|
|
As a network administrator you need to perform maintenance to keep your information updated and to get rid of unnecessary or outdated reports and data on the system.
In this scenario, you will use the following applications:
Before you can perform maintenance tasks, make sure the following tasks are completed:
For a complete description of the required tasks, refer to the online help.
![]() |
Note The purpose of this scenario is to show you how specific applications can be used to perform these tasks. Seeing the applications being used in these ways might help you understand how to use the applications to perform similar tasks in your network. |
Delete change records according to your auditing guidelines and disk space.
Step 2 Select Resource Manager Essentials > Administration > Change Audit > Delete Change History. The Change Audit---Filter Options dialog box appears.
Step 3 Select the views and devices, then click Next to apply additional filters or click Finish to delete the selected device change information. The Change Audit---Delete Change History dialog box appears.
Step 4 Select the criteria for deleting your Change Audit data. The default is All. No criteria will appear under the drop-down list box if there are no records for that option.
Step 5 Click Next to schedule the deletion. The Change Audit---Schedule Jobs dialog box appears.
Step 6 Select how often this job will run from the Schedule Type drop-down list.
Step 7 Click Next to delete the selection. The Change Audit---Delete Change Records dialog box displays the results.
![]() |
Caution If you delete software images from the Essentials server, you cannot restore them. You must download them from CCO or the server where your images are stored. |
Step 2 Delete one or more images from the image library by selecting the corresponding check boxes, then clicking Delete. A dialog box displays the following options:
Step 2 Click the ID of the job you want to delete.
Step 3 Click Remove.
Step 2 Review the report to determine which devices have been added to the network, but not to inventory.
Step 3 Select Resource Manager Essentials > Administration > Inventory > Add Devices. The Add a Single Device dialog box appears.
Step 4 Enter the access information in the Add a Single Device dialog box, then click Next. The Enter Login Authentication Information dialog box appears..
Step 5 Enter and verify the information in the Enter Login Authentication dialog box.
![]() |
Note If the device is running Terminal Access Controller Access Control System (TACACS), enter the TACACS username and TACACS password. If you are using Software Management or Device Configuration or managing Cisco 2500 single Flash bank (SFB) devices, you must enter the read-write community string. (You should also enter the Telnet passwords.) Otherwise, upgrades will not succeed. |
Step 6 Click Next. The Enter Enable Authentication Information dialog box appears.
If the device is running TACACS, enter the Enable TACACS username and Enable TACACS password.
Step 7 Enter and verify the information in the Enter Login Authentication Information dialog box.
Step 8 Click Finish. The Single Device Add dialog box appears.
Step 9 To add another device, click Add Another and repeat steps Step 4 through Step 7.
Step 2 Select the Archive Setup tab.
To specify when to purge configuration files from the archive, select one or both of the following:
![]() |
Note It is not recommended that you purge according to the maximum number of versions if you change many configurations each day. For example, if you have a known good configuration and then make 10 changes to it, you will have 11 versions stored in the archive. If you specify keeping only 10 versions in the archive, the known good configuration is purged because it is the oldest version. |
Step 3 Click Apply. A message shows that the changes to the archive were made.
After you perform maintenance tasks, verify that they were done:
Step 2 Select All Views and All Devices, then click Next. A second Change Audit - Filter Options dialog box appears.
Step 3 Select All from the Application field, Category field, User field, and Mode field, then select the dates for which you removed records, and then click Finish.
The Change Audit - Search report appears. No records for your dates should be displayed.
Step 2 Scan the report to make sure that the software images you deleted are gone.
Step 2 Verify that the job you deleted is no longer on the report.
Step 2 Click Managed Devices.
Step 3 Verify that the devices you just added appear on the list.
Because the configurations are removed from the archive on a schedule, it is not necessary to verify the removals each time the job runs.
![]()
![]()
![]()
![]()
![]()
![]()
![]()
Posted: Fri Mar 31 10:15:27 PST 2000
Copyright 1989 - 2000©Cisco Systems Inc.