface containing the VC statement as the UNI interface.


VPLS Service Discovery

This section contains the following sections:

Topology

Restrictions

Topology

VPLS Discovery:

Discovers only full-mesh VPLS topologies.

Creates all Service Requests in the PENDING state.

Creates a VPN with the name of the VPN Id for the discovered VPLS SR.

Figure 4-130 shows an MPLS core topology to help demonstrate how VPLS Service Discovery creates an SR and associates it with a VPN link.

Figure 4-130 MPLS Network

Logic

The following steps describe the logic L2VPN Service Discovery uses to create Service Requests and populate the Repository:


Step 1 Discovers virtual links that are associated with the same VPN ID among PEs across the MPLS core.

Step 2 Discovers trunk links between the PE and its associated CLEs the same way as in L2VPN.


Restrictions

Due to the existing VPLS Policy Types, VPLS Discovery has the following limitations:

Only EWS with CE and ERS with CE, or EWS without CE and ERS without CE types of topologies can be discovered.

EWS or ERS with a combination of CE and no CE cannot be discovered.

Service Requests cannot be created for the above topologies.

Ring Topology Discovery (Connection Discovery)

Connection Discovery can discover ring topology NPCs. A ring of NPCs is a group of physical links that form a loop between the logical CLE devices.

Figure 4-131 shows an sample ring topology.

Figure 4-131 Sample Ring Topology