The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
Book Contents Book ContentsCisco Prime Infrastructure 3.10 User Guide
This chapter contains the following topics:
Prime Infrastructure provides a number of out-of-the-box configuration templates that you can use to make changes on your network devices. Those are described in Create a New Features and Technologies Template Using an Existing Template.
If you have sufficient privileges, you can also create new templates that meet the exact needs of your environment, and then make those templates available for others to use. You can make the templates as simple or as complex as needed, including grouping multiple templates together into a composite template. Finally, you can associate templates with particular devices by creating configuration groups.
Prime Infrastructure provides out-of-the-box CLI commands that you can use in your templates. It also provides a blank CLI template you can use to create new CLI commands. You can use them singly or with other commands in a composite template.
How you use configuration templates can depend on factors such as how large your network is, the number of designers in your organization, and how much variation there is among devices configuration. For example:
Cisco Prime Infrastructure provides the following types of feature-level configuration templates:
Features and Technologies templates are templates that are based on device configuration and that focus on specific features or technologies in a device’s configuration.
When you add a device to Prime Infrastructure , Prime Infrastructure gathers the device configuration for the model you added. Prime Infrastructure does not support every configurable option for all device types. If Prime Infrastructure does not have a Features and Technologies template for the specific feature or parameter that you want to configure, create a CLI template.
Features and Technologies templates simplify the deployment of configuration changes. For example, you can create an SNMP Features and Technologies template and then quickly apply it to devices you specify. You can also add this SNMP template to a composite template. Then later, when you update the SNMP template, the composite template in which the SNMP template is contained automatically has your latest changes.
To create Features and Templates, follow these steps:
Choose Configuration > Templates > Features and Technologies .
In the Features and Technologies menu on the left, choose a template type to create.
Complete the fields for that template.
If you are creating a feature template that applies only to a particular device type, the Device Type field lists only the applicable device type, and you cannot change the selection. Specifying a device type helps you to prevent a mismatch; that is, you cannot create a configuration and apply the configuration to a wrong device.
Click Save as New Template . After you save the template, apply it to your devices.
To verify the status of a template deployment, choose Administration > Dashboard > Jobs Dashboard .
To modify the deployment parameters for any subsequent configuration template deployments, select a configuration job, then click Edit Schedule .
Before you create a CLI template, you must:
Use templates to define a set of reusable device configuration commands. A description of CLI templates and how you can use them is displayed in the web GUI when you choose Configuration > Templates > Features & Technologies , then choose CLI Templates .
If you want to edit a template that is provided with Cisco Prime Infrastructure , make a copy of the template, give it a new name, and then edit it. See Create a New CLI Configuration Template Using An Existing Template.
Templates that you create are stored under My Templates .
Choose Configuration > Templates > Features & Technologies .
Expand CLI Templates , then choose CLI .
Complete the required fields in Templates Basic area.
Click the Ports radio button, if you want to apply the template to a set of selected interfaces across selected devices
In the Template Detail area, configure the following:
Save your template. Click Save as New Template , specify the folder (in My Templates ) in which you want to save the template, then click Save .
The easiest way to create a new configuration template is to find a similar existing template, copy it, and edit it. You can also use this procedure to edit templates that you created. (You can only edit templates that you create.)
Choose Configuration > Templates > Features & Technologies .
Expand CLI Templates , then choose System Templates - CLI .
In the Template navigation panel on the left , locate the template you want to copy, hover your mouse cursor over the i icon that is displayed next to the template name, then click Duplicate in the popup window.
In the Duplicate Template Creation dialog, specify a name and the folder (under My Templates ) where you want the new template to be saved, and click OK .
For example, if you copy a template that resides under CLI Templates > System Templates - CLI , by default the template is saved under My Templates > CLI Templates > System Templates - CLI (User Defined) My Templates > CLI Templates (User Defined) > System Templates - CLI (User Defined) .
Add the validation criteria and CLI content as described in Create a New CLI Configuration Template Using a Blank Template .
The devices in these regions must have an assigned location attribute.
If the four groups, North Region, South Region, East Region, and West Region, have not been created:
The devices for the new group appear under Device Work Center > User Defined > North .
To deploy the password template:
After the job has run, choose Administration > Dashboards > Job Dashboard to view the status of the job.
These topics provide information that will help you when entering variables into a template:
Table 1 lists data types that you can configure in the Manage Variables page.
Data Type
Description
Enables you to create a text box for CLI templates. To specify a validation expression and a default value, expand the row and configure the Default Value and Validation Expression fields.
Enables you to create a text box that accepts only numeric value. If you want to specify a range for the integer, expand the row and configure the Range From and To fields. To specify a validation expression and a default value, expand the row and configure the Default Value and Validation Expression fields.
Enables you to specify a database type. See the Manage Database Variables in CLI Templates.
Enables you to list the device specific values based on DB Query. To specify value, expand the row and configure the Value field (with a comma-separated value for multiple lists which appears in the UI)
Enables you to create a text box that accepts only IPv4 addresses for CLI templates. To specify a validation expression and a default value, expand the row and configure the Default Value and Validation Expression fields.
Enables you to create a list for CLI templates. To specify a validation expression and a default value, expand the row and configure the Default Value field (with a comma-separated value for multiple lists which appears in the UI). To specify value, expand the row and configure the Value field (with a comma-separated value for multiple lists which appears in the UI).
Enables you to create a check box for CLI templates.
To specify a validation expression and a default value, expand the row and configure the Default Value field. To specify a default value, expand the row and configure the Default Value field.
Enables you to create a radio button for CLI templates. To specify a validation expression and a default value, expand the row and configure the Default Value field. To specify a value, expand the row and configure the Value field (with a comma-separated value for multiple lists which appears in the UI).
Enables you to create a text area which allows multiline values for CLI templates. To specify a validation expression and a default value, expand the row and configure the Default Value and Validation Expression fields.
You can use database (DB) variables for the following reasons:
For example, if you want to create a CLI template to shut down all interfaces in a branch, create a CLI template that contains the following commands:
#foreach ($interfaceName in $interfaceNameList) interface $interfaceName shutdown #end
where $interfaceNameList is the database variable type whose value will be retrieved from the database. $interfaceNameList has a default value of IntfName. You need to create the interfaceNameList variable as DB data type (using the managed variable dialog box) and add set the default to IntfName. If you have not specified a default value, you can specify it when you apply the CLI template.
To populate interfaceNameList with the value from the database, you must create a properties file to capture the query string and save it in the /opt/CSCOlumos/conf/ifm/template/inventoryTagsInTemplate folder.
To view the predefined DB variables go to the following path:
After you create and apply the CLI template and the property file, the following CLI is configured on the devices. This output assumes that the device has two interfaces (Gigabitethernet0/1 and Gigabitethernet0/0):
interface GigabitEthernet0/0 shutdown interface GigabitEthernet0/1 shutdown
The values that you define in the Validation Expression are validated with the associated component value. For example, if you enter a default value and a validation expression value in the design flow, this will be validated during the design flow. That is, if the default value does not match with the entered value in the validation expression, you will encounter a get error at the design flow.
For example, choose Configuration > Templates > Features and Technologies , then choose CLI Templates > CLI . In the Template Detail area, click the Add Variable tab to view the list of Variables. Click the Add plus sign (+) in the Add Variables tab to add a row to the CLI template. Choose String in the Type field, enter the remaining values, and click Save . From the list of variables, expand the details of this new variable and configure the regular expression, which will not allow a space in that text box. Enter the following expression in the Validation Expression field.
Default value (optional)—ncs
The value should match with regular expression in the validation expression field.
Save the template, and then select a device. Try to enter a space in the text field. You will encounter a regular expression error.
To enter multi-line commands in the CLI Content area, use the following syntax:
First Line of Multiline Command Second Line of Multiline Command . . Last Line of Multiline Command
banner_motd Welcome to Cisco. You are using Multi-line commands.
banner motd ~ $
where is a multi-line input variable.
Prime Infrastructure does not support multi-line banner commands. You can use banner file xyz format as shown in the following example.
#conf t Enter configuration commands, one per line. End with Ctrl-Z. (config)#parameter-map type webauth global (config-params-parameter-map)# type webauth (config-params-parameter-map)#banner file tftp://209.165.202.10/banner.txt (config-params-parameter-map)#^Z #more tftp://192.168.0.0/banner.txt Disclaimer: Usage of this wireless network is restricted to authorized users only. Unauthorized access is strictly forbidden. All accesses are logged and can be monitored. #
Use this syntax to add enable mode commands to your CLI templates:
#MODE_ENABLE>#MODE_END_ENABLE
These topics explain how to export and import configuration templates. Templates can be exported templates have an .xml file name; multiple templates are exported as a zip file.
Choose Configuration > Templates > Features & Technologies. > Templates > Features & Technologies.
To export a configuration template:
To import a configuration template:
All out-of-the-box and user-created templates can be added to a single composite template, which aggregates all of the individual feature templates that you need. When you create a composite template, you can also specify the order in which member templates should be executed. You can use composite templates to make changes to single or groups of devices.
Choose Configuration > Templates > Features & Technologies .
Expand the Composite Templates folder and choose Composite Templates .
In the Template Basic area, enter a name for the template.
In the Template Detail area, choose the templates to include in the composite template. Using the arrows, place the templates in the in the order in which they should be deployed to the devices. For example, to create an ACL and associate it with an interface, put the ACL template first, followed by the interface template.
Click Save as New Template . After you save the template, and apply it to your devices (see Deployment Flow for Composite Templates Using the Wizard ).
When you apply a tag to a template, the template is listed under the My Tags folder. Tagging a configuration template helps you:
To tag an existing template, follow these steps:
Choose Configuration > Templates > Features & Technologies .
Expand the My Templates folder and choose the template that you want to tag.
Enter a tag name in the Tag as text box, then click Save .
These topics describe the ways you can deploy (run) groups of commands on devices using configuration templates:
If you have devices that require the same configuration, you can create a configuration group that contains devices and templates that can be applied to those devices. Creating a configuration group allows you to quickly apply new templates without remembering to which devices the new templates should be deployed.
Composite templates allow you to group smaller templates together, but configuration groups specify the relationship between the templates and the groups of devices, and the order in which commands are executed.
Choose Configuration > Templates > Configuration Groups .
In the Configuration Group Basic area, enter a name.
To display devices from which you can make selections, in the Template Selection area, add one or more templates by clicking Add and selecting the templates. This also populates the Device Type field.
Add additional templates by clicking Add in the Template Selection area. You cannot choose templates that are mutually-exclusive; for example, you cannot choose Add-Host-Name-IOS and Add-Host-Name-IOS-XR.
Select the devices on which you want to deploy the template, then click Next to choose the input option. You can click the Select toggle button to choose the devices By Group option.
In the Device Selection area, select the devices you want to add to the configuration group.
If you have multiple templates, the order in which templates will be listed by selecting one and clicking the up or down arrow.
Click Save as New Configuration Group .
This deployment flow is not applicable for Controller based templates.
After you create a configuration group, click Deploy . The Template Deployment -Prepare and Schedule wizard page opens.
In the Templates area, view the templates that are added in the configuration group.
In the Deployed on Devices area and during creation of Configuration Group, view the devices that you have chosen during creation of configuration group.
In the Value Assignment area, from the Select Template drop-down list, choose a CLI template and an appropriate device. You can view the device details on which the template is going to be deployed, CLI Preview details, and so on. Click Apply .
(Optional) Schedule the deployment job in the Schedule area:
In the Summary area, view the summary of the deployment.
Click OK to deploy the template.
Click Job Status in the pop-up dialog box to launch the Job Dashboard to view the status of the job.
After creating the CLI template, click Deploy . The Deployment Wizard page opens.
Select the devices on which you want to deploy the template from the Add devices table. The selected devices appear in the Devices to deploy table. You can click the Select toggle button to choose the devices from By Group option.
Click Next to choose the input option.
Select the mode in which you want to deploy the template. The options are Work Flow and Export/Import CSV .
Click the Work Flow option and click Next . See Step 6 .
Alternately, click Export/Import CSV option, to update all the template properties for the selected devices using the CSV Export/Import mechanism.
In the Input Values tab, you can toggle between Form and CLI view. Configure the following in the Input Values tab:
Note | For profile management, Fault-Profile-Definition and Fault-Profile-Apply templates are available. While deploying these templates, in the Input Values window you must enter the applicable fault tags for the selected fault type from the reference table. |
If the validation is successful, then the border of the circle around the selected template changes to green.
Note | The successful validation message means that the change has been applied only to the selected devices in the workflow. To complete the configuration, perform the remaining steps in the procedure. |
After entering the necessary configuration values, click Next or CLI to confirm the device and template configuration values.
Schedule the deployment job using Schedule Deployment tab, if necessary:
Click Next to view the job deployment summary.
On the Deployment Summary tab, you can see the CLI view o each device.
Click Finish to deploy the template.
Click Job Status in the pop-up dialog box to launch the Job Dashboard to view the status of the job.
The SG220 device does not support any of the configuration template deployments whereas the SG300 and SG500 devices support CLI template deployment. However, both the SG300 and SG500 devices support only the following system CLI templates.
You can also push a template-based configuration (user-defined template or system-defined template) to devices by choosing Inventory > Device Management > Configuration Archive > Devices/Archives > Deploy Config .
An interactive command contains the input that must be entered following the execution of a command.
To enter an interactive command in the CLI Content area, use the following syntax:
CLI Commandinteractive question 1command response 1 interactive question 2command response 2
where and tag are case-sensitive and must be entered as uppercase.
#INTERACTIVE crypto key generate rsa general-keys yes/no no #ENDS_INTERACTIVE
You must replace the tag with the tag for any interactive questions in which the default or newline character is not required in the command for any of the controller devices. For example,
#INTERACTIVE transfer download start y/Nyy/Ny #ENDS_INTERACTIVE
The tag utilizes regular expressions for interactive questions. You must use the valid regular expressions for matching patterns.
Format #INTERACTIVE commandsinteractive questionresponse #ENDS_INTERACTIVE
Example for invalid content used in interactive question #INTERACTIVE save configAre you sure you want to save? (y/n)y #ENDS_INTERACTIVE
Using the Question Mark "?" in between is invalid and does not match the pattern.
Example for valid content used in interactive question #INTERACTIVE save config(y/n)y #ENDS_INTERACTIVE
Use this syntax to combine interactive Enable Mode commands:
#MODE_ENABLE #INTERACTIVE commandsinteractive questionresponse #ENDS_INTERACTIVE #MODE_END_ENABLE
#MODE_ENABLE #INTERACTIVE mkdir Create directoryXXX #ENDS_INTERACTIVE #MODE_END_ENABLE
This is an example of an interactive command that contains multiple lines:
#INTERACTIVE macro name EgressQoSEnter macromls qos trust dscp wrr-queue queue-limit 10 25 10 10 10 10 10 wrr-queue bandwidth 1 25 4 10 10 10 10 priority-queue queue-limit 15 wrr-queue random-detect 1 wrr-queue random-detect 2 wrr-queue random-detect 3 wrr-queue random-detect 4 wrr-queue random-detect 5 wrr-queue random-detect 6 wrr-queue random-detect 7 wrr-queue random-detect max-threshold 1 100 100 100 100 wrr-queue random-detect min-threshold 1 80 100 100 100 wrr-queue random-detect max-threshold 2 100 100 100 100 wrr-queue random-detect min-threshold 2 80 100 100 100 wrr-queue random-detect max-threshold 3 80 90 100 100 wrr-queue random-detect min-threshold 3 70 80 90 100 wrr-queue random-detect min-threshold 4 70 80 90 100 wrr-queue random-detect max-threshold 4 80 90 100 100 wrr-queue random-detect min-threshold 5 70 80 90 100 wrr-queue random-detect max-threshold 5 80 90 100 100 wrr-queue random-detect min-threshold 6 70 80 90 100 wrr-queue random-detect max-threshold 6 80 90 100 100 wrr-queue random-detect min-threshold 7 60 70 80 90 wrr-queue random-detect max-threshold 7 70 80 90 100 @ #ENDS_INTERACTIVE
Choose Configuration > Templates > Features & Technologies > Composite Templates > Composite Templates .
Enter the required information in the Template Basic section.
In the Template Detail section, choose the templates to include in the composite template, and click Save as New Template .
After creating the composite template, click Deploy . The Deployment wizard page opens.
Select the devices on which you want to deploy the template. You can click the Select toggle button to choose the devices By Group option, then click Next .
Click Next to choose the input option.
Select the mode in which you want to deploy the template. The options are Work Flow and Export/Import CSV .
Click the Work Flow option and click Next . See Step 6.
Alternately, click Export/Import CSV option, to update all the template properties for the selected devices using the CSV Export/Import mechanism.
In the Input Values tab, you can toggle between Form and CLI view. Configure the following in the Input Values tab:
After entering the necessary configuration values, click Next or CLI to confirm the device and template configuration values.
Schedule the deployment job using Schedule Deployment tab, if required:
Click Next to view the job deployment summary.
On the Deployment Summary tab, you will see the CLI view for each of the device.
Click Finish to deploy the template.
Click Job Status in the pop-up dialog box to launch the Job Dashboard to view the status of the job.
Once a template is saved, it can be deployed (run on) devices. You can deploy a template from the Configuration > Templates > Features & Technologies navigation area, or by using Configuration Groups, which is launched from Configuration > Templates > Configuration Groups (see Create Configuration Groups for Deploying Templates to Groups of Devices).
To deploy a customized or system template from the Features & Technologies navigation area:
Choose Configuration > Templates > Features & Technologies
Expand the drawer that contains the template(s) you want to deploy.
Choose the templates you want to deploy, and click Deploy .
In the Template Deployment window, check the settings and schedule and click OK .
This section describes how to add and apply wireless templates. Templates allow you to set fields that you can then apply to multiple devices without having to reenter the common information.
The controller templates provides access to all Prime Infrastructure templates from a single page. You can add and apply controller templates, view templates, or make modifications to the existing templates. This section also includes steps for applying and deleting controller templates and creating or changing access point templates.
To access the controller templates, choose Configuration > Templates > Features & Technologies > Features and Technologies > Controller .
To create Features and Templates, follow these steps:
Choose Configuration > Templates > Features & Technologies > Controller > Controller Template .
Hover your mouse cursor over the tool tip next to the template type and click New to create the template.
Complete the required fields.
If you are creating a feature template that applies only to a particular device type, the Device Type field lists only the applicable device type, and you cannot change the selection. Specifying a device type helps you to prevent a mismatch; that is, you cannot create a configuration and apply the configuration to a wrong device.
Click Save as New Template . After you save the template, apply it to your devices.
To verify the status of a template deployment, choose Administration > Dashboard > Jobs Dashboard .
To modify the deployment parameters for any subsequent configuration template deployments, select a configuration job, then click Edit Schedule .
To add a new controller template:
Choose Configuration > Features & Technologies > Controller .
Select the template you want to add.
Enter the template name.
Template Name is the unique key used to identify the template. A template name is mandatory to distinguish between two templates that have identical key attributes.
Provide a description of the template.
To delete a controller template:
Choose Configuration > Features & Technologies > My Templates .
Select the template(s) you want to delete, then click Delete .
Click OK to confirm the deletion. If this template is applied to controllers, the Remove Template Confirmation page opens and lists all controllers to which this template is currently applied.
Select the check box of each controller from which you want to remove the template.
Click OK to confirm the deletion or Cancel to close this page without deleting the template.
You can apply a controller template directly to a controller or to controllers in a selected configuration group.
To apply a controller template, follow these steps:
Choose Configuration > Features & Technologies > Controller .
From the left sidebar menu, choose the category of templates to apply.
Click the template name for the template that you want to apply to the controller.
Click Apply to Controllers to open the Apply to Controllers page.
Select the check box for each controller to which you want to apply the template.
To select all controllers, select the check box that appears at the left most corner of the controllers table.
Select the Ignore errors on Apply template to Controllers check box to ignore errors and apply all commands in the template to the controller. If this check box is not selected, any errors encountered while applying a command in the template to a controller causes the rest of the commands to be not applied.
Choose between applying the template directly to a controller or to all controllers in a selected configuration group.
To apply the template directly to a controller (or controllers), follow these steps:
To apply the template to all controllers in a selected configuration group, follow these steps:
You can perform the following additional operations:
This configuration results can be viewed in the Template Results page by enabling the View Save Config / Reboot Results option.
You can apply some templates directly from the Template List page. Select the check box(es) of the template(s) that you want to apply, choose Apply Templates from the Select a command drop-down list, and click Go to open the Apply to Controllers page. Select the check box(es) of the controllers to which you want to apply this template, and click OK .
When a client tries to associate with a WLAN, it is possible to determine the client type from the information received in the process. The controller acts as the collector of the information and sends the ISE with the required data in an optimal form.
Follow these guidelines when configuring client profiling:
By default, client profiling will be disabled on all WLANs.
To configure client profiling, follow these steps:
Choose Configuration > Templates > Features & Technologies > Controller > WLANs > WLAN Configuration.
Click the Advanced tab.
Select the DHCP Profiling check box to enable DHCP profiling.
Select the HTTP Profiling check box to enable HTTP profiling.
HTTP client profiling is supported since controller Version 7.3.1.31.
See the section Controller >WLANs > WLAN Configuration > Advanced in Cisco Prime Infrastructure Reference Guide
Mobile Concierge is a solution that enables 802.1X capable clients to interwork with external networks. The Mobile Concierge feature provides service availability information to clients and can help them to associate available networks.
The services offered by the network can be broadly classified into two protocols:
The following guidelines and limitations apply to Mobile Concierge:
To configure Mobile Concierge (802.11u) groups:
Choose Configuration > Templates > Features & Technologies > Controller > WLANs > WLAN Configuration.
Click the Hot Spot tab.
Complete the required fields on the following tabs:
Click Save as New Template.
Site-specific VLANs or AP groups limit the broadcast domains to a minimum by segmenting a WLAN into different broadcast domains. Benefits include more effective management of load balancing and bandwidth allocation.
To configure WLAN AP Groups, follow these steps:
Choose Configuration > Templates > Features & Technologies > Controller > WLANs > AP Groups.
The WLAN > AP Groups page appears, and the number of controllers and virtual domains that the template is applied to automatically populates. The last column indicates when the template was last saved.
The Applied to Controllers number is a link. Clicking the number opens an Applied to Controllers page, which displays the controller name and IP address to which that template is applied, as well as the time it was applied and its status. The Applied to Virtual Domains number is also a link. Clicking this link opens an Applied to Virtual Domains page that shows all partition names.
If you want to add a new template, choose Add Template from the Select a command drop-down list, and click Go . To modify an existing template, click the template name. The AP Groups template page appears.
This page displays a summary of the AP groups configured on your network. In this page, you can add, remove, edit, or view details of an AP group. Click in the Edit column to edit its access point(s). Select the check box in the WLAN Profile Name column, and click Remove to delete WLAN profiles.
To delete an access point group, follow these steps:
Choose Configuration > Templates > Features & Technologies.
You can create or modify a template for dividing the WLAN profiles into AP groups.
Choose Configuration > Templates > Features & Technologies > Controller > WLANs > AP Groups.
Choose Add Template from the Select a command drop-down list, and click Go .
Enter a name and group description for the access point group. The group description is optional.
If you want to add a WLAN profile, click the WLAN Profiles tab and configure the following fields:
If you want to add a RF profile, click the RF Profiles tab, and configure the following fields:
See the section Controller > 802.11 > RF Profiles in Cisco Prime Infrastructure Reference Guide
Choose Configuration > Features and Technologies > Controller > WLANs > WLAN Configuration .
In the Template Basic area, fill the requisite details..
In the General tab in Template Detail area, check the Wired LAN checkbox to enable it.
Select Remote LAN from the LAN Type dropdown menu.
Enter the Profile Name .
Select the Admin Status checkbox to enable it.
Save the settings.
Deploy the template.
Choose Configuration > Features and Technologies > Controller > WLANs > AP Groups .
Enter the requisite details in the Template Basic area (if creating a new template).
Click WLAN Profile and then click Add .
Select the WLAN Profile and the Interface or Interface group from their respective dropdown menus.
Select the RLAN from the drop down menu adjacent Port number.
Deploy the template.
You can click the Users configured in the group link that appears when the FlexConnect Local Authentication check box is enabled to view the list of FlexConnect users. You can create FlexConnect users only after you save the FlexConnect AP Group.Maximum 100 FlexConnect users are supported in controller Release 5.2.x.x and later. If controller Release 5.2.0.0, and earlier supports only 20 FlexConnect users.
To delete a FlexConnect User, choose a user from the FlexConnect Users list, and then click Delete .
To configure a FlexConnect user, follow these steps:
Choose Configuration > Features & Technologies > Controller > FlexConnect >FlexConnect AP Groups .
Hover the mouse on FlexConnect AP Groups and select Show All Templates .
Click the Local Authentication tab and select the FlexConnect Local Authentication check box to enable local authentication for this FlexConnect group.
Click the Users configured in the group link. The FlexConnect Users page appears.
If you want to add a new user, choose Add User from the Select a command drop-down list, and click Go . The Add User page appears.
In the User Name text box, enter the FlexConnect username.
In the Password text box, enter the password.
Reenter the password in the Confirm Password text box.
See the section Controller > FlexConnect > FlexConnect AP Groups in Cisco Prime Infrastructure Reference Guide.
The Policy Configuration Templates page enables you to configure the device-based policies on the controller. You can configure policies for a user or a device on the network. The maximum number of policies that you can configure is 64. Policies are not applied on WLANs and AP groups if AAA override is configured on the controller.
To configure Policy Configuration templates:
Choose Configuration > Templates > Features &Technologies > Controller > WLANs > Policy Configuration .
If you want to add a new template, choose Add Template from the Select a command drop-down list, and click Go .
Configure the required fields.
Click Save as New Template .
To add a new template with general security information for a controller, follow these steps:
Choose Configuration > Templates > Features & Technologies > Controller > Security .
Choose AAA > General - AAA from the left sidebar menu.
Click New beside the template you want to add.
Configure the following fields:
The template appears in the Template List page. In the Template List page, you can apply this template to controllers.
You can add a RADIUS authentication template or make modifications to an existing template. After these server templates are configured, controller users who log into the controller through the CLI or GUI are authenticated.
See the section Controller > Security > AAA > RADIUS Auth Servers inCisco Prime Infrastructure Reference Guide.
To add and configure a RADIUS TACACS Fallback template or modify an existing template, follow these steps:
Choose Configuration > Templates > Features & Technologies > Controller > Security > AAA > RADIUS TACACS+ Fallback .
From the Radius Fallback group box, configure the following:
From the TACACS Fallback group box, configure the following:
Click Save as New Template .
This page allows you to specify a timeout value for local EAP. You can then add or make changes to an existing local EAP general template.
If any RADIUS servers are configured on the controller, the controller tries to authenticate the wireless clients using the RADIUS servers first. Local EAP is attempted only if no RADIUS servers are found, either because the RADIUS servers timed out or no RADIUS servers were configured. If four RADIUS servers are configured, the controller attempts to authenticate the client with the first RADIUS server, then the second RADIUS server, and then local EAP. If the client attempts to then reauthenticate manually, the controller tries the third RADIUS server, then the fourth RADIUS server, and then local EAP.
You can specify the order that LDAP and local databases use to retrieve user credential information. This page allows you to add or make modifications to an existing network user credential retrieval priority template.
Choose Configuration > Templates > Features & Technologies > Controller > Security > Local EAP > Network Users Priority .
Use the left and right arrow keys to include or exclude network user credentials in the right page.
Use the up and down keys to determine the order credentials are tried.
With this template, you can store the credentials (username and password) of all the local network users. These credentials are then used to authenticate the users. For example, local EAP might use the local user database as its back end database to retrieve user credentials. This page allows you to add or make modifications to an existing local network user template. You must create a local net user and define a password when logging in as a web authentication client.
To configure a Local Network Users template, follow these steps:
Choose Configuration > Templates > Features & Technologies > Controller > Security > AAA > Local Net Users .
Click Import CSV to import from a file, then click Browse to navigate to the file. Then continue to Step 6. If you disable the import, continue to Step 3.
Only CSV file formats are supported.
Prime Infrastructure reads data from the second row onwards. The first row in the file is treated as the header and the data is not read by Prime Infrastructure . The header can either be blank or filled.
Enter the following details:
The Profile column if left blank (or filled in with any profile ) means a client on any profile can use this account.
Use the drop-down list to choose the SSID which this local user is applied to or choose the any SSID option.
Enter a user-defined description of this interface.
You can set the maximum number of concurrent logins that each single user can have.
To add a user login template or make modifications to an existing template, follow these steps:
Choose Configuration > Templates > Features & Technologies > Controller > Security > User Login Policies .
Enter the maximum number of concurrent logins each single user can have.
Click Save as New Template .
To add a MAC filter template or make modifications to an existing template, follow these steps:
Choose Configuration > Templates > Features & Technologies > Controller > Security > AAA > MAC Filtering or choose Security > MAC Filtering .
Click Import CSV to import a file containing access point MAC addresses.
Enter the desired file path or click Browse to import the file.
The import file must be a CSV file with MAC address, profile name, interface, and description (such as 00:11:22:33:44:55, Profile1, management, test filter). If you disable the Import from File check box, continue to step 4.
The client MAC address appears.
Choose the profile name to which this MAC filter is applied or choose the Any Profile option.
Use the drop-down list to choose from the available interface names.
Enter a user-defined description of this interface.
Click Save as New Template .
You cannot use MAC address in the broadcast range.
These templates are devised for Cisco 11xx/12xx series access points converted from Cisco IOS to lightweight access points or for 1030 access points connecting in bridge mode. See the Cisco Mobility Services Engine Configuration Guide for further information.
To add a MSE authorization template or make modifications to an existing template, follow these steps:
Choose Configuration > Templates > Features & Technologies > Controller > Security > AAA > AP or MSE Authorization.
Click Import CSV to import a file containing access point MAC addresses.
You can only import a CSV file. The file format parallels the fields in the GUI and therefore includes access point base radio MAC, Type, Certificate Type (MIC or SSC), and key hash (such as 00:00:00:00:00:00, AP, SSC, xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx). No other file formats are not supported.
Enter the desired file path or click Browse to import the file.
Click Save As New Template .
You cannot use MAC address in the broadcast range.
This page allows you to add a manually disable client template or make modifications to an existing disabled client template.
Choose Configuration > Templates > Features & Technologies > Controller > Security > Manually Disable Clients .
Enter the MAC address of the client you want to disable.
Enter a description of the client you are setting to disabled.
Click Save as New Template .
You cannot use a MAC address in the broadcast range.
To add a client exclusion policies template or modify an existing client exclusion policies template, follow these steps:
Choose Configuration > Templates > Features & Technologies > Controller > Security > Wireless Protection Policies > Client Exclusion Policies .
Complete the following fields:
Click Save as New Template
Management Frame Protection (MFP) provides for the authentication of 802.11 management frames by the wireless network infrastructure. Management frames can be protected to detect adversaries who are invoking denial of service attacks, flooding the network with associations and probes, interjecting as rogue access points, and affecting the network performance by attacking the QoS and radio measurement frames.
When enabled, the access point protects the management frames it transmits by adding a message integrity check information element (MIC IE) to each frame. Any attempt to copy, alter, or replay the frame invalidates the MIC, causing any receiving access point configured to detect MFP frames to report the discrepancy. An access point must be a member of a WDS to transmit MFP frames.
When MFP detection is enabled, the access point validates every management frame that it receives from other access points in the network. It ensures that the MIC IE is present (when the originator is configured to transmit MFP frames) and matches the content of the management frame. If it receives any frame that does not contain a valid MIC IE from a BSSID belonging to an access point that is configured to transmit MFP frames, it reports the discrepancy to the network management system.
To add or make modifications for the access point authentication and management frame protection (MFP) template, follow these steps:
Choose Configuration > Templates > Features & Technologies > Controller > Security > Wireless Protection Policies > AP Authentication and MFP .
From the Protection Type drop-down list, choose one of the following authentication policies:
Alarm trigger threshold appears only when AP authentication is selected as a protection type. Set the number of hits from an alien access point to ignore before raising an alarm.
The valid range is from 1 to 255. The default value is 255.
Click Save as New Template .
With web authentication, guests are automatically redirected to a web authentication page when they launch their browsers. Guests gain access to the WLAN through this web portal. Wireless LAN administrators using this authentication mechanism should have the option of providing unencrypted or encrypted guest access. Guest users can then log into the wireless network using a valid username and password, which is encrypted with SSL. Web authentication accounts might be created locally or managed by a RADIUS server. The Cisco Wireless LAN controllers can be configured to support a web authentication client. You can use this template to replace the Web authentication page provided on the controller.
To add or make modifications to an existing web authentication template, follow these steps:
Choose Configuration > Templates > Features & Technologies > Security > AAA > Web Auth Configuration .
Choose one of the following web authentication type from the drop-down list.
Select the Logo Display check box if you want your company logo displayed.
Enter the title you want displayed on the Web Authentication page.
Enter the message you want displayed on the Web Authentication page.
Provide the URL where the user is redirected after a successful authentication. For example, if the value entered for this text box is http://www.example.com, the user would be directed to the company home page.
Click Save as New Template .
Before You Begin, follow these steps:
You can download a customized Web Authentication page to the controller. With a customized web page, you can establish a username and password for user web access.
When downloading customized web authentication, you must follow these strict guidelines:
Include scripts to decode the return status code.
Download the sample login.html bundle file from the server. The following figure displays .html file. The login page is presented to web users the first time they access the WLAN if web authentication is turned on.
Edit the login.html file and save it as a .tar or .zip file.
You can change the text of the Submit button to read Accept terms and conditions and Submit.
Make sure you have a Trivial File Transfer Protocol (TFTP) server available for the download. Keep these guidelines in mind when setting up a TFTP server:
Download the .tar or .zip file to the controller(s).
The controller allows you to download up to 1 MB of a .tar file containing the pages and image files required for the Web authentication display. The 1 MB limit includes the total size of uncompressed files in the bundle.
You can now continue with the download.
Copy the file to the default directory on your TFTP server.
Choose Configuration > Network > Network Devices > Wireless Controller .
Click on a Device Name. If you select more than one device, the customized Web authentication page is downloaded to multiple controllers.
From the left sidebar menu, choose System > Commands .
From the Upload/Download Commands drop-down list, choose Download Customized Web Auth, and click Go .
The IP address of the controller to receive the bundle and the current status are displayed.
Choose local machine from the File is Located On field. If you know the filename and path relative to the root directory of the server, you can also select TFTP server.
For a local machine download, either .zip or .tar file options exists, but Prime Infrastructure does the conversion of .zip to .tar automatically. If you chose a TFTP server download, only .tar files would be specified.
Enter the maximum number of times the controller should attempt to download the file in the Maximum Retries field.
Enter the maximum amount of time in seconds before the controller times out while attempting to download the file in the Timeout field.
The files are uploaded to the c:\tftp directory. Specify the local filename in that directory or click Browse to navigate to it.
If the transfer times out, you can simply choose the TFTP server option in the File Is Located On field, and the server filename is populated for you. The local machine option initiates a two-step operation. First, the local file is copied from the workstation of the administrator to the built-in TFTP server of Prime Infrastructure . Then the controller retrieves that file. For later operations, the file is already in the TFTP directory of Prime Infrastructure server, and the download web page now automatically populates the filename.
Click the Click here to download a sample tar file link to get an option to open or save the login.tar file.
After completing the download, you are directed to the new page and able to authenticate.
To create or modify an External Web Auth Server template, follow these steps:
Choose Configuration > Templates > Features & Technologies > Controller > Security > External Web Auth Server or choose Security > External Web Auth Server .
Enter the server address of the external web auth server.
Click Save as New Template .
To add or make modifications to an existing password policy template, follow these steps:
Choose Configuration > Templates > Features & Technologies > Controller > Security > Password Policy .
You can enable or disable the following settings:
You can apply a controller template directly to a controller or to controllers in a selected configuration group.
To apply a controller template, follow these steps:
Choose Configuration > Features & Technologies > Controller .
From the left sidebar menu, choose the category of templates to apply.
Click the template name for the template that you want to apply to the controller.
Click Apply to Controllers to open the Apply to Controllers page.
Select the check box for each controller to which you want to apply the template.
To select all controllers, select the check box that appears at the left most corner of the controllers table.
Select the Ignore errors on Apply template to Controllers check box to ignore errors and apply all commands in the template to the controller. If this check box is not selected, any errors encountered while applying a command in the template to a controller causes the rest of the commands to be not applied.
Choose between applying the template directly to a controller or to all controllers in a selected configuration group.
To apply the template directly to a controller (or controllers), follow these steps:
To apply the template to all controllers in a selected configuration group, follow these steps:
You can perform the following additional operations:
This configuration results can be viewed in the Template Results page by enabling the View Save Config / Reboot Results option.
You can apply some templates directly from the Template List page. Select the check box(es) of the template(s) that you want to apply, choose Apply Templates from the Select a command drop-down list, and click Go to open the Apply to Controllers page. Select the check box(es) of the controllers to which you want to apply this template, and click OK .
An access control list (ACL) is a set of rules used to limit access to a particular interface (for example, if you want to restrict a wireless client from pinging the management interface of the controller). ACLs can be applied to data traffic to and from wireless clients or to all traffic destined for the controller Central Processing Unit (CPU) and can now support reusable grouped IP addresses and reusable protocols. After ACLs are configured in the template, they can be applied to the management interface, the AP-manager interface, or any of the dynamic interfaces for client data traffic; to the Network Processing Unit (NPU) interface for traffic to the controller CPU; or to a WAN.
You can create or modify an ACL template by protocol, direction, and the source or destination of the traffic.
You can now create new mappings from the defined IP address groups and protocol groups. You can also automatically generate rules from the rule mappings you created. These rules are generated with contiguous sequence. That is, if rules 1 through 4 are already defined and you add up to 29 rules.
Existing ACL templates are duplicated into a new ACL template. This duplication clones all the ACL rules and mappings defined in the source ACL template.
This release of Prime Infrastructure provides support to IPv6 ACLs.
To add or modify an existing ACL template, follow these steps:
Choose Configuration > Templates > Features & Technologies > Controller > Security > Access Control Lists .
Complete the following fields:
Choose IP Groups from the left sidebar menu to create reusable grouped IP addresses and protocols.
Choose Add IP Group from the Select a command drop-down list and click Go to define a new IP address group.
One IP address group can have a maximum of 128 IP address and netmask combinations. To view or modify an existing IP address group, click the URL of the IP address group. The IP address group page opens.For the IP address of any, an any group is predefined.
Edit the following current IP group fields if required in the ACL IP Groups details page:
Choose Access Control > Protocol Groups from the left sidebar menu to define an additional protocol that is not a standard predefined one.
The protocol groups with their source and destination port and DSCP are displayed.
Choose Add Protocol Group from the Select a command drop-down list, and click Go to create a new protocol group. To view or modify an existing protocol group, click the URL of the group.
The Protocol Groups page appears.
Enter a name for a new rule. ACLs are not required to have rules defined. When a packet matches all the parameters of a rule, the action for this rule is exercised.
Choose one of the following protocols from the drop-down list:
Some protocol choices (such as TCP or UDP) cause additional Source Port and Dest Port GUI elements to appear.
Choose any or specific from the DSCP (Differentiated Services Code Point) drop-down list. If you choose specific, enter the DSCP (range of 0 to 255).
DSCP is a packet header code that can be used to define the quality of service across the Internet.
Choose the ACL template to which you want to map the new groups to define a new mapping. All ACL mappings appear on the top of the page, and all ACL rules appear on the bottom.
Choose Add Rule Mappings from the Select a command drop-down list. The Add Rule Mapping page appears.
Configure the following fields:
Click Add . The new mappings populate the bottom table.
Choose the mappings for which you want to generate rules, and click Generate . This automatically creates the rules.
You can create or modify a FlexConnect ACL template for configuring the type of traffic that is allowed by protocol, and the source or destination of the traffic. The FlexConnect ACLs do not support IPv6 addresses.
To configure and apply an Access Control List template to a Controller, follow these steps:
Choose Configuration > Templates > Features & Technologies > Controller > Security > FlexConnect ACLs .
Enter a name for the new FlexConnect ACL.
Click Save as New Template .
A FlexConnect ACL template is created. You can now create new mappings from the defined IP address groups and protocol groups. To define a new mapping, choose the ACL template to which you want to map the new groups. All FlexConnect ACL mappings appear on the top of the page, and all FlexConnect ACL rules appear in the bottom.
Click Add Rule Mappings , then configure the following fields in the FlexConnect ACL IP Protocol Map page:
Click Add . The new mappings populate the bottom table.
Choose the mappings for which you want to generate rules, and click Generate . This automatically creates the rules.
From the Select a command drop-down list in the FlexConnect ACL page, choose Apply Templates .
The Apply to Controllers page appears.
Select Save Config to Flash after apply check box to save the configuration to Flash after applying the FlexConnect ACL to the controller.
Select Reboot Controller after apply to reboot the controller once the FlexConnect ACL is applied. This check box is available only when you select the Save Config to Flash after apply check box.
Select one or more controllers and click OK to apply the FlexConnect ACL template.
The FlexConnect ACL that you created appears in Configure > Controller Template Launch Pad > IP Address > Security > Access Control > FlexConnect ACLs .
Manage Bulk Updation of FlexConnect Groups
To create multiple FlexConnect groups together as specified in the import file, follow these steps:
Click Configuration > Templates > Features & Technologies .
In the Templates pane on left, click Features and Technologies > Controller > FlexConnect > FlexConnect Bulk Update .
In Template Detail area, select Create FlexConnect Group from the Bulk Operation Type drop-down menu.
(Optional) Check the Overwrite checkbox to enable it.
If you enable overwrite, FlexConnect Group templates with a source configuration in the .csv file will overwrite any existing duplicate templates in your Prime Infrastructure database.
Click Choose File button to select your .csv file.
Click Upload to load the .csv file and trigger the process.
Creates new template with source template values
Creates new template with default values
Overwrites the existing template with source template values
Does not overwrite, as source template is not specified
Overwrites the existing template with source template values
Creates new template with default values
Does not create template, as it already exists and overwrite is not enabled
Does not create template, as it already exists and overwrite is not enabled
To add multiple users to FlexConnect groups together as specified in the import file, follow these steps:
Click Configuration > Templates > Features & Technologies .
In the Templates pane on left, click Features and Technologies > Controller > FlexConnect > FlexConnect Bulk Update .
In Template Detail area, select Add Users to FlexConnect Users .
(Optional) Check the Replace Existing Users checkbox to enable it.
If you enable this, all existing users will be replaced by new users as specified in the import file.
Click Choose File button to select your .csv file.
Click Upload to load the .csv file and trigger the process.
Based on the parameters chosen.the following table lists out scenarios and their expected results.Replace Existing Users
User Already Exists
Adds new user to the specified FlexConnect group
Does not add because the user already exists
Add new user to the specified FlexConnect group.
Replaces exixting user (if any) with the same username with one specified in the .csv file
To add ,multiple Access Points to FlexConnect groups together as specified in the import file, follow these steps:
Click Configuration > Templates > Features & Technologies .
In the Templates pane on left, click Features and Technologies > Controller > FlexConnect > FlexConnect Bulk Update .
In Template Detail area, select Add APs to FlexConnect Groups from the Bulk Operation Type drop-down menu.
(Optional) Check the Overwrite checkbox to enable it.
If you enable overwrite, FlexConnect Group templates with a source configuration in the .csv file will overwrite any existing duplicate templates in your Prime Infrastructure database.
Click Choose File button to select your .csv file.
Click Upload to load the .csv file and trigger the process.
Based on the parameters chosen. the following table lists out scenarios and their expected results.AP Associated to
Same FlexConnect Group
Retains AP in the same FlexConnect group
Different FlexConnect Group
Does not add AP, as it is associated to another FlexConnect group.
Adds AP to the FlexConnect group.
Same FlexConnect Group
Retains AP in the same FlexConnect group.
Different FlexConnect Group
Adds AP to the specified FlexConnect group and deletes it from the older FlexConnect group.
Adds AP to the FlexConnect group.
CPU ACL configuration with IPv6 is not supported in this release because all IP addresses of controllers on interfaces use IPv4 except the virtual interface. The existing ACLs are used to set traffic controls between the Central Processing Unit (CPU) and Network Processing Unit (NPU).
To add or modify an existing CPU ACL template, follow these steps:
Choose Configuration > Templates > Features & Technologies > Controller > Security > CPU Access Control List .
Select the check box to enable CPU ACL. When CPU ACL is enabled and applied on the controller, Prime Infrastructure displays the details of the CPU ACL against that controller.
From the ACL Name drop-down list, choose a name from the list of defined names.
From the CPU ACL Mode drop-down list, choose which data traffic direction this CPU ACL list controls. The choices are the wired side of the data traffic, the wireless side of the data traffic, or both wired and wireless.
Click Save as New Template .
Rogue templates enable you to configure the rogue policy (for access points and clients) applied to the controller. It also determines whether or not the Rogue Location Discovery Protocol (RLDP) is connected to the enterprise wired network.With RLDP, the controller instructs a managed access point to associate with the rogue access point and sends a special packet to the controller. If the controller receives the packet, the rogue access point is connected to the enterprise network. This method works for rogue access points that do not have encryption enabled.
There can be many rogues with very weak RSSI values that do not provide any valuable information in the rogue analysis. Therefore, you can use this option to filter the rogues by specifying the minimum RSSI value at which the APs should detect rogues.
Rogue access point rules allow you to define rules to automatically classify rogue access points. Cisco Prime Infrastructure applies the rogue access point classification rules to the controllers. These rules can limit the appearance of a rogue on maps based on RSSI level (weaker rogue access points are ignored) and time limit (a rogue access point is not flagged unless it is seen for the indicated period of time). Rogue access point rules also help reduce false alarms.
The new enhancements to the role classification rule are applicable for Cisco WLC 7.4 and later. These enhancements are not applicable to Catalyst 3850, Catalyst 3650, Catalyst 4500 switches, and Cisco 5760 WLAN Controllers (WLC).
To view current classification rule templates, rule type, and the number of controllers to which they are applied, choose Configuration > Templates > Features & Technologies > Controller > Security > Wireless Protection Policies > Rogue AP Rules .
Rogue classes include the following types:
To configure rogue rules on Cisco Prime Infrastructure , follow these steps:
See the section Controller > Security > Wireless Protection Policies > Rogue AP Rules in Cisco Prime Infrastructure Reference Guide.
A rogue access point rule group template allows you to combine more than one rogue access point rule to controllers. To view current rogue access point rule group templates or create a new rule group, follow these steps:
Choose Configuration > Templates > Features & Technologies > Controller > Security > Wireless Protection Policies > Rogue AP Rule Groups .
Enter a template name.
To add a Rogue AP rule, click to highlight the rule in the left column. Click Add to move the rule to the right column.
Rogue access point rules can be added from the Rogue Access Point Rules section.
To remove a rogue access point rule, click to highlight the rule in the right column. Click Remove to move the rule to the left column.
Use the Move Up/Move Down buttons to specify the order in which the rules apply. Highlight the desired rule and click Move Up or Move Down to move it higher or lower in the current list.
Click Save to confirm the rogue access point rule list.
Click Deploy to apply the rule group to the controller.
See View Deployed Rogue AP Rules and the section Controller > Security > Wireless Protection Policies > Rogue AP Rules in Cisco Prime Infrastructure Reference Guide.
You can view and edit the Rogue AP Rules that you previously deployed.
Choose Monitor > Network > Network Devices > Wireless Controllers .
Click on a Device Name, then select Security > Wireless Protection Policies > Rogue AP Rules .
Click on a Rogue AP Rule name to edit the rule.
To view Rogue AP alarms, click the Alarm Summary at the top right of the page, then select Rogue AP . You can also choose Dashboard > Wireless > Security to view Rogue AP information.
Keep the following guidelines in mind when using SIP Snooping:
To configure SIP Snooping for a controller, follow these steps:
Choose Configuration > Templates > Features & Technologies > Controller > 802.11 > SIP Snooping .
Configure the following fields:
If single port is to be used, configure both start and end port fields with same number.
Click Save as New Template .
You can create or modify the templates for the following management parameters of the controllers.
LyncSDN configuration is not supported on Virtual and Cisco 2500 Series and Virtual Controllers.
You can create these LyncSDN templates:
To create parameters to apply to devices using the LyncSDN Global Config feature, follow these steps:
Choose Configuration > Features & Technologies > Controller > LyncSDN > LyncSDN Global Config .
In the Template Basic area, enter a name, description, and tag for your template in the appropriate text boxes.
In the Validation Criteria area, choose a Device Type from the drop-down list and enter the OS Version.
In the Template Detail area, configure the following information:
When you are finished, click Save as Template .
To create parameters to apply to devices using the LyncSDN Policy feature, follow these steps:
Choose Configuration > Features & Technologies > Controller > LyncSDN > LyncSDN Policy .
In the Template Basic area, enter a name, description, and tag for your template in the appropriate text boxes.
In the Validation Criteria area, choose a Device Type from the drop-down list and enter the OS Version.
In the Template Detail area, configure the following information:
When you are finished, click Save as Template .
To create parameters to apply to devices using the LyncSDN Profile feature, follow these steps:
Choose Configuration > Features & Technologies > Controller > LyncSDN > LyncSDN Policy .
In the Template Basic area, enter a name, description, and tag for your template in the appropriate text boxes.
In the Validation Criteria area, choose a Device Type from the drop-down list and enter the OS Version.
In the Template Detail area, click the Wlan Profile check box and select a policy from the LyncSDN Policy drop-down list.
When you are finished, click Save as Template .
Application Visibility and Control (AVC) uses the Network Based Application Recognition (NBAR) deep packet inspection technology to classify applications based on the protocol they use. Using AVC, the controller can detect more than 1400 Layer 4 to Layer 7 protocols. AVC enables you to perform real-time analysis and create policies to reduce network congestion, costly network link usage, and infrastructure upgrades.
AVC is supported only on the following controllers:
To configure the AVC profile template, follow these steps:
Choose Configuration > Features & Technologies > Controller > Application Visibility And Control > AVC Profiles .
If you want to add a new template, hover the mouse on AVC Profiles and select New or click AVC Profiles . To modify an existing template, click the template name.
In the AVC Profile Name text box, enter the AVC Profile Name.
Under the AVC Rule List, click Add Row to create AVC rules.
The default action is to permit all applications.
Click Save as New Template .
NetFlow is a protocol that provides valuable information about network users and applications, peak usage times, and traffic routing. This protocol collects IP traffic information from network devices to monitor traffic. The NetFlow architecture consists of the following components:
To create NetFlow Monitor or Exporter template:
Choose Configuration > Templates > Features & Technologies > Controller > Netflow
If you want to crate a new Monitor template, hover the mouse cursor over the tool tip next to the Monitor template type and click New .
Complete the required fields and Click Save as New Template .
If you want to crate a new Exporter template, hover the mouse cursor over the tool tip next to the Exporter template type and click New .
Complete the required fields and Click Save as New Template .
Ethernet over GRE (EoGRE) enables tunneling of data traffic from Cisco WLC or Cisco AP to a mobile packet core using EoGRE tunnels.
To add or modify an EoGRE tunneling template, follow these steps:
Choose Configuration > Features & Technologies > Controller > Tunneling > EoGRE .
Hover your mouse cursor over the tool tip next to the template type and click New to create.
Complete the required fields, then and click Save as New Template, specify the folder in which you want to save the template, then click Save .
Click Deploy to save and deploy the template to the relevant controller.
To verify the status of a template deployment, choose Administration > Dashboards > Job Dashboard .
To modify the deployment parameters for any subsequent configuration template deployments, select a configuration job, then click Edit .
To configure a new Lightweight Access Point template, follow these steps:
Choose Configuration > Templates > Lightweight Access Points .
Choose Add Template from the Select a command drop-down list and click Go .
Enter a template name in the text box.
Enter a template description in the text box.
Click Save as New Template .
Based on the AP Source selection, the appropriate visualization is loaded on the AP Selection tab.
To select the AP Source:
Choose Configuration > Templates > Lightweight Access Points
Click the applicable Template Name link in the Lightweight Access Point page.
Click the AP Source tab and select the visualization:
To configure a new Autonomous Access Point template, follow these steps:
Choose Configuration > Templates > Autonomous Access Points .
From the Select a command drop-down list, choose Add Template .
Enter a Template Name.
Enter the applicable CLI commands.
Do not include any show commands in the CLI commands text box. The show commands are not supported.
You can configure the location template for a switch using the Switch Location Configuration template.
To configure a location template for a switch, follow these steps:
Choose Configuration >Templates > Switch Location .
The Switch Location Configuration template page appears.
From the Select a command drop-down list, choose Add Template , and click Go .
Complete the required fields in the New Template page.
When you migrate an already-managed autonomous access point to lightweight, its location and antenna information is migrated as well. You do not need to reenter the information. Cisco Prime Infrastructure automatically removes the autonomous access point after migration.
The Migration Analysis option does not run during discovery by default. If you prefer to run the migration analysis during discovery, choose Administration > Settings > CLI Session to enable this option.
Cisco Prime Infrastructure also supports the migration of autonomous access point to CAPWAP access point.
Choose Configuration > Templates > Autonomous AP Migration to access this page. To make a transition from an Autonomous solution to a Unified architecture, autonomous access points must be converted to lightweight access points. After an access point has been converted to lightweight, the previous status or configuration of the access point is not retained.
To create an autonomous AP migration template, follow these steps:
For More Information about the field descriptions refer to Cisco Prime Infrastructure Reference Guide
To view the Migration Analysis Summary, follow these steps:
Choose Configuration > Templates > Autonomous AP Migration .
Choose View Migration Analysis Summary from the Select a command drop-down list, and click Go . The Migration Analysis Summary page appears.
The autonomous access points are eligible for migration only if all the criteria have a pass status. A red X designates ineligibility, and a green checkmark designates eligibility. These columns represent the following:
After you create a configuration template, and click Deploy . The following tables shoes specify various deployment options as shown in
Displays the list of devices to which you want to apply the template.
By Device—List all the supported devices.
By Group (Device Types)—List only the supported device groups with supported devices.
By Group (Location, User Defined)—List all the device groups even if there are no supported devices. But, each group will list only the supported devices.
Search for By Group option will list only the group which contains the supported devices.
Allows you to specify a variable other than what was previously defined in the configuration template. Click a name, and the previously defined variables are displayed. To change any of the values, click the variable that you want to change, enter a new value, and click Apply .
You can also update the variables for all selected devices. Click All Selected Devices and update variables to apply the changes on all selected devices at the same time. If you want to update variables for a particular device in the list that need not be applicable to other devices, then choose the device and update its variables. All of the other devices will continue to use the variables that were previously defined except for the device for which variables are updated.
Allows you to create a meaningful deployment job name, then specify whether to run the job now or in the future.
You can also schedule the job to run periodically on hourly, daily, weekly, monthly or yearly basis.
The following job options are available:
Summarizes your deployment option selections.
After you create a configuration template, click Deploy . The Deployment wizard page opens.
Select the devices on which you want to deploy the template, then click Next to choose the input values.
In the Input Values tab, you can toggle between Form and CLI view.
After entering the necessary configuration values, click Next or click CLI to confirm the device and template configuration values.
Schedule the deployment job using Schedule Deployment tab, if required:
Click Next to view the job deployment summary.
On the Deployment Summary tab, you will see the CLI view for each of the device.
Click Finish to deploy the template.
Click Job Status in the pop-up dialog box to launch the Job Dashboard to view the status of the job.
The global user variables are variables which are accessible in all scripts. Each user variable must have a name that begins with gv. The name should begin with alphabets. Special characters allowed are dot appended with gv, hyphen and underscore.
You can create, delete or edit a global variable.
Choose Configuration > Templates > Global Variable.
From the Define Global Variable page, click Add Row .
Specify a name, description, type and display label.
Click Save to save the new variable.
The global variables created here can be applied while creating the CLI and Features and Technologies templates.
Related Topics
Policy objects enable you to define logical collections of elements. They are reusable, named components that can be used by other objects and policies. They also eliminate the need to define a component each time that you define a policy.
Objects are defined globally. This means that the definition of an object is the same for every object and policy that references it. However, many object types (such as interface roles) can be overridden at the device level. This means that you can create an object that works for most of your devices, then customize the object to match the configuration of a particular device that has slightly different requirements.
To improve efficiency and accuracy in your configuration templates, you can create shared policy objects to include in your configuration templates. You create interface roles or network objects that you can add to your configuration templates.
Interface roles allow you to define policies to specific interfaces on multiple devices without having to manually define the names of each interface. Interface roles can refer to any of the actual interfaces on the device, including physical interfaces, subinterfaces, and virtual interfaces such as loopback interfaces.
If you create an all-Ethernets interface role, you can define identical advanced settings for every Ethernet interface on the device with a single definition. You add this interface role to a configuration template, then deploy the template to the selected devices to configure the Ethernet interfaces.
Interface roles are especially useful when applying policies to new devices. As long as the devices that you are adding share the same interface naming scheme as existing devices, you can quickly deploy the necessary configuration template containing the interface role to the new devices.
For example, you can use interface roles to define the zones in a zone-based firewall configuration template. You might define an interface role with a naming pattern of DMZ*. When you include this interface role in a template, the configuration is applied to all interfaces whose name begins with “DMZ” on the selected devices. As a result, you can assign a policy that enables anti-spoof checking on all DMZ interfaces to all relevant device interfaces with a single action.
Choose Configuration > Templates > Shared Policy Objects.
In the Shared Policy Objects pane , choose Shared > Interface Role .
From the Interface Role page, click Add Object .
From the Add Interface Role page, create matching rules for the interface role.
When you define the zone-based template, for example, all of the interfaces on the device that match the specified rules will become members of the security zone represented by this interface role. You can match interfaces according to their name, description, type, and speed.
Click OK to save the configurations.
Network objects are logical collections of IP addresses or subnets that represent networks. Network objects make it easier to manage policies.
There are separate objects for IPv4 and IPv6 addresses; the IPv4 object is called “networks/hosts,” and the IPv6 object is called “network/hosts-IPv6.” Except for the address notation, these objects are functionally identical, and in many instances the name network/host applies to either type of object. Note that specific policies require the selection of one type of object over the other, depending on the type of address expected in the policy.
You can create shared policy objects to be used in the following configuration templates:
Choose Configuration > Templates > Shared Policy Objects > Shared > IPv4 Network Object .
From the Network Object page, click Add Object and add a group of IP addresses or subnets.
Click OK to save the configurations.
To create and use a set of parameter map objects in the firewall rules, do the following:
Choose Configuration > Templates > Shared Policy Objects.
In the Shared Policy Objects pane , choose Shared > Security Rule Parameter Map .
From the Security Rule Parameter Map page, click Add Object .
Specify a name and description for the parameter map that is being created.
From the parameters list, select the parameters you want to apply and provide a value for each of them.
To specify Device Level Override, choose Device Level Override > Add Device .
Select the device you wish to add, and click OK .
Click OK to save the configurations.
To create and use a set of parameter map objects in the firewall rules, do the following:
Choose Configuration > Templates > Shared Policy Objects.
In the Shared Policy Objects pane , choose Shared > Security Service .
From the Security Service page, click Add Object .
Specify a name and description for the service that is being created.
Select the service data from the available list. If you select TCP or UDP, provide a list of port numbers or port ranges (separated by comma).
To specify Device Level Override, choose Device Level Override > Add Device .
Select the device you wish to add, and click OK .
Click OK to save the configurations.
Choose Configuration > Templates > Shared Policy Objects.
In the Shared Policy Objects pane , choose Shared > Security Zone .
From the Security Zone page, click Add Object .
Specify a name and description for the security zone that is being created.
Specify a set of rules that defines the interfaces that must be attached to the zone.
To specify Device Level Override, choose Device Level Override > Add Device .
Select the device you wish to add, and click OK .
Click OK to save the configurations.
You might want to associate a set of configuration templates with specific devices. If you have devices that require the same configuration, you can create a configuration group that associates configuration templates with devices. Creating a configuration group allows you to quickly apply new templates without remembering to which devices the new templates should be deployed.
Composite templates allow you to group smaller templates together, but only configuration groups specify the relationship between the templates and the groups of devices to which those templates apply. You can also specify the order in which the templates in the configuration group are deployed to the devices.
Before you create a configuration group, you should:
Choose Configuration > Templates > Configuration Groups .
Complete the required fields. The device types displayed depend on what you select from the Device Type field.
Where needed, change a template’s order in the group by selecting it and clicking the up or down arrow.
Click Save as a New Configuration Group . The possible configuration groups are:
By creating a configuration group, you can group controllers that should have the same mobility group name and similar configuration. You can assign templates to the group and push templates to all of the controllers in a group. You can add, delete, or remove configuration groups, and download software, IDS signatures, or a customized web authentication page to controllers in the selected configuration groups. You can also save the current configuration to nonvolatile (flash) memory to controllers in selected configuration groups.
By choosing Configuration > Templates > WLAN Controller Configuration Groups , you can view a summary of all configuration groups in the Prime Infrastructure database. Choose Add Configuration Groups from the Select a command drop-down list to display a table with the following columns:
To create a configuration group, follow these steps:
Choose Configuration > Templates > WLAN Controller Configuration Groups .
Fromthe Select a command drop-down list, choose Add Config Group , then click Go .
Enter the new configuration group name. It must be unique across all groups.
Other templates created in Prime Infrastructure can be assigned to a configuration group. The same WLAN template can be assigned to more than one configuration group. Choose from the following:
Click Save . The Configuration Groups page appears.
To add or remove controllers from a configuration group, follow these steps:
Choose Configuration > Templates > WLAN Controller Configuration Groups .
Click a group name in the Group Name column, then click the Audit tab.
The columns in the table display the IP address of the controller, the configuration group name the controller belongs to, and the mobility group name of the controller.
Click to highlight the row of the controller that you want to add to the group, then click Add .
To remove a controller from the group, highlight the controller in the Group Controllers area and click Remove .
Click the Apply/Schedule tab, click Apply to add or remove the controllers to the configuration groups, then click Save Selection .
You can configure one or more countries on a controller. After countries are configured on a controller, the corresponding 802.11a/n DCA channels are available for selection. At least one DCA channel must be selected for the 802.11a/n network. When the country codes are changed, the DCA channels are automatically changed in coordination.
To add multiple controllers that are defined in a configuration group and then set the DCA channels, follow these steps:
Choose Configuration > Templates > WLAN Controller Configuration Groups .
From the Select a command drop-down list, choose Add Config Groups , then click Go .
Create a configuration group by entering the group name and mobility group name.
Click Save , then click the Controllers tab.
Highlight the controllers that you want to add, and click Add . The controller is added to the Group Controllers page.
Click the Country/DCA tab. The Country/DCA page appears. Dynamic Channel Allocation (DCA) automatically selects a reasonably good channel allocation amongst a set of managed devices connected to the controller.
Select the Update Country/DCA check box to display a list of countries from which to choose.
Those DCA channels that are currently configured on the controller for the same mobility group are displayed in the Select Country Codes page. The corresponding 802.11a/n and 802.11b/n allowable channels for the chosen country is displayed as well. You can add or delete any channels in the list by selecting or deselecting the channel and clicking Save Selection .
A minimum of 1 and a maximum of 20 countries can be configured for a controller.
The scheduling function allows you to schedule a start day and time for provisioning.
To apply the mobility groups, mobility members, and templates to all of the controllers in a configuration group, follow these steps:
Choose Configuration > Templates > WLAN Controller Configuration Groups .
Click a group name in the Group Name column, then choose the Apply/Schedule tab.
Click Apply to start the provisioning of mobility groups, mobility members, and templates to all of the controllers in the configuration group. After you apply, you can leave this page or log out of Prime Infrastructure The process continues, and you can return later to this page to view a report.
A report is generated and appears in the Recent Apply Report page. It shows which mobility groups, mobility members, or templates were successfully applied to each of the controllers.
Enter a starting date in the text box or use the calendar icon to choose a start date.
Choose the starting time using the hours and minutes drop-down lists.
Click Schedule to start the provisioning at the scheduled time.
The Configuration Groups Audit page allows you to verify if the configuration complies of the controller with the group templates and mobility group. During the audit, you can leave this window or log out of Prime Infrastructure . The process continues, and you can return to this page later to view a report.
Do not perform any other configuration group functions during the audit verification.
To perform a configuration group audit, follow these steps:
Choose Configuration > Templates > WLAN Controller Configuration Groups .
Click a group name in the Group Name column, then click the Audit tab.
Click to highlight a controller on the Controllers tab, choose >> (Add) , and Save Selection .
Click to highlight a template on the Templates tab, choose >> (Add) , and Save Selection .
Click Audit to begin the auditing process.
A report is generated and the current configuration on each controller is compared with that in the configuration group templates. The report displays the audit status, the number of templates in sync, and the number of templates out of sync.
This audit does not enforce Prime Infrastructure configuration to the device. It only identifies the discrepancies.
Click Details to view the Controller Audit report details.
Double-click a line item to open the Attribute Differences page. This page displays the attribute, its value in Prime Infrastructure , and its value in the controller.
Click Retain Prime Infrastructure Value to push all attributes in the Attribute Differences page to the device.
Click Close to return to the Controller Audit Report page.
Choose Configuration > Templates > WLAN Controller Configuration Groups .
Click a group name in the Group Name column, then click the Reboot tab.
Select the Cascade Reboot check box if you want to reboot one controller at a time, waiting for that controller to come up before rebooting the next controller.
Click Reboot to reboot all controllers in the configuration group at the same time. During the reboot, you can leave this page or log out of Prime Infrastructure . The process continues, and you can return later to this page and view a report.
The Recent Reboot Report page shows when each controller was rebooted and what the controller status is after the reboot. If Prime Infrastructure is unable to reboot the controller, a failure is shown.
To display all recently applied reports under a specified group name, follow these steps:
Choose Configuration > Templates > WLAN Controller Configuration Groups .
Click a group name in the Group Name column, then click the Report tab. The Recent Apply Report page displays all recently applied reports including the apply status, the date and time the apply was initiated, and the number of templates. The following information is provided for each individual IP address:
To view the scheduled task reports, click the click here link at the bottom of the page.
The following sections describe how to create wireless configuration templates for:
Related Topics
To create a template for a lightweight access point, follow these steps:
Choose Configuration > Templates > Lightweight Access Points .
From the Select a command drop-down list, choose Add Template , then click Go .
Enter a name and description for the template and click Save . If you are updating an already existing template, click the applicable template in the Template Name column.
Click each of the tabs and complete the required fields.
Use the Policy Configuration Templates page to configure device-based policies on a controller. You can configure policies for a user or a device on the network.
The maximum number of policies that you can configure is 64. Policies are not applied on WLANs and AP groups if AAA override is configured on the controller.
Choose Configuration > Templates > Features and Technologies.
From the left sidebar menu, choose Features and Technologies > Controller > WLANs > Policy Configuration . The Policy Configuration Template page displays.
Complete the following fields:
When you are finished, click Save as new template .