cc/td/doc/product/rtrmgmt/info_ctr/2_0_0
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Info Center Mediators and Event Receivers

Info Center Mediators and Event Receivers

Cisco Info Center works with a variety of Information Mediators (Info Mediators) and data sources. This chapter describes the Info Mediators and data sources used with Cisco Info Center.

This chapter contains the following sections:

Cisco Info Center Event Sources

Cisco Info Center manages trap data and Syslog messages produced by many network management systems. The most important event sources for Cisco Info Center are the following:

In addition to using these data sources, Cisco Info Center can receive events from many additional network management systems when used with additional Info Mediators. For a complete list of the Info Mediators that you can use with Cisco Info Center, see "Additional Info Mediators."

Syslog Trap Generator

The Syslog Trap Generator (STG) is a software module that receives Syslog messages from IOS devices and converts them into SNMP traps. The traps are then sent to the nco_p_rttrapd mediator (reliable trap mediator). The Info Server monitors events forwarded to it by the nco_p_rttrapd mediator and processes them according to rules specified in the cisco.rules file.

Using the STG as an event source, the Cisco Info Server can manage routers and other IOS devices, such as digital subscriber line (DSL) equipment, by processing layer-3 routing events. Using the router processing module (RPM) feature, the STG and CIC can process events generated by Cisco 7200 router blades in MGX 8500 devices and generated by Cisco 3180 multiservice access concentrators.

In order to use the Policy Manager component of Cisco Info Center, you must install the STG on either the host where the Cisco Info Server is running or on another host.


Note If you are using the STG feature, do not use the syslogd mediator.

You can use the STG in two ways:

In order to monitor a particular router, you must enable message forwarding to the STG on the router. For information on installing and configuring the STG module during Cisco Info Center installation, see the "Configuring the STG" section in chapter 3 of the Cisco Info Center Installation and Configuration Guide.

The following figure shows the STG acting as a data source for CIC 2.0.


Figure 3-1: Event Communication Between the System Trap Generator and Cisco Info Center


Supported IOS Facilities

Currently the STG supports the categories of IOS facility shown in Table 3-1.
Table 3-1: IOS Facilities Supported by STG
IOS Facility Definition

CONTROLLER

Controller

AAA

TACACS+ Authentication, Authorization, and Accounting security

FR

Frame Relay

FR_LMI

Frame Relay Local Management Interface

FR_ELMI

Frame Relay Enhanced Local Management Interface

ATM

Asynchronous Transfer Mode

ATM_SIG

ATM Signalling Subsystem

ATMSSCOP

ATM Service-Specific Connection Oriented Protocol

IP

Internet Protocol

IPFAST

IP Fast Switching

IP_SNMP

SNMP specific to SNMP

SYS

Operating System

SUBSYS

Software Subsystem

SCHED

Scheduler

DSX1

Channelized E1 and T1 telephony standard

ENT_API

Entity MIB API


Note Because Cisco Info Center release 2.0 primarily supports traps sent from Route Processor Module (RPMs) in Cisco wide-area switches and from the Cisco 3810 multiservice access concentrator, messages that do not have direct mappings to 3810 trap definitions are sent directly as traps to the RTM Proxy module.

General Mapping for STG Traps

Table 3-2 shows the general mapping of STG trap fields to Cisco Info Server fields.
Table 3-2: Mapping of STG Trap Varbinds to Cisco Info Center Fields
Info Center Field STG Field

NEName

stgNodeName

NEAddress

stgRouteIpAddr

ObjectType

IOS stgTrapFacility and stgTrapMnemonic

SubObectType

For traps that have interface information, mapped to the interface information; otherwise, blank

AlertKey

stgRouterIpAddr + stgFacility + stgMnemonic + stgSeverity + stgTrapReason.

DedupKey

AlertKey + AlertGroup

ObjectStatus

stgState or stgState + stgResult

Summary

If the trap has TrapMessage information, this is mapped to stgTrapMessage.

AdminDomain

stgTrapReason

PSAP (Physical Service Access Point)

If the STG trap has Controller and SubControllerID information, this is mapped to ControllerID and SubControllerID; otherwise blank.

DSAP (Destination Service Access Point)

If the STG message has DLCI information, this is mapped to DSAP; otherwise, blank.

Severity Mapping

Cisco IOS Syslog messages have eight severity levels. In contrast, Cisco Info Center events have five possible severity levels. Table 3-3 indicates the mapping of IOS severity levels to Cisco Info Center severity levels.


Table 3-3: Cisco IOS to Cisco Info Center Severity Level Mappings
IOS Severity Cisco Info Center Severity Description

0 - Emergency

5 - Critical

System unusable

1 - Alert

5 - Critical

Immediate action needed

2 - Critical

4 - Major

Critical condition

3 - Error

3 - Minor

Error condition

4 - Warning

2 - Warning

Warning condition

5 - Notification

2 - Warning

Normal but significant condition

6 - Informational

1 - Indeterminate

Informational only

7 - Debugging

1 - Indeterminate

Appears during debugging only

Event Types Received From the STG

The STG forwards layer-3 router events to Cisco Info Center through the RTtrapd mediator. The cisco.rules file for Cisco Info Center 2.0 provides rules that allow processing of the following types of IOS events:

The following sections summarize the types of events for these types of IOS event. For complete information on the event processing rules for Cisco Info Center 2.0, refer to the Cisco Rules File Reference.

General Router Event Messages

The STG receives and forwards general router event messages that indicate the severity level of events, changes in router configuration, changes in controller state and ATM faults related to virtual circuit creation. For a complete list of these types of event, refer to the 26000 series trap rule documentation in the Cisco Rule File Reference.

RPM Card Events

RPM events are generated by RPM cards in the MGX 8850. The RPM cards function as a Cisco 7200 router. These events are used to monitor MPLS provisioning and are useful in evaluating the results of provisioning enabled through the Cisco MPLS VPN Solution product.

The following types of events are monitored by the STG and relayed to Cisco Info Center.

General Mappings for MPLS Events

For information on the event mappings for MPLS events, refer to the Cisco Rules File Reference.

Policy Manager

Cisco Info Center 2.0 includes an option called Policy Manager that acts as a data proxy or mediator for Cisco Info Center. When Cisco Info Center receives an event indicating that an interface on a router managed by Cisco's MPLS VPN Solution product has gone down, Policy Manager queries MPLS VPN Solution to obtain additional information about the event.

Cisco MPLS VPN Solution is an application that allows service providers to define and monitor virtual private networks (VPNs). A VPN is a network in which two sites communicate over the service provider's network in a private manner---no site outside of the VPN can receive or transmit packets on the "private" route. This allows service providers to provide specialized, secure intranet and extranet services to customers.

Service Providers use Cisco MPLS VPN Solution to configure two types of routers that enable deployment of VPNs:

By establishing and maintaining unique routes between CEs and PEs, service providers can provide hundreds of thousands of VPNs to their customers.

When a serial or main interface on a PE router goes down, all of the VPNs connected through that PE are affected. Policy Manager receives an event indicating that the router is down and relays fault information to Cisco Info Center.

Figure 3-2 shows the general network topology for VPNs created using PEs and CEs.


Figure 3-2: VPN Topology Using PEs and CEs


Event Flow From Policy Manager to Cisco Info Center

Policy Manager receives event information on PE router interfaces from two sources:

The STG converts serial interface up and down IOS messages received from PEs into traps. In addition, the STG reads a text file that contains a list of the main PE interfaces used by the organization (this file must be created manually during STG installation and configuration).The STG polls the PE interfaces at 5-minute intervals to check whether they are reachable. When the interface is unreachable, a trap is generated.

The generated traps are forwarded to the RTM Proxy module and then to the RTtrapd Info Mediator. Cisco Info Center receives the traps from the RTtrapd Info Mediator. The Policy Manager component of Cisco Info Center then queries Cisco MPLS VPN Solution to obtain additional information about the alarm, such as the number of CEs and VPNs that are affected by the PE interface failure. Policy Manager then updates the original PE event, generates new events for the affected CEs and VPN s, and forwards the events to the Cisco Info Server.

Policy Manager runs as a separate process, and includes a Common Object Request Broker Architecture (CORBA) Data Source Adapter (DSA) that acts as an object adapter that collects events from Cisco MPLS VPN Solution.

Figure 3-3 shows the flow of events between the STG, the CIC Info Server, Policy Manager, and Cisco MPLS VPN Solution.


Figure 3-3: Event Flow Between Policy Manager and Cisco Info Server


Policy Manager Events

This section describes the MPLS PE event, which is generated by the STG when a PE or a specified interface on a PE goes down, and the events that Policy Manager generates based on the MPLS PE event.

The MPLS PE Event

When the RTtrapd Info Mediator receives a node unreachable or link state changed Syslog trap, it performs a table lookup on a table that contains a list of all of the PEs provisioned by Cisco MPLS VPN Solution. If the value contained in the trap's nodeName varbind ($2) is listed in the lookup table, an event is forwarded to the Info Server with a flag set indicating that Policy Manager should process it.

This type of event is an MPLS PE event.

Table 3-4 describes the traps that are processed by Policy Manager.


Table 3-4: Traps Processed by Policy Manager
Trap Name STG State Specific Trap When Sent

stgSyslogNodeUnreachable

NA

26301

Generated by STG when a node being polled becomes unreachable.

stgSyslogNodeReachable

NA

26302

Generated by STG when a node being polled becomes reachable.

stgSyslogLinkStateChanged

Up or Down

26111

LINK-5-PDOWN Syslog message

LINK-5-CHANGED Syslog message

When Policy Manager receives an event that is flagged for Policy Manager processing, it queries Cisco MPLS VPN Solution for additional information relating to the event, such as the affected CEs and VPNs, customer names, and site names. Policy Manager updates the original PE event with information on the affected VPN by adding the following information:

MPLS CE Events

Policy Manager generates an MPLS CE event for each Customer Edge router (CE router) that is serviced by an interface that has gone down on a PE router.

Table 3-5 describes the fields in the MPLS CE Event.


Table 3-5: Fields in the MPLS CE Event
Field Description

CEName

Name of an affected CE.

Customer Name

Name of the customer using the CE.

Customer Site

Name of the affected customer site.

VPNs

List of VPNs connected to the CE.

PEName

Name of the PE that services the CE.

PE Interface

The down PE interface.

The MPLS VPN Event

Policy Manager generates an MPLS VPN event for each VPN that is affected by an MPLS PE event. Table 3-6 describes the fields in the MPLS VPN event. This event is generated when a PE interface either goes up or comes down.


Table 3-6: Fields in the MPLS VPN Event
Field Description

Customer

Name of the customer for the VPN.

VPNName

Name of the affected VPN.

NumCEs Down

Number of CE routers affected in the VPN.

totalNumCEs

Total number of CEs in the VPN.

Summary

Percentage of CEs affected in the VPN.

When a PE interface that has gone down comes back up, the original interface down events are cleared and all associated MPLS events are cleared by an automation process running on the Cisco Info Server. Policy Manager determines the number of cleared CEs in the affected VPN and updates the NumCE Down and Summary (percentage of CEs down) fields.

Cisco WAN Manager

Cisco WAN Manager is a network management product that monitors Cisco's wide-area switch equipment. You can use CWM to manage the following types of Cisco device:

Cisco WAN Manager primarily monitors layer-2 (data link layer) switching events. However, you can use CWM with the STG feature to manage routers by processing layer-3 routing events.

Cisco WAN Manager acts as a data source proxy for Cisco Info Center and uses two Info Mediators: the nco_p_rttrapd Info Mediator and one of two versions of the HP NNM Info Mediators, the nco_p_nnm5 mediator or the nco_p_nnm6 mediator.

Figure 3-4 shows how Cisco Info Center interacts with Cisco WAN Manager and its associated Info Mediators.


Figure 3-4: Event Communication Between CWM and Cisco Info Center


Event Types Received From Cisco WAN Manager

Cisco WAN Manager primarily monitors Cisco wide-area switches and concentrators. For a detailed list of all of the traps that Cisco Info Center receives from Cisco switch equipment, refer to the Cisco Rules File Reference.

Some of the common event types that Cisco Info Center receives through CWM are the following:


Note Events generated by Route Processor Module (RPM) cards on MGX 8850 wide-area switches are processed using the STG as a data source.

HP Network Node Manager

Using the nco_p_nnm5 and nco_p_nnm6 Info Mediators, Cisco Info Center can receive events from the industry standard HP Network Node Manager (HP NNM) network management system.

Cisco Info Center Info Mediators

Cisco Info Center uses the following Info Mediators to receive event data from the network:

The following sections describe each of these Info Mediators.

Cisco Syslog Info Mediator

This section provides information about the Cisco Syslog Info Mediator.

Syslog Info Mediator Quickstart Guide


Table 3-7: Cisco Syslog Info Mediator Quickstart Guide

Mediator Target

IOS messages from Syslog daemon (syslogd)

Mediator Executable Name

nco_p_syslog

Mediator Supported on

Solaris 2.6, Solaris 2.7

Properties file

$OMNIHOME/probes/solaris2/syslog.props

Rules file

$OMNIHOME/probes/solaris2/syslog.rules

/opt/Omnibus/utils/install/rules

Requirements

The Syslog Info Mediator requires that syslogd is configured to a named pipe, or optionally, to a log file.

Data Acquisition

The Cisco Syslog Info Mediator acquires event data from syslogd, the UNIX system message logger, by reading from a FIFO that syslogd has been configured to write messages to.


Note A First In First Out (FIFO), also known as a named pipe, allows a program to write to a file and another process to read what has been written without the file expanding.

Installation

The /etc/syslog.conf file must be edited during CIC configuration to send specific messages to the named pipe or log file. By default, with no named pipe settings in the properties or on the command line, the Cisco Syslog Info Mediator creates and reads a named pipe called /var/adm/nco. To set syslogd to write to this file and enable monitoring of routers, add the following line to the /etc/syslog.conf file:

local7.debug


Note This line must not be the first line of the /etc/syslog.conf file. When it is, it activates a bug in syslogd, where it attempts a check on the first file in the first entry in the /etc/syslog.conf file, and this makes the syslog system unstable. Also note, some implementations of syslogd are limited to twenty entries in the /etc/syslog.conf file.

The line specified writes Local7 Facility level syslog messages to the named pipe (this is the default Facility level for Cisco routers). It is also possible to configure syslogd to write other Facility and severity level messages to the named pipe or file. Refer to the UNIX online manual pages for syslog.conf for more details. The syslogd process does not need to be restarted; when the Cisco Syslog Info Mediator is started, it automatically triggers a re-reading of the syslog.conf file by the syslogd process.

Startup Operation

When the Cisco Syslog Info Mediator starts, it attempts to open (or create) the FIFO specified in the properties or command line. It is recommended you do not set this property so the Cisco Syslog Info Mediator defaults to its standard /var/adm/nco FIFO location. When, for some reason (for example, /var/adm does not exist or a FIFO has been incorrectly specified), the Syslog Info Mediator does not find the FIFO, the Cisco Syslog Info Mediator falls back to using /tmp/nco as its emergency FIFO.

The Cisco Syslog Info Mediator then locates the syslogd process and sends it a signal, prompting it to re-read its configuration file. This allows you to make changes to the syslog.conf file. Any changes you do make only come into effect when the Cisco Syslog Info Mediator is restarted.

Once it is reading the FIFO, the Cisco Syslog Info Mediator detects any messages written to the FIFO and processes them, one line at a time, as events.

Properties and Command Line Options

This subsection describes the properties and command line options associated with the Cisco Syslog Info Mediator.

Command Line Syntax

The following command line options are associated with the Cisco Syslog Info Mediator:

nco_p_syslog -fifo <string> -offset0 <numeric> -offset1 <numeric> -offset2 <numeric>

Properties and Command Line Parameters

Table 3-8 describes the Cisco Syslog Info Mediator properties and command line options.


Table 3-8: Cisco Syslog Info Mediator Properties and Command Line Options
Property Name Property Parameter Command Line Option Description

FifoName

string

-fifo <string>

Filename of FIFO to create and read syslog messages from.

OffsetZero

numeric

-offset0 <numeric>

Parse from character position.

OffsetOne

numeric

-offset1 <numeric>

Number of token elements to create.

OffsetTwo

numeric

-offset2 <numeric>

Number of tokens into string to create Details element.

See "Generic Info Mediator Properties," and "Default Info Mediator Command Line Options," for the properties and command line options available with all Info Mediators.

Fatal Level Messages

See "Error Messages," for details of the generic error messages produced by all Info Mediators.

Failed to open FIFO <FIFO file name>

Error Level Messages

See "Error Messages," for details on the generic error messages produced by all Info Mediators.

Can't create <FIFO file name>

Warning Level Messages

See "Error Messages," for details of the generic error messages produced by all Info Mediators.

Not found: <FIFO file name>

Temporary FIFO created: <FIFO file name>

Using temporary FIFO: <FIFO file name>

FIFO created: <FIFO file name>

Not a FIFO: <file name>

RTtrapd Info Mediator

This section provides information about the RTtrapd Info Mediator.

Quickstart Guide


Table 3-9: RTtrapd Info Mediator Quickstart Guide

Mediator Target

SNMP events from Cisco WAN Manager or the Syslog Trap Generator

Mediator Executable Name

nco_p_rttrapd

Mediator Supported on

Solaris 2.6, Solaris 2.7

Properties file

$OMNIHOME/probes/solaris2/rttrapd.props

Rules file

$OMNIHOME/probes/solaris2/cisco.rules

Requirements

Requires that you have Cisco WAN Manager or the Syslog Trap Generator installed.

Data Acquisition

The RTtrapd Info Mediator acquires data from Cisco WAN Manager or from the Syslog Trap Generator.

Properties and Command Line Options

This subsection describes the properties and command line options associated with the RTtrapd Info Mediator.

Command Line Syntax

The following command line options are associated with the RTtrapd Info Mediator:

nco_p_rttrapd

Command Line Syntax

The following command line options are associated with the Cisco Syslog Info Mediator:

nco_p_rttrapd -rtmmanagerhostaddr <IP_address> -rtmmanagerport <port_number> -rtagenthostname <hostname> -server<server_name> -manager <hostname@SV+> | <hostname@SV+> -rulesfile <rules_filename>

Properties and Command Line Parameters

Table 3-10 describes the Cisco Syslog Info Mediator properties and command line options.


Table 3-10: RTTrapd Info Mediator Properties and Command Line Options
Property Name Property Parameter Command Line Option Description

RTMManagerHostaddr

string

-rtmmanagerhostaddr <IP_address>

IP address of the host that is running the RTTrapd Info Mediator.

RTMManagerPort

numeric

-rtmmanagerport <port_number>

Port that the Rttrapd Info Mediator uses to listen for reliable traps

RTAgentHostname

string

-rtagenthostname <hostname>

Host name of the host that is running Cisco WAN Manager

Server

string

-server <server_name>

Name of the Info Server that will receive the traps

Manager

string

-manager <hostname@SV+> | <hostname@SV+>

Name of the host running the RTTrapd Info Mediator. This can be in either of two forms: hostname@SV+ or hostname@STG.

RulesFile

string

-rulesfile <rules_filename>

The path to the rules file used by the RTtrapd Info Mediator. Normally this path is the following: /opt/Omnibus/probes/solaris2/
cisco.rules


Note These parameters are written to the rttrapd.props properties files and are used by the process control agent when the RTTrapd Info Mediator is started automatically. Do not change the other parameters in the properties file, as this will cause the Info Mediator to cease functioning.

ProbeWatch Events

As the RTtrapd Info Mediator exits, a ProbeWatch event message is generated that contains the unique sequence number of the RTtrapd Info Mediator and the number of traps processed during its execution.

See "Error Messages," for a list of the ProbeWatch events produced by all Info Mediators.

HP Network Node Manager Mediator

This section provide information about the HP Network Node Manager (NNM) Info Mediator. This Info Mediator allows Cisco Info Center to receive alerts from the HP NNM application.

HP NNM Quickstart Guide

Table 3-11 summarizes essential information about the HP NNM mediator.


Table 3-11: HP NNM (UNIX) Info Mediator Quickstart Guide

Info Mediator Target

SNMP traps generated by the HP OpenView component of HP NNM

Info Mediator Executable Name

nco_p_nnm5 for NNM Versions 3.x, 4.x, or 5.x

nco_p_nnm6 for NNM Version 6

Info Mediator Supported on

NNM Version 5: Solaris 2.7

NNM Version 6: Solaris 2.7

Properties file

$OMNIHOME/probes/solaris2/nnm5.props for nco_p_nnm5

$OMNIHOME/probes/solaris2/nnm6.props for nco_p_nnm5

Rules file

$OMNIHOME/probes/solaris2/nnm5.rules for nco_p_nnm5

$OMNIHOME/probes/solaris2/nnm6.rules for nco_p_nnm5

Requirements

HP NNM

Data Acquisition

The HP NNM Info Mediator acquires event data by connecting to a running HP NNM system and capturing traps to form alerts.

The HP NNM Info Mediator connects to the ovtrapd process that HP NNM uses. It acquires its events directly from that process. The HP NNM Info Mediator does not work when the ovtrapd process does not exist.

Startup Requirements

The HP NNM Info Mediator requires that the HP NNM is running to generate a real-time stream of events.

Command Line Options

This subsection provides information about the HP NNM Info Mediator command line option.

Command Line Syntax for NNM Versions 3, 4, and 5

The command line option specific to the HP NNM Info Mediators is:

nco_p_nnmn -<manager-string>

where n is the NNM version that the mediator will communicate with (NNM 3, 4, o4 5) and <manager-string> is the management application name.

See "Generic Info Mediator Properties,"and "Default Info Mediator Command Line Options," for the properties and command line options available with all Info Mediators.

Command Line Syntax for NNM Version 6

The command line syntax for the nco_p_nnm6 Info Mediator is as follows:

nco_p_nnm6 -ovhostname <hostname> -ovfilter <filter>

where <hostname> is the hostname of the host running HP Open View and <filter> is the name of the OpenView trap filter.

Elements

This subsection provides information about the HP NNM Info Mediator elements.

Static Elements

The HP NNM Info Mediator uses the static elements listed in Table 3-12.


Table 3-12: HP NNM (UNIX) Info Mediator Static Elements
Element Name Element Description

$Node

Node name or IP address.

$community

SNMP community string.

$enterprise

SNMP enterprise string.

$generic-trap

SNMP generic trap integer value.

$specific-trap

SNMP specific trap integer value.

$IPaddress

IP address of the device.

$Sequence

Indicates the number of times the Info Mediator has been run.

Dynamic Elements

With the NNM 6 Info Mediator (nco_p_nnm6) the following additional dynamic element is used:

$eventID

This element represents the unique identifier that is generated for an Event Correlation System (ECS) event.

The other elements are created on-the-fly and are entirely dependent on the traps sent by the network elements. They are mapped into $<n> and $OID<n> elements, where <n> is a sequence number.

Generic Trap Handling

The generic traps are handled at the end of the rules file. The handling of each is detailed below.

Generic trap-type 0 - Cold Start

Summary field set to Cold Start, AlertGroup field set to Generic, Severity field set to 4.

Generic trap-type 1 - Warm Start

Summary field set to Warm Start, AlertGroup field set to Generic, Severity field set to 4.

Generic trap-type 2 - Link Down

Summary field set to Link Down, AlertKey field set to the $1 varbind (which is <ifIndex>), AlertGroup field set to Generic, Severity field set to 5, Identifier field set to <Nodename> plus <Agent> plus <generic-trap> plus <specific trap> plus <ifIndex>.

Generic trap-type 3 - Link Up

Summary field set to Link Up, AlertKey field set to the $1 varbind (which is ifIndex), AlertGroup field set to Generic, Severity field set to 2, Identifier field set to <Nodename> plus <Agent> plus <generic-trap> plus <specific trap> plus <ifIndex>.

Generic trap-type 4 - Authentication

By default, Authentication traps are discarded

Generic trap-type 5 - EGP Neighbor Loss

Summary field set to EGP Neighbor Loss, AlertGroup field set to Generic, Severity field set to 3.

Error Level Messages

See "Error Messages," for details on the generic error messages produced by all Info Mediators.

Select(): <reason>

Dstrval(&DS)

Fatal Level Messages

See "Error Messages," for details on the generic error messages produced by all Info Mediators.

Cannot malloc memory for enterprise oid

ProbeWatch Events

See "Error Messages," for details of the generic error messages produced by all Info Mediators.

Dstrval(&DS)

Overror - An unexpected msg/condition - ignored

Could not get the sequence number: err code <number>

Using the RTtrapd and HP NNM Mediators with Cisco WAN Manager

Cisco WAN Manager is a network management product that monitors Cisco's switch equipment. You can use CWM to manage the following Cisco devices:

Cisco WAN Manager primarily monitors layer-2 (data link layer) switching events. However, you can use CWM with the STG feature to manage routers by processing layer-3 routing events.

Cisco WAN Manager acts as a data source and proxy for Cisco Info Center and uses two Info Mediators: the nco_p_rttrapd Info Mediator and one of two versions of the HP NNM Info Mediators, the nco_p_nnm5 mediator or the nco_p_nnm6 mediator. The nco_p_rttrapd Info Mediator collects events passed by CWM to the RTMProxy module. The HP NNM mediators collect events passed by the network to the HP NNM application.

Note that to use the STG you must use the nco_p_rttrapd mediator provided with Cisco Info Center.

Figure 3-5 shows how Cisco Info Center interacts with Cisco WAN Manager and its associated Info Mediators.


Figure 3-5: Event Communication Between CWM and Cisco Info Center


To communicate with CWM, the RTtrapd Info Mediator runs on the host that is running CWM. It registers with the Robust Trap Mechanism (RTM) Proxy Agent by passing the IP address of the machine on which the Info Mediator runs, which is the CWM machine, and the port it is running on. By default, the RTtrapd Info Mediator runs on port 161, however, as this port is used by the HP ovtrapd process, the RTtrapd Info Mediator is configured to run on port 4000.

The nco_p_nnm5 Info Mediator uses the nnm5.rules file, the nco_p_nnm6, uses the nnm6.rules file, and nco_p_rttrapd Info Mediators uses the cisco.rules. file. These files are located in the /opt/Omnibus/probes/solaris2 directory. When you run the nco_config configuration script to configure the Info Server to communicate with CWM, the script sets the properties for these Info Mediators to include the correct rules files.

An SNMP trap Protocol Data Unit (PDU) received by the HP NNM and Trapd Info Mediators consists of the following fields:


Table 3-13: SNMP Trapd Protocol Data Unit

Manager Address

Enterprise ID

Agent Address

Generic Trap

Specific Trap

TimeStamp

VarBind1

VarBind2

Other VarBinds

where the VarBinds consist of a group of Object Identifier, Type, and Value and the number of VarBinds depends upon the trap. For example:


Table 3-14: SNMP Trap Example

171.22.24.67

.1.3.6.1.4.1.9

171.22.24.88

2

0

133333

.1.3.6.1.1.2.5, integer 11

When this trap is received by either the HP NNM or the RTtrapd Info Mediator, the following elements are generated:


Table 3-15: CWM Info Mediators Token Generation
Element Name Element Description

$Node

171.22.24.88

$enterprise

.1.3.6.1.4.1.9

$generic-trap

2

$specific-trap

0

$OID1

.1.3.6.1.1.2.5

$1

11

The VarBind elements are assigned to elements $OID[<n>] and $[<n>] where <n> is the position of the VarBind in the SNMP PDU, as shown in the above example.

$OID1 = .1.3.6.1.1.2.5
$1 = 11

Skeleton of the CWM Info Mediators Rules File

This section describes the skeleton of the rules file for the RTTrapd Info Mediator. See the Cisco Rules File Reference for more information.

The first section must have any settings for lookups when defined. For example:

table discards = 
"/opt/Omnibus/probes/solaris2/discards.lookup"
table NEAddress = 
"/opt/Omnibus/probes/solaris2/node_ip_addr.lookup" 
 

The next section is the body of the rules file that deals with the Info Mediator Watch and Event mappings.

The Probe Watch messages are generated by the Info Mediators and is an internal property of the Info Mediators. These messages are usually generated during start-up and shutdown. The following section deals with the Info Mediator Watch messages within the main loop of the rules file.

switch(@Manager)
{
	case "ProbeWatch":
		include "/opt/Omnibus/probes/solaris2/cisco.includes/probewatch.r"
 

When a ProbeWatch event comes in, the Info Mediator reads the include statement and executes the following code in the probewatch.r rules file:

{
@Summary = @Agent + " on " + @Node + " "+ @Summary 
@NEName = @Node
@ObjectType = `infocenter.system'
@SubObjectType = `Info Mediator'
@AlertKey = @Agent
switch(@Summary)
{
     case "Going Down ...":
              @AlertGroup = "ProbeUpDown"
              @Type = 1
     case "Running ...":
        @AlertGroup = "ProbeUpDown"
        @Type = 2
     default:
}
 

The defaults start here for the main rules section (non ProbeWatch alerts).

default:
		include "/opt/Omnibus/probes/solaris2/cisco.includes/generatediscardtrap.r"
		if(match($discardtrap, $Manager) or match($discardtrap, "All"))
		{
			discard
		}		#######################################################################
		#
		# Do not discard traps. Continue with processing the rules file
		#
		#######################################################################
		else
		{
			include "/opt/Omnibus/probes/solaris2/cisco.includes/nodiscardcommon.r"
			switch($generic-trap)
			{
    case "6":
        include "/opt/Omnibus/probes/solaris2/cisco.includes/generictraps/generictrap6.r"
				    case "5":
				        include "/opt/Omnibus/probes/solaris2/cisco.includes/generictraps/generictrap5.r"
 
				     case "4":
					        include "/opt/Omnibus/probes/solaris2/cisco.includes/generictraps/generictrap4.r"
     				case "3":
					         include "/opt/Omnibus/probes/solaris2/cisco.includes/generictraps/generictrap3.r"
				     case "2":
					         include "/opt/Omnibus/probes/solaris2/cisco.includes/generictraps/generictrap2.r"
				     case "1":
					i        nclude "/opt/Omnibus/probes/solaris2/cisco.includes/generictraps/generictrap1.r"
				     case "0":
					        include "/opt/Omnibus/probes/solaris2/cisco.includes/generictraps/generictrap0.r"
				     default:
					        @Summary = "Unknown generic trap number " + $generic-trap + " from enterprise " +         $enterprise-name
					        @AlertGroup = "unknown"
					        @Severity = "1"
 
			# end of switch($enterprise)
			}
	include "/opt/Omnibus/probes/solaris2/cisco.includes/endofrules.r"
}
 

For information on the rules files that are executed for each of the categories of generic traps tested in the example above, refer to the specific rules file for the class of generic traps. For information on specific traps, refer to the Cisco Rules File Reference.


hometocprevnextglossaryfeedbacksearchhelp
Posted: Tue Jun 13 17:07:02 PDT 2000
Copyright 1989 - 2000©Cisco Systems Inc.