cc/td/doc/product/rtrmgmt/netsys
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Cisco NSM 4.2 - READ THIS FIRST

Cisco NSM 4.2 - READ THIS FIRST

This document contains important information related to the 4.2 version of the Cisco Netsys Service-Level Management Suite (hereafter referred to as Cisco NSM) software.

With this 4.2 release, the Cisco NSM software has been made Year 2000 (Y2K) compliant. All previous versions of the Cisco NSM software do not meet Y2K requirements, therefore, Cisco strongly recommends you upgrade to this new version.

Cisco NSM 4.2 only operates with Sun's Solaris 2.6, Hewlett Packard's HP-UX 10.20, and IBM's AIX 4.3.1 operating systems. See Section, "Year 2000 Support", for information about specific operating system requirements for Year 2000 support and compatibility information.

Once you open a baseline (either a new baseline or a baseline previously created under an earlier version of Cisco NSM) with the Cisco NSM 4.2 release, you must not open this baseline with earlier versions of Cisco NSM due to incompatibilities with the Data Repository.
Note The term Cisco NSM is used in this document to refer to information pertaining to the Netsys Connectivity Service Manager (including the Netsys LAN Service Manager) and Netsys Performance Service Manager products.

For information on hardware and software requirements and instructions on how to install, license, and start the Cisco NSM 4.2 software, see the 4.2 Cisco NSM Installation and Licensing Guide, described in Section, "Inventory".

This document contains the following sections:

Cisco Systems, Inc.

Network Services and Management Business Unit
170 West Tasman Drive
San Jose, CA 95134-1706 U.S.A.
(408) 527-7500
WWW: http://www.cisco.com

Cisco NSM Overview

Cisco NSM allows you to manage all aspects of network connectivity and performance with a single service-level management solution. Cisco NSM makes it easy to understand the inner workings of your network so that you can quickly solve problems and optimize performance. Together, the Netsys Connectivity Service Manager and the Netsys Performance Service Manager core modules provide a complete, end-to-end, scalable solution that grows with your requirements, helping you solve your key network management challenges today and positioning you to take full advantage of future innovations.


Note The Netsys Connectivity Service Manager is a prerequisite for the Netsys Performance Service Manager. As such, there is full integration between the Netsys Performance Service Manager and the Netsys Connectivity Service Manager (which includes the Netsys LAN Service Manager).

Netsys Connectivity Service Manager Overview

The Netsys Connectivity Service Manager allows you to view, assess, and troubleshoot a full spectrum of connectivity issues (including network availability, security, and reliability.) It monitors your actual network configuration data and uses built-in intelligence to verify the availability of key network services. It allows you to establish service-level policies for connectivity, reliability, and security services; and it uses the unique VISTA (View, Isolate, Solve, Test, Apply) troubleshooting methodology to automate the diagnosis and repair of problems.

As a result, you can begin to focus more on strategic network issues such as growth and capacity planning, and less on solving the network crisis of the moment. The Netsys Connectivity Service Manager dramatically increases the productivity of network and system administrators, thereby reducing overall network management costs.

LAN switching topology capabilities are also provided, which show you an integrated view of your router/LAN switching network and traffic paths. See "Chapter 9 - Netsys LAN Service Manager" in the Netsys Connectivity Service Manager General Reference Guide for a detailed description of the functionality provided by the Netsys LAN Service Manager.

See "Chapter 1 - Overview" in the Netsys Connectivity Service Manager General Reference Guide for a detailed description of the functionality provided by the Netsys Connectivity Service Manager.

Netsys Performance Service Manager Overview

The Netsys Performance Service Manager complements the capabilities of the Netsys Connectivity Service Manager, allowing you to monitor performance service-levels, diagnose and solve network performance problems, tune existing networks, and plan network changes. The product adds vendor-certified device performance models and actual traffic data collected from network probes, enabling you to analyze interactions between traffic flows, topologies, routing parameters, router configurations, and Cisco IOS features.

See "Chapter 1 - Overview" in the Netsys Performance Service Manager Reference Guide for a detailed description of the functionality provided by the Netsys Performance Service Manager.

Inventory

This section provides a list of the components you receive with the Cisco NSM 4.2 product.

Netsys Y2K Upgrade Kit

You should receive the following components in the Cisco Netsys Y2K upgrade kit:

Cisco NSM 4.2 Software Package

You should receive the following components in the Cisco NSM 4.2 software package:

Cisco NSM 4.2 Performance Service Manager Software Package

When you previously only purchased the Netsys Connectivity Service Manager, you should receive the following components in the 4.2 Cisco NSM Performance Service Manager package:

What's New in the 4.2 Cisco NSM Release

This section provides information about the new features and functionality provided in the Cisco NSM 4.2 release.

Once you open a baseline (either a new baseline or a baseline previously created under an earlier version of Cisco NSM) with the Cisco NSM 4.2 release, you must not open the baseline with an earlier version of Cisco NSM, due to incompatibilities with the Data Repository.

Year 2000 Support

With this 4.2 release, the Cisco NSM software has been made Year 2000 (Y2K) compliant. All previous versions of the Cisco NSM software do not meet Y2K requirements, therefore, Cisco strongly recommends you upgrade to this new version.

The Cisco NSM 4.2 release is "Year 2000" compliant only in conjunction with the following operating systems:

http://www.sun.com/y2000/solaris26.html
http://www.software.ibm.com/year2000/papers/aixy2k.html
http://www.software.hp.com/products/Y2K/corelist.html
The Year 2000 patch bundles are available from HP at the following URL:
http://us-support.external.hp.com
Note, you must first register for an account before you can obtain the patch bundles as follows:

Step 1 Select the Enter the ECS option. You will be required to specify a userid and password.

Step 2 Select the Standard Patch Bundles option.

Step 3 Select the Obtain Y2K Bundles from Patch Database option.

Step 4 Select the appropriate Core OS Year 2000 patch bundle.

NetFlow Collector 2.0 Support

The Cisco NSM 4.2 release now supports the NetFlow Collector 1.x and 2.x header formats.

What's New in the 4.1 Cisco NSM Release

This section provides information about the new features and functionality provided in the Cisco NSM 4.1 release only. It does not include information about the features provided in the 4.0 release.

VPDN Support

This subsection provides information about the new features and functionality provided to support the VPDN tunnels.

Topology

This subsection describes the VPDN-related topology enhancements. See "Chapter 4 - Creating the Topology" in the 4.0 Netsys Connectivity Service Manager General Reference Guide for detailed information about topology features.

    1. Network Access Servers (NAS) are displayed in Level-3 topology views. Cisco NSM determines that a router is a NAS by checking for the presence of the following commands in a router configuration file: aaa authentication ppp, vpdn enable, and vpdn outgoing. The routers having NAS functionality are indicated by a NAS icon (multidirectional, curved arrows drawn within a rectangle), rather than the standard Cisco router icon.

    2. Provisioned VPDN tunnels are displayed in a new logical VPDN Topology View window. You can view the following in the VPDN topology view:

        (a) The location of the VPDN tunnels that are provisioned (not the active tunnels). This entails displaying the links between the NASs and the home-gateways at the other end of the VPDN tunnels.

        (b) The grouping of home-gateways that belong to the same organization.


Note When Cisco NSM 4.1 communicates with the Cisco UCP 1.0 product, VPDN tunnels provisioned with Cisco IOS commands in the NASs and AAA servers are displayed in the VPDN Topology View window. When communication between Cisco NSM 4.1 and Cisco UCP 1.0 does not exist, only the VPDN tunnels provisioned with Cisco IOS commands in the router configuration files, are displayed in the VPDN Topology View window.

Wizard Manager

This subsection describes the "Run VPDN Collection And Web Reports" wizard. This wizard allows you to:

See "Chapter 7 - Wizard Manager" in the 4.0 Netsys Connectivity Service Manager General Reference Guide for detailed information about the Wizard Manager.

Report Manager

This subsection describes the new VPDN-related reports added to the Report Manager. See "Chapter 5 - Report Manager" in the 4.0 Netsys Connectivity Service Manager General Reference Guide for detailed information about the Report Manager.

    1. VPDN Inventory Report. This report is generated when you double-click on the "VPDN Inventory Report" entry. This report provides you a list of the VPDN tunnels defined in the baseline router configuration files and/or that are added to a AAA server (when Cisco NSM is communicating with the Cisco UCP product). The information provided in this report includes the source router name, domain name, home gateway address, tunnel ID, and tunnel source (local, RADIUS, or TACACS+).

    2. AAA Inventory Report. This report is generated when you double-click on the "AAA Inventory Report" entry. This report provides you a list of the AAA servers defined in the baseline router configuration files. The information provided in this report includes the baseline router names providing AAA services and their associated AAA server/proxy names or addresses, and the protocol used for authentication (local, RADIUS, or TACACS+).

Integrity Checks

This subsection describes the VPDN-related integrity checks added in this release. See "Appendix A - Baseline Integrity Checks" in the 4.0 Netsys Connectivity Service Manager General Reference Guide for detailed information about the integrity checks performed by the Cisco NSM software.

    1. AAA: RADIUS Server Host Not Specified

    2. AAA: TACACS+ Server Host Not Specified

    3. PPP: Defined Authentication List Name Not Used

    4. PPP: PPP Not Configured on Virtual Template

    5. PPP: Undefined Authentication List Name

    6. VPDN: Local VPDN Definitions Cannot be Used

    7. VPDN: Undefined Virtual Template

Policies

This subsection describes the VPDN-related implicit policies added in this release. See Section 2.2 "Policy Sets Window," in the 4.0 Netsys Connectivity Service Manager Analysis Reference Guide for detailed information about policy sets.

    1. NAS to AAA Server

    2. VPDN Tunnels

Cisco IOS Commands Modeled

This subsection describes the VPDN-related Cisco IOS commands currently modeled in this release. See "Appendix A - Cisco IOS Commands Modeled" in the 4.0 Netsys Connectivity Service Manager Analysis Reference Guide for detailed information about the Cisco IOS commands modeled by the Cisco NSM software.

    1. "aaa authentication local-override"

    2. "aaa authentication ppp {default | <list-name>} <method1> [...[<method4>]]"

    3. "aaa authorization {network | exec | command <level>} <method>"

    4. "aaa new-model"

    5. "group-range <low-end-of-range> <high-end-of-range>"

    6. "interface group-async <number>"

    7. "interface virtual-template <number>"

    8. "ip host <name> [<tcp-port-number>] <address1> [<address2> .. <address8>]"

    9. "ppp authentication {chap | chap pap | pap chap | pap} [if-needed [<list-name> | default] [call-in]"

    10. "ppp multilink"

    11. "radius-server host {<hostname> | <ip-address>}"

    12. "tacacs-server directed-request"

    13. "tacacs-server host <hostname> [single-connection] [port <integer>] [timeout <integer>] [key <string>]"

    14. "vpdn enable"

    15. "vpdn force-local-chap"

    16. "vpdn incoming {<remote-name>} {<local-name>} virtual-template <number>"

    17. "vpdn outgoing {<domain-name>} {<local-name>} ip <address>"

    18. "vpdn source-ip <address>"

Cisco Router Attributes Supported

This subsection describes the VPDN-related Cisco router attributes available through the router configuration windows. You can modify these router attributes with the GUI editor and then invoke "what-if" analysis.


Note For the Cisco NSM 4.1 release, descriptions of the VPDN-related configuration windows are only provided in HTML format in the $ECSP_HOME/help/analysis_Conn/vpdn.html file.
Router Window

The following modifications were made to the Router window:

    1. A "Network Access Security" button was added. You click on this button to display the Network Access Security Info window. You can do the following through this window:

        (a) enable AAA on the router

        (b) create/view/delete TACACS Server Hosts

        (c) enable/disable Direct Requests

        (d) create/view/delete RADIUS Server Hosts

        (e) create/view/delete AAA Authentication PPP methods

        (f) enable/disable Local Override

        (g) specify/view/delete AAA Authorization types, levels, and/or methods.

    2. A "VPDN Configuration" button has been added. You click on this button to display the VPDN Configuration Info window. You can do the following through this window:

        (a) enable/disable VPDN

        (b) add/view/delete incoming and outgoing connections

        (c) force local CHAP

        (d) assign a new or clear an existing source IP address.

    3. An "IP Hosts" button has been added. You click on this button to display the IP Hosts window. You can add/view/delete static IP host name-to-address mapping(s) in the host cache through this window.

Router Interface Window

A "Configured PPP" button has been added. This button is only displayed when a virtual-template interface exists on the router. You click on this button to display the Configure PPP window. You can add/modify/delete Point-to-Point Protocol interface attributes through this window.

New Elements Window

GRE (generic routing encapsulation) has been added to the list of viable transport layer protocol type options for extended IP access lists. GRE is a tunneling protocol developed by Cisco that can encapsulate a wide variety of protocol packet types inside IP tunnels, creating a virtual point-to-point link to Cisco routers at remote points over an IP internetwork. By connecting multiprotocol subnetworks in a single protocol backbone environment, IP tunneling using GRE allows network expansion across a single-protocol backbone environment.

Cisco MC3810 Support

This subsection provides a brief overview of the new features and functionality provided to support the Cisco MC3810. Cisco MC3810s are access products that provide multiservice switching access concentrator functionality to your site's network while introducing the ability to transport data, video, and voice traffic. The units can be used in an office or laboratory setting. Managing a variety of data and voice traffic types, Cisco MC3810 systems optimize your network's bandwidth with protocol synchronization and negotiation. Cisco MC3810 models offer T1 and E1 data and voice integration. The MC3810 also supports standard Cisco IOS IP, IPX, bridging, and SNA functionality.

The MC3810 configuration files are supported in the same manner as other Cisco router configuration files. That is, the Cisco NSM product must have access to the MC3810 configuration files in order to create a baseline model of your network. Initially, you provide access to the configuration files in one of the following manners:

For detailed information about creating and subsequently opening a baseline model of your network, see "Chapter 2 - Creating and Opening a Baseline" in the Netsys Connectivity Service Manager User's Guide.

Once you have created and opened the baseline, you can collect the router/MC3810 configuration files, router type information, and/or Frame Relay/ATM PVC, and IP unnumbered information by invoking the "Collect/Import Cisco Configurations" wizard through the Wizard Manager or Scheduler. Prior to invoking this wizard, you must ensure the Device Password Database contains the MC3810 router names, user IDs, and password information. You accomplish this by invoking the Wizard Manager's "Administer Password Database" wizard. This wizard allows you to add new devices, and update or delete device related values for particular device entries in the table.


Note The Cisco NSM software initially builds the baseline topology views from the information contained in the baseline router/MC3810 configuration files. You can augment the information obtained from the configuration files and thereby, obtain a more complete rendering of your topology, by invoking the Wizard Manager's "Collect/Import Cisco Configurations", "Collect Frame Relay/ATM PVC Information", and/or "Run Service Management Collection and Web Reports" wizards. The wizards step you through setting up the types of collections you want to perform on the routers/MC3810s you specify. You must ensure the Device Password Database contains the MC3810 router names, user IDs, and password information mentioned above, to run these wizards.

For detailed information about the Wizard Manager, see "Chapter 7 - Wizard Manager" in the Netsys Connectivity Service Manager General Reference Guide.

Topology

This subsection describes the MC3810-related topology enhancements. See "Chapter 4 - Creating the Topology" in the 4.0 Netsys Connectivity Service Manager General Reference Guide for detailed information about the topology features.

    1. The standard Cisco router icon is used to depict the MC3810. The router icon is colored white when you select the "Cisco Router Types" Data Visualization scheme.

    2. Logical connectivity between MC3810s and other network devices is shown in Level-3 topology views.

    3. A Voice view is available through the Views pane in the Topology Manager window. You double-click on the Voice entry to display the MC3810s and their interfaces supporting POTS (Plain Old Telephone Service) and only the routers and PVCs involved in vofr (voice over Frame Relay), vtoa (Voice and Telephony over ATM), and vohdlc (voice over HDLC). The POTS interfaces are represented by a triangular shaped icon which is connected to an MC3810 device icon.

    4. A new button with a triangle icon as its label ("Show Voice Plain Old Telephone Service Labels") has been added to the Labels pane in the Topology View windows. This button allows you to display the Voice POTS labels.

    5. You can test whether a path exists between an MC3810 device and a voice POTS interface on another MC3810, by using the QuickPath feature in the Voice Topology View window. First you click the left mouse button on an MC3810 icon to select that device as the source device, then you click the left mouse button within the Source field. Next you click the left mouse button on a voice POTS icon, then you click the left mouse button within the Destination field. With the source and destination fields populated, you next click on the Show Voice Path button. At this point, the Cisco NSM product determines whether a voice path exists between the two locations, with the results displayed in the Policies Analysis window. When the path status in the Policies Analysis window is set to OK (a path exists), a pink line (default color) is drawn from the source device icon to the destination voice POTS icon in the Voice Topology View window.

Wizard Manager

The "Collect/Import Cisco Configurations" wizard was modified to allow the collection of MC3810 router configuration. See "Chapter 7 - Wizard Manager" in the 4.0 Netsys Connectivity Service Manager General Reference Guide for detailed information about the Wizard Manager.

Report Manager

This subsection describes the new MC3810-related "Voice Routing Loops and Dangling Routes" report added to the Report Manager. This report provides you a list of the routing loops and dangling routes detected by the Cisco NSM product.

A voice routing loop is created when the voice path defined by the dial-peer destination-pattern statements in the MC3810 configuration files originate and terminate at the same MC3810.

A voice dangling route occurs when the voice path defined by the dial-peer destination-pattern statement in an MC3810 configuration file does not match a dial-peer destination-pattern statement in one of the MC3810s along the path to the destination, effectively terminating the path at that point.

Integrity Checks

This subsection describes the new MC3810-related integrity checks. See "Appendix A - Baseline Integrity Checks" in the 4.0 Netsys Connectivity Service Manager General Reference Guide for detailed information about the integrity checks performed by the Cisco NSM software.

    1. CES: Circuit Emulation Mapped to Non-Existent or Shutdown Interface

    2. CES: Circuit Emulation Mapped to Non-Existent ATM PVC

    3. CES: Clock Configuration Problem

    4. CES: Low Peak and Average Rates Set On ATM PVC

    5. CES: Wrong AAL Encapsulation On ATM PVC

    6. Dial-Peer: Next Hop Router Contains No Route

    7. Dial-Peer: Non-Existent Or Shutdown Interface

    8. Dial-Peer: Non-Existent Or Shutdown Voice Port

    9. Dial-Peer: Non-utilized "dial-peer" Statement

    10. FR-ATM: Frame-Relay DLCIs Mapped To Multiple ATM VCDs

    11. FR-ATM: Frame-Relay PVC Mapped to Non-Existent ATM PVC

    12. FR-ATM: Wrong AAL Encapsulation On ATM PVC

    13. VOATM: Target ATM PVC Does Not Exist

    14. VOATM: Wrong AAL Encapsulation On ATM PVC

    15. VOFR: Frame Relay Map-Class Configuration Problem

    16. VOFR: Frame Relay PVC Must Have Voice Encapsulation

    17. VOFR: Target Frame Relay PVC Does Not Exist

    18. VOHDLC: Configuration Problem

Cisco IOS Commands Modeled

This subsection describes the MC3810-related Cisco IOS commands currently modeled. See "Appendix A - Cisco IOS Commands Modeled" in the 4.0 Netsys Connectivity Service Manager Analysis Reference Guide for detailed information about the Cisco IOS commands modeled by the Cisco NSM software.

    1. "atm pvc <vcd> <vpi> <vci> <aal-encap> [<peak> <average> <burst>] \
    [oam <seconds>] [inarp <minutes>] [compress]"

    2. "<protocol> <protocol-address> atm vc {<vcd>} [broadcast]"

    3. "ces connect <atm-interface> <vcd>"

    4. "clock rate network [<rate>]"

    5. "dial-peer voice <tag> {pots | atm | frame-relay | hdlc}"

    6. "encapsulation <encapsulation-type>"

    New encapsulation types (atm and atm-ces) are now supported. atm encapsulation is only supported on the serial 2 interface. atm-ces is supported on the serial 0 and
    serial 1 interfaces.

    7. "frame-relay class <name>"

    This interface configuration command is used to associate a map class with an interface or subinterface.

    8. "frame-relay interface-dlci <dlci> [voice-encap [<size>]]"

    This interface configuration command is used to assign a data link connection identifier (DLCI) to a specified Frame Relay subinterface on the router.

    9. "frame-relay traffic-rate <average> <peak>"

    This map-class configuration command is used to configure all of the traffic shaping characteristics of a virtual circuit in a single command.

    10. "fr-atm connect dlci {<dlci>} {<atm-interface>} {<vcd>}"

    This interface configuration command is used to map a Frame Relay DLCI to an ATM VCD. The encapsulation type of the current interface must be Frame Relay or Frame Relay 1490 (IETF). For the MC3810 device, this command is enabled only for a fr-atm-interworking interface.

    11. "interface fr-atm <number>"

    This global configuration command is used to enter the Frame Relay ATM interworking configuration mode. The "shutdown" and "fr-atm connect" subcommands are supported when in Frame Relay ATM interworking mode.

    12. "map-class atm <name>"

    This global configuration command is used to define quality of service (QOS) parameters that are associated with a static map for a switched virtual circuit (SVC).

    13. "map-class frame-relay <name>"

    This global configuration command is used to specify a map class to define Frame Relay traffic shaping parameters for an interface or virtual circuit.

    14. "map-group <group-name>" (ATM)

    This interface configuration command is used to associate a map list with a specific interface.

    15. "map-list <name>" (ATM)

    A static map maps the protocol address and the ATM address of the next hop ATM station. The router supports a mapping scheme that identifies the ATM address of remote hosts and servers. This address is specified as a virtual circuit descriptor of a PVC.

    The global configuration map-list command specifies the map list to which the subsequent map commands belong. These map commands identify destination addresses. One map list can contain multiple map entries. A map list can be referenced by more than one interface or subinterface.

    16. "network-clock base-rate [56k | 64k]"

    This global configuration command is used to configure the network's phase-lock-loop (PLL) clock type.

    17. "voice-port"

    This configuration command is used to enter voice port configuration mode. The "shutdown" subcommand is supported when in voice port configuration mode.

    18. "voice-encap {<size>}"

    This configuration command is used to define the data fragmentation in a FRF-12 fashion for HDLC to support voice.

Cisco Router Attributes Supported

This subsection describes the MC3810-related Cisco router attributes currently supported. You can modify the supported router attributes and then invoke "what-if" analysis. See the 4.0 Netsys Connectivity Service Manager Analysis Reference Guide for detailed information obtaining access to the router attributes.


Note For the Cisco NSM 4.1 release, descriptions of the MC3810-related configuration windows are only provided in HTML format in the $ECSP_HOME/help/analysis_Conn/3810.html file.
Router Window

The following modifications were made to the Router window:

    1. A Voice Port List pane has been added. A list of the voice module's slot (0 for trunk channels, 1 for analog and digital) and port (analog voice: 1 through 6, digital T1: 1 through 24, digital E1: 1 through 15, 17 through 31) numbers are provided.

    2. A Network Clock Base Rate text field has been added. You can specify either 56k (default) or 64k.

    3. A Configured Voice Info button has been added. You click on this button to display the Voice Info window. You can do the following using this button:

        (a) add a new dial peer voice list entry or view/delete an existing dial peer voice list entry

        (b) add a new dial and/or destination pattern or view/delete an existing dial and/or destination pattern.

    4. A Map Classes button has been added. You click on this button to display the Map Classes window. You can add a new Frame Relay map class or view/delete an existing Frame Relay map class using this button.

    5. A Map List button has been added. You click on this button to display the Map List window. You can add a Frame Relay new map list or view/delete an existing Frame Relay map class through this window.

Router Interface Window

The following modifications were made to the Router Interface window:

    1. A Clock Rate Network text field has been added. You specify the serial interface's PLL (Phase-Lock-Loop) clock rate in this field. You can specify a value ranging from 56000 through 3968000, however the value must be a multiple of either 56k or 64k, depending on the network clock value set by the "network-clock base-rate" command.

    2. A Frame Relay Info button has been added. This button is only displayed for interfaces with Frame Relay encapsulation. You click on this button to display the Frame Relay Info window. You can assign a Frame Relay class name and add/modify/delete DLCI interface attributes through this window.

    3. An ATM Info button has been added. This button is only displayed for serial interfaces with ATM encapsulation. You click on this button to display the ATM Interface Info window. You can add/modify/delete ATM PVCs through this window.

    4. A Frame Relay/ATM Interworking Info button has been added. This button is only displayed for Frame Relay/ATM interfaces. You click on this button to display the Frame Relay/ATM Interworking Info window. You can add/modify/delete Frame Relay/ATM Map PVC List entries through this window.

    5. An ATM-CES Interface Info button has been added. This button is only displayed when a serial interface supporting ATM-CES (Circuit Emulation Service) encapsulation exists on the router. You click on this button to display the ATM-CES Interface Info window. You can add/modify/delete ATM interfaces supporting CES through this window.

Policies

This subsection describes the "Voice over IP" implicit policy added in this release. This policy applies to Cisco 3600 and AS5300 devices. See Section 2.2 "Policy Sets Window," in the 4.0 Netsys Connectivity Service Manager Analysis Reference Guide for detailed information about policy sets.

Voice over IP is configured using a dial-plan composed of the following forwarding rules:

    1. dial-peer voice <rule#> voip

    2. destination-pattern <phone-number>

    3. session target ipv4:<next-hop-ip-address>

This implicit policy verifies IP connectivity, using UDP port 16000, to the above mentioned <next-hop-ip-address>.

General Enhancements

This subsection provides information about the remainder of the Cisco NSM 4.1 features and functionality added in this release.

Web Server Support

In Cisco NSM releases prior to 4.1, Cisco NSM provided viewing access to HTML reports, Java-based topologies, and on-line Help through a Web browser using a file system-based URL (for example, file://localhost/usr/netsys_data/perf.tutorial). The Cisco NSM 4.1 release now provides a Web server, making the HTML reports, Java-based topologies, and on-line Help available to Web browsers not having access to the file system.

By default, the Web server is not used by Cisco NSM when accessing Help functionality and the Web reports. You click on the Administer Web Options button in the Schedule window, then click on the Client Access tab in the Administer Web Options window to specify whether the logs, Web reports, and on-line Help are accessed directly from the file system or through a Web server.

You click on the View Home Page button in the Schedule window to obtain access to the Netsys Web server's home page.

By default, the Web server is not running. To start the Web server:

Step 1 Click on the Schedule button in the Cisco Netsys window.

The Schedule window is displayed.

Step 2 Click on the Administer Web Options button in the Schedule window.

The Administer Web Options window is displayed.

Step 3 Click on the Web Server tab in the Administer Web Options window.

The Status pane informs you whether the Web Server is currently running.

Step 4 Click on the Reset Server button to invoke the Web Server.

By default, the Web server is invoked on port 8015. The Web server is configured with the locations of the on-line Help directory and the baseline directories (specified by the $ECSP_DATA environment variable). The baselines and on-line Help are made accessible through links on the home page at http://<hostname>:<port>, as well as being directly accessible from launch points throughout the Cisco NSM software.


Note By default, the Web server is a publicly available httpd process. It provides nonsecure read only access to the entire contents of the $ECSP_DATA directory. To protect the contents of the $ECSP_DATA directory, you must configure Web server security, as described below.

You can add additional data directory mappings using the Mappings button (other than $ECSP_DATA), to the Web server's home page and modify the Web server's port number and home page configuration settings (using the Advanced button) through the Administer Web Options window.

When you click on the Mappings button, the $ECSP_HOME/resources/httpd/conf/mapping.conf file is opened. When you click on the Advanced button, the $ECSP_HOME/resources/httpd/conf/server.conf file is opened. Both files are opened using the text editor specified by the EDITOR environment variable. Upon editing the mapping.conf and/or server.conf files, you must click on the Reset Server button, thereby incorporating the configuration changes you made into the Web server.

Web Server Security

By default, the Cisco Netsys Web server ships without any security restrictions enabled. When the port number on which the Web server operates is known, access to the data contained in your baselines (such as configuration files) is available.

Turning Off the Web Server

Turning off the Web server is the easiest and most secure way to ensure no one can access your baselines through a Web browser. By default, Cisco NSM 4.1 ships with the Web server turned off. To turn off the Web server, you must:

Step 1 Remove the Web server entry from the Scheduler. When you start the Web server, an entry is added to the Cisco NSM Scheduler and a check is found running, the Scheduler restarts it. You must remove this entry to ensure the Cisco NSM Scheduler does not restart the Web server after you kill it.

Step 2 Kill the running Web server. After removing the entry from the scheduler_file, you must kill the Netsys Web server. Three processes are associated with the Netsys Web server; one parent and two child. Search for the tclsh string, then kill the associated process (the child processes are also killed.) For example, from a C Shell command line prompt:

Configuring Web Server Security

The Cisco NSM Web server implements host filtering and basic HTTP authentication in a manner similar to that of NCSA's Web server, httpd. With host filtering, you can allow or deny access based on a client's domain or IP address. With basic authentication, you can require the user to enter an ID and a password. Basic HTTP authentication is a widely used standard that many Web servers implement. A description of Basic HTTP authentication and how to set it up can be found on many Internet Web sites, for example, http://hoohoo.ncsa.uiuc.edu/docs/tutorials/user.html. Much of the description below was based on this document.

In terms of its security, basic HTTP authentication does not send the user ID and passwords over the network in clear text. Instead, they are uuencoded.

Note, every time you change Web server security, you should kill and restart the Web server as described above.

Host Filtering

The Cisco NSM Web server reads a .htaccess file from each directory that needs to be protected (note, this also protects all subdirectories on the file system). To experiment with these, you can try placing a .htaccess file within the $ECSP_HOME/resources/httpd/htdocs directory. Note, an access.conf file does not exist as with other Web servers based on NCSA httpd. Following is a sample .htaccess file using host filtering (based on IP address) allowing access from 129.129.129.28:

AuthUserFile /dev/null
AuthGroupFile /dev/null
AuthName WebAdministration
AuthType Basic
 
<Limit GET>
order deny,allow
deny from all
allow from 129.129.129.28
</Limit>
 

Ensure the .htaccess file has an IP address different from the IP address of the machine where your Web browser is running. The AuthUserFile, AuthGroupFile, AuthName, and AuthType fields are used below in basic authentication and can be left to the default values.

Place the .htaccess file within the $ECSP_HOME/resources/httpd/htdocs directory, and try accessing the Web server and port (by default, http://<hostname>:8015) from your Web browser. You should be presented with the following message:

Got the error Permission denied
while trying to obtain /index.html.

Following is a sample .htaccess file using host filtering that allows an entire subnet:

AuthUserFile /dev/null
AuthGroupFile /dev/null
AuthName WebAdministration
AuthType Basic
 
<Limit GET>
order deny,allow
deny from all
allow from 129.129.129.28
</Limit>
 

Following is a sample .htaccess file using host filtering based on a name instead of an IP address:

AuthUserFile /dev/null
AuthGroupFile /dev/null
AuthName WebAdministration
AuthType Basic
 
<Limit GET POST>
order deny,allow
deny from all
allow from .cisco.com
</Limit>
 

Both the client hostname and IP address are checked against the allow and deny specifications. By default, IP address specifications have a wildcard character appended during the matching, while hostname specifications have a wildcard prepended. In the two examples above, 129.129.129. is treated as 129.129.129.*, thus, it allows any IP address with the high-order octets 129.129.129. The .cisco.com is treated as *.cisco.com, thus, it allows any hostname ending in .cisco.com. To override this behavior, use "*" as a wildcard character in the allow and deny specifications. For example, "allow from *129*" allows access to any client with 129 in its hostname or IP address.

Basic HTTP Authentication

Basic HTTP authentication uses user ID/password combinations. Note, the Web server uses users/passwords that are not related to the UNIX users/passwords (as in the /etc/passwd file). The set of users allowed access to a given directory and subdirectories is specified in the .htaccess file. The user ID/password mapping is specified in other files specified in the AuthUserFile and AuthGroupFile fields. For example, to create basic HTTP authentication for the sampleuser user using the samplepw password you must:

Step 1 Create a .htaccess file in the $ECSP_HOME/resources/httpd/htdocs directory as follows:

    AuthUserFile /<mydirectory>/.htpasswd
    AuthGroupFile /dev/null
    AuthName WebAdministration
    AuthType Basic
     
    <Limit GET>
    require user sampleuser
    </Limit>
    

The AuthUserFile and AuthGroupFile fields specify where the password files are located. In the above example, AuthGroupFile is set to /dev/null as groups are not used.

The AuthName field is the name of the set of documents of the Web server you are attempting to secure. The AuthName field is presented to the user when asking for a password during basic authentication and is saved by the Web browser so when you attempt to reaccess the same page, or another page in the same AuthName set of documents, the Web browser automatically enters the user ID/password values.

Step 2 Create the password file. Within the file you reference in the AuthUserFile line above, you must add a line for the user. This line can be generated using a Perl program that is shipped with Cisco NSM 4.1. Assuming $ECSP_HOME/bin is defined in your path, invoke:

    host% execperl.sh $ECSP_HOME/resources/perl/htpasswd.pl sampleuser \ samplepw
    Executing perl script: /usr/myuser/netsys/resources/perl/htpasswd.pl
    sampleuser:jQcji9e7OUCJs

Step 3 Add the line with the user name and encrypted password (sampleuser:jQcji9e7OUCJs in the above example) and add it to the /<mydirectory>/.htpasswd file.

Step 4 Restart the Web server, then try accessing it with your Web browser. You should be prompted to enter user and password values. When you do not specify sampleuser and samplepw, you should not be able to access the Web server.

Basic HTTP Authentication with Multiple Usernames/Passwords

Support for multiple users is provided through the use of groups. The steps are very similar to the single user case.

Step 1 Add the multiple user entries to the /<mydirectory>/.htpasswd file. You can use the output from htpasswd.pl command to accomplish this.

Step 2 Create the group file. Create a file called /<mydirectory>/.htgroup where the list of users from the password file is assigned to a group name. The format is as follows (usernames are listed on the right with spaces as delimiters):

    samplegroup: sampleuser sample1 sample2 sample3
     
    

Step 3 Modify the $ECSP_HOME/resources/httpd/htdocs/.htaccess file. You should replace the /dev/null that was being used for the AuthGroupFile within the /<mydirectory>/.htgroup file. In the required statement, you should now say
"require group samplegroup" instead of "require user sampleuser".

Restricting Access to Specific Directories

The examples above assumed the .htaccess file was being placed into the $ECSP_HOME/resources/httpd/htdocs directory. This protects the "home page" of the Web server, for example, when a user tries to access http://: (for example, http://myhost:8015). The home page that is generated by the Cisco NSM Web server has links to baseline logs and reports. In order to restrict access to specific baselines and directories under the baselines, more security needs to be configured. This involves the use of more .htaccess files distributed throughout your baseline directories.

Protecting All Baselines

In order to protect all baseline directories and their subdirectories, you must place a .htaccess file within every directory specified in the $ECSP_HOME/resources/httpd/conf/mapping.conf file. For example, suppose a mapping statement maps your /baselines/netsys_data directory to your $ECSP_DATA directory (mapping /baselines/netsys_data to /usr/myuser/netsys_data). You must place a .htaccess file within the /usr/myuser/netsys_data directory. This places security on every baseline within the /usr/myuser/netsys_data directory.

Protecting Specific Baselines

When you want some baselines accessible and others not, you must place a .htaccess file within each baseline directory you want protected.

Protecting Specific Baseline Subdirectories

When you want to provide access only to specific baseline subdirectories, (for example, the reports and logs subdirectories, but do not want to allow access to the config subdirectory, you must place a .htaccess file within the config subdirectory.

Access and Error Logs

The Cisco NSM Web server's logs are located in the $ECSP_HOME/resources/httpd/logs directory. A daily access log file with the name log<port and date> (for example, log801598.03.02). A file named log<port> ending in error (for example, log8015error) containing errors and debug information also exists. Following is a sample entry resulting when someone from an unauthorized IP address tries to access the Web server:

[02/Mar/1998:10:27:46] sock14
[02/Mar/1998:11:07:17] sock14 AuthVerifyNet {access denied to dummyhost.dummydomain.com (129.129.129.1) in htdocs}
[02/Mar/1998:11:07:17] sock14 Error 403 /index.html {}

You can periodically check the error log to see when unauthorized access has been attempted.

Topology

This subsection describes the topology related enhancements. See "Chapter 4 - Creating the Topology" in the 4.0 Netsys Connectivity Service Manager General Reference Guide for detailed information about the topology features.

    1. You can now add serial links between IP Unnumbered ATM interfaces. You accomplish this by invoking the Add Serial Link option from a Topology View window.

    2. An ATM subview is now available. You click on the ATM button in the Subview pane in a Topology View window to display the baseline routers with ATM interfaces.

Wizard Manager/Scheduler

This subsection describes the Wizard Manager and Scheduler related enhancements. See "Chapter 7 - Wizard Manager" in the 4.0 Netsys Connectivity Service Manager General Reference Guide for detailed information about the Wizard Manager. See "Chapter 1 - Netsys Scheduler" in the 4.0 Netsys Scheduling and Web Reports Guide for detailed information about the Scheduler.

    1. The collection of traffic data from Bay Networks hubs is no longer supported.

    2. The "Collect Cisco Configurations from CiscoWorks Hosts" wizard allows you to schedule the collection of Cisco router configuration files from hosts running the 1.3 version of CiscoWorks. A CiscoWorks Host option has been added to the device list in the "Administer Password Database" wizard. Following are the requirements and steps you must follow for this wizard to function properly:

        (a) CiscoWorks related environment variables must be set in the user's profile for the Login User ID on the CiscoWorks host machine.

        (b) You must do the following:

        * download the CW_Connectivity.tar.Z file from    "ftp://www.cisco.com/pub/netmgmt/ciscoworks"

        * uncompress the CW_Connectivity.tar.Z file

        * copy the CW_Connectivity.tar file to the $NMSROOT/etc directory on the    CiscoWorks host machine

        * untar the $NMSROOT/etc/CW_Connectivity.tar file

        * set the file's permissions to 755 (chmod $NMSROOT/etc/CW_Connectivity.tar 755).

        (c) You must add the following CiscoWorks host information to the Device Password Database (through the "Administer Password Database" wizard):

        * Login User ID: the UNIX login user name (note, this login name must be a part of the    CiscoWorks group on the CiscoWorks host machine)

        * Login Password: the UNIX login user password

        * CiscoWorks User ID: the login user name required to login to CiscoWorks

        * CiscoWorks Password: the login password required to login in CiscoWorks.

        (d) You must invoke the "Collect Configurations from CiscoWorks Hosts" wizard from either the Wizard Manager or Scheduler. When the wizard starts, you must:

        * choose the desired CiscoWorks host

        * specify the qualified path to the directory where tftp is running on the CiscoWorks host

        * choose the domain containing the configuration files you want to collect

        * choose the routers whose configuration files you want to collect

        * specify whether the collected configuration files are to be saved to the baseline Data    Repository and baseline directories or to an alternative directory

        * schedule this event.

    3. The "Collect Serial IP Unnumbered Information" wizard allows you to collect IP unnumbered connectivity information, using the "show cdp neighbors" command, from the routers you specify.

    4. The "Run Web Reports", "Run Service Management Collection and Web Reports", and "Run VPDN Collection and Web Reports" wizards were modified to allow you to generate Cisco NSM Web based reports in Java format, as well as in HTML format.

    5. The "Collect Frame Relay PVC Information" wizard was modified to allow you to also collect ATM PVC information. ATM PVC information is collected from the end points of the dynamically mapped ATM PVCs when the inarp option is specified with the atm pvc command. The following show commands are used to gather this information: "show ip arp", "show cdp neighbors detail", and "show ip interface brief". This wizard is now entitled: "Collect Frame Relay/ATM PVC Information".

    6. The "Run Service Management Collection and Web Reports" wizard was modified to allow you to collect MIB performance data, Cisco router types, Frame Relay, ATM, and/or IP unnumbered information, in addition to Cisco router configuration files from the routers you specify, prior to generating (using the latest configuration information collected) the Web based reports you specify.

    7. The "Collect/Import Cisco Configurations" wizard was modified to allow you to collect Cisco router types, Frame Relay, ATM, and/or IP unnumbered information, in addition to Cisco router configuration files from the routers you specify.

    8. The "Administer Password Database" wizard was modified allowing you to specify the enable mode level. Valid level values range from 0 through 15.

    9. The "Create a Tar File From Baselines" wizard allows you to copy the contents of one or more baselines, to a new tar file in the directory you specify. You can then retrieve the information contained in this tar file by invoking the "Administer/Untar Baseline Data" wizard (described below). As baseline logs and reports directories can be very large, you have the choice of not including them (this is the default) on the tar file.

    10. The "Administer/Untar Baseline Data" wizard provides the following options:

        (a) retrieve the baseline data that was created by the "Create a Tar File From Baselines" wizard.

        (b) copy a baseline's Device Password Database, or copy Repository data from one baseline to an existing baseline, or delete Repository data from a baseline.

    11. A Reschedule button was added to the Scheduler window allowing you to reschedule an expired or yet-to-be run wizard. You select an entry in the Current Schedule pane pertaining to the task you want to reschedule, then you click on the Reschedule button.

    12. An Active/Inactive button was added to the Scheduler window allowing you to change the state of an active wizard (currently scheduled) to inactive, or the state of an inactive wizard (currently not scheduled) to active. You must select an entry in the Current Schedule pane pertaining to the task you want to activate/deactivate prior to clicking on the Active/Inactive button.

    13. The "Collect Performance MIB Data" wizard was modified allowing you to specify a description to be used for the collected Performance MIB data.

    14. Upon completion of the "Collect Performance MIB Data" wizard, detailed information about the MIB data collection process is made available to you through the Details button in the
    Data - Performance MIB Data window. This window is displayed when you click on the Data button in the Cisco Netsys window and you then select the "Performance MIB Data" tab in the Data - Summary window.

Java Reports

This subsection describes the new feature allowing you to create Java formatted reports.

    1. You can now choose to generate the Web reports in Java or HTML format through the Wizard Manager's "Run Web Reports" wizards. In many cases, Java formatted reports can represent a sixty percent or greater savings in disk space over HTML formatted reports.

    2. You can filter, suppress, and sort the information displayed in the Java formatted reports.

    3. The Save/Print button in the Java Report window converts the report to the selected format (ASCII text, HTML, and CSV (Comma Separated Values) and places the results in a new Web browser window. You can then print from the Web browser window or use the Web browser's Save As feature to save the report.

    4. You have the option of saving Java reports in CSV format, making it possible for you to import the reports into various spreadsheet programs.

    5. When saving text or CSV formatted reports from a 3.0 or 4.0 Netscape Navigator browser, you must change the "Format for Saved Document:" in the Netscape Save As window from Source to Text. You should leave it set to Source for saving HTML formatted reports.


Note Java formatted reports contain symbolic links to some third party libraries. To export Java reports to another host, the linked files must also be exported. To archive the auto-report directory and follow the symbolic links, you must use the -h option with the tar command. This allows the report directory to be de-archived on a different host, while maintaining Java functionality. Following is an example that creates a complete tar file named java_archive.tar:

host% tar cvfh java_archive.tar \
/$ECSP_DATA/<baseline-name>/reports/auto_reports_0.0.12_FEB_98_07_37_00

Integrity Checks

This subsection describes the ATMUndefined Map-List integrity check added in this release. See "Appendix A - Baseline Integrity Checks" in the 4.0 Netsys Connectivity Service Manager General Reference Guide for detailed information about the integrity checks performed by the Cisco NSM software.

The interface configuration command "map-group <name>" associates a map-list with the interface (or sub-interface). The map-list, where a protocol and address is associated with an ATM PVC, should be defined using the global configuration command "map-list <name>". When the map-list is not defined, this high-severity warning is issued.

Cisco IOS Commands Modeled

This subsection describes the new "ip split-horizon eigrp <as#>" Cisco IOS command currently modeled. See "Appendix A - Cisco IOS Commands Modeled" in the 4.0 Netsys Connectivity Service Manager Analysis Reference Guide for detailed information about the Cisco IOS commands modeled by the Cisco NSM software.

The "ip split-horizon eigrp <as#>" interface configuration command is used to enable/disable EIGRP split horizon functionality. By default, split-horizon is enabled for all interface types for EIGRP.

Cisco Router Attributes Supported

This subsection describes the new Cisco router attributes currently supported. You can modify the supported router attributes and then invoke "what-if" analysis. See the 4.0 Netsys Connectivity Service Manager Analysis Reference Guide for detailed information obtaining access to the router attributes.

Router Interface Window

A Disable EIGRP Split Horizon button has been added to the Router Interface window. You click on this button to specify the EIGRP Autonomous System ID, where the EIGRP split horizon feature is to be disabled. By default, split-horizon is enabled for all interface types for EIGRP.

IP Access List Window

    1. This window has been reformatted. The source and destination operator and port information is now displayed in a column entitled Elements - Src Op/Port and Elements - Dest Op/Port, respectively.

    2. A new column entitled Elements - Connection has also been added to this window. established is displayed in this column to indicate an established TCP connection. Otherwise, this column is blank.

Policies

This subsection describes the Static IP Hosts implicit policy added in this release. See Section 2.2 "Policy Sets Window," in the 4.0 Netsys Connectivity Service Manager Analysis Reference Guide for detailed information about policy sets.

The Static IP Hosts implicit policy identifies whether the router can connect to each of the host addresses specified with the "ip host <host-name> <ip_address>" commands specified in the router's configuration file. The results of the connectivity analysis are displayed in the Policies Analysis window. When IP connectivity does not exist, diagnostic reports are provided to help you identify the cause of the problem(s).

Additional getconfig Options

This subsection describes the $ECSP_HOME/bin/getconfig related enhancements. See "Appendix C" in the 4.0 Netsys Connectivity Service Manager General Reference Guide for detailed information about the getconfig command.

    1. Support for the "-l <enable_level>" option was added. This option allows you to specify the level of the enable mode to be used. Valid values range from 0 through 15.

    2. Support for the "-outdir <dir_name>" option was added. This option allows you to specify the name of the directory where the contents of the retrieved configuration file are stored. When this option is not specified, the contents of the retrieved configuration file are saved in the directory where you invoked this script.

Baseline Data Repository

This subsection describes the baseline Data Repository (hereafter referred to as the Repository) added in the Cisco NSM 4.0 release and the new options added to the File menu's Save Copy As option in the Cisco NSM 4.1 release.

Overview

The baseline Repository is a data storage area for information associated with a Cisco NSM baseline. It is located in the $ECSP_DATA directory. The Repository consists of a set of baseline folders. Each baseline is associated with a single Repository folder. A Repository folder may be associated with more than one baseline.


Note We strongly recommend you do not directly modify the baseline Data Repository.
Repository Contents

The Repository contains the following types of information:

Repository and New Baselines

When you select the File menu's New Baseline option in the Cisco Netsys window, a new Repository folder is created. This folder is assigned the name of the new baseline.

Repository and Saving Baselines

When you select the File menu's Save Copy As option in the Cisco Netsys window, the Save Baseline window is displayed. You are provided three options for creating a copy of the baseline. They are:

    1. "Share data with current baseline" - Create a new copy of the baseline, with the resulting baseline sharing a common Repository folder with the originating baseline. In this case, changes made to the Repository folder through either of the baselines, affects both baselines (for example, changing/deleting password entries, collecting new observed routing tables, and collecting new performance data.)

    2. "Copy data from current baseline" - Create a new copy of the baseline with a new Repository folder, and include a copy of all existing Repository information into the new Repository folder. Note, this includes all performance data, and may result in disk space concerns.

    3. "Do not copy data from current baseline" - Create a new copy of the baseline with a new Repository folder (that is, leave the new Repository folder empty.)

Repository and Copying Performance Data

You select the Wizard Manager's "Administer/Untar Baseline Data" wizard to copy performance data between Repository folders.

Repository and Changing the Folder Assignment

You click on the Change Network Folder button in the Data - Summary window to specify an alternative Repository folder an existing baseline points to. The alternative Repository folder must already exist.

Repository and Deleting Baselines

When you select the File menu's Delete Baseline option in the Cisco Netsys window to delete a baseline, it is not known whether the associated Repository folder is shared with another baseline. Therefore, the Repository folder is not deleted. Manually deleting a Repository folder is not recommended.

Note, the Repository folder may consume significant disk space in one of two cases:

    1. The baseline has been used to collect significant volumes of network performance data.

    2. A significant volume of observed BGP routing tables have been collected.

Repository and Moving a Baseline Directory Within a Single File System

Each baseline contains an absolute directory reference to allow it to find the associated Repository folder. No other baseline administration steps are required.

Repository and Moving an Entire $ECSP_DATA Directory

When you move the directory pointed to by the $ECSP_DATA environment variable, the pointer to the Repository folder may be rendered invalid. Therefore, the baseline cannot be opened. In this situation, you may need to manually update the pointer to the appropriate Repository folder.

The $ECSP_DATA/<baseline>/default.ddf text file includes a full directory reference to the Repository, and the baseline's Repository folder. You should only modify the directory reference on the first line of this file. Following is a sample default.ddf file showing the baseline Repository folder twolabs and the Repository directory /users/netsys/netsys_data/.dataroot:

(repository-info /users/netsys/netsys_data/.dataroot Repository twolabs
Domain)
    (data-definition-file 1 "default data definition file created from panel
by user" loadOnOpen=false)
    (mib-datasets latest)
    (traffic-sets none useFilterInfo=false useLoadOptions=false)
    (load-options applyOptions=true skipUnmapped=false removeEncap=true
collapseToNetwork=true collapseToNetworkLayer=false collapseIntraLAN=false
skipIntraLAN=false fixPacketSize=true skipInfo=(useBothDirs bytes 1)
harmonizeInfo=(level1 0 0 false) timeAdjustInfo=(false 0))

General Functionality

This subsection describes the remainder of the Cisco NSM 4.1 enhancements.

    1. The Query and Suppression mechanisms in the Integrity Checks report now allow you to match on a text string found in the Integrity Check Report window's Detail pane. For example, when you want to suppress all integrity check problem entries that contain a 193.31.7.16 IP address in the Detail pane, you first click on the Suppress button in the Integrity Check Report window. You then click on the D6 button in the Integrity Check Report Suppressions window's Add Suppression pane, specify "*193.31.7.16*" in the Detail text field, and then click on the Add button. All integrity check problem entries containing 193.31.7.16 in the Detail pane, are no longer displayed in the Integrity Check Report window. See "Chapter 8" in the 4.0 Netsys Connectivity Service Manager General Reference Guide for detailed information about the Query and Suppression mechanisms.

    2. A Use Observed Routing Tables for Pathing button has been added to the Advanced Options window (displayed when you click on the Advanced Options button in the Open Baseline window). Selecting this option informs the Cisco NSM software to use the IP/IPX/BGP routing tables, collected through the Wizard Manager's "Collect IP/IPX/BGP Routing Tables" wizards, when simulating the routing of packets through the network. Otherwise, the simulation is only based on the information contained in the baseline router configuration files. By default, this option is turned off.

    3. Cisco NSM determines traffic pathing based on the IPX network addresses in the calculated IPX routing tables. In order to map Novell server traffic, it is necessary to translate the internal IPX server addresses (found in traffic data sets) into a LAN address recognized by the Cisco NSM model. To accomplish this, you must create and populate an $ECSP_HOME/ipx_mapping file with the server address of each Novell server (its internal address) and its Novell network address (its external address). A template ipx_mapping file, describing the required format of this IPX mapping file, is provided for you in the $ECSP_HOME/resources/datamgmt directory. The format of the ipx_mapping file is as follows:

      / IPX Server Addresses
      / internal external
        a5c34b01 a5c34b00
        a5c30401 a5c30400
      

Documentation

This section provides information on viewing the Cisco NSM on-line documentation, using the Help feature, and the problems known to exist with the Cisco NSM 4.x documentation.


Note The Cisco NSM 4.0 documentation set (other than the 4.1 Netsys Connectivity Service Manager User's Guide) is used as the basis for the Cisco NSM 4.1 and 4.2 releases.

Viewing On-line Documentation

The Cisco NSM documentation included on the 4.2 CD-ROM is provided in PostScript, PDF (Portable Document Format), and HTML formats. You can view the PostScript version of the Cisco NSM 4.x documentation with the pageview or imagetool commands. You can view the PDF version of the Cisco NSM 4.x documentation with the Adobe® Acrobat® Reader 3.0 program. You can view the modified Cisco NSM 4.x HTML documentation with a 3.<x> or 4.<x> Netscape Navigator or 4.<x> Microsoft Internet Explorer browser.

You can obtain the Adobe Acrobat Reader from Adobe's Web site: http://www.adobe.com

You can obtain the Netscape browser as follows:


Note When using a Netscape browser for viewing on-line documentation or Help, we recommend you create an alias to start the netscape process with the -install option (for example,
alias netscape netscape -install). This causes the Netscape browser to allocate its own color table allowing mouse focus to determine the correct color for other applications running on your machine.

HTML formatted documentation pertaining to the MC3810- and VPDN-related configuration windows is provided in the $ECSP_HOME/help/analysis_Conn/3810.html and $ECSP_HOME/help/analysis_Conn/vpdn.html files, respectively.

PDF formatted documentation pertaining to the MC3810- and VPDN-related configuration windows is provided in the $ECSP_HOME/doc/analysis_Conn/3810.pdf and $ECSP_HOME/doc/analysis_Conn/vpdn.pdf files, respectively.

PostScript formatted documentation pertaining to the MC3810- and VPDN-related configuration windows is provided in the $ECSP_HOME/doc/analysis_Conn/3810.ps and $ECSP_HOME/doc/analysis_Conn/vpdn.ps files, respectively.

HTML, PDF, and PostScript Documentation

The modified HTML versions of the 4.x documentation are installed in subdirectories under the $ECSP_HOME/help directory. The 4.x PostScript and PDF versions are installed in subdirectories under the $ECSP_HOME/doc directory.


Note The PostScript and PDF files mirror the hard copy versions of the 4.0/4.1 documents. Where possible, the HTML formatted 4.0 documentation has been modified to reflect the 4.1 enhancements. See Section, "What's New in the 4.1 Cisco NSM Release", for the latest descriptions of the entire 4.1 feature set, as some of these features may not have been described in the modified HTML files.

To view the on-line documentation with an HTML browser, we recommend you first open the $ECSP_HOME/help/books_list.html file. You click on a specific entry in this file to obtain access to that book's Table of Contents (TOC.html) file.


Note The $ECSP_HOME/help/reports_list.html file provides you with a list of the connectivity and performance related reports available to you through the Cisco NSM 4.x software. You click on a specific report entry in this file to obtain a detailed description of that particular report.

Using the Help Feature

The HELP buttons located in the product's windows are linked to the 4.0 Cisco NSM Reference Guides. The Cisco NSM on-line Help system requires one of the previously mentioned HTML browsers for viewing.

You can specify/change the path to the HTML browser you wish to use for Help by setting the ECSP_HELPVIEWER environment variable. For example, in a C shell environment, when you wish to use the Netscape Navigator HTML browser, set the ECSP_HELPVIEWER environment variable at the command line prompt as follows:

host% setenv ECSP_HELPVIEWER /usr/local/bin/netscape

Documentation and Help Issues

    1. The collection of traffic data from Bay Networks hubs was supported in the Cisco NSM 4.0 release. The Cisco NSM 4.1/4.2 releases no longer provides this functionality.

    2. All references to "Frontier" have changed to "NetScout" within the Cisco NSM 4.1/4.2 releases. However, the Cisco NSM 4.0 documentation does not reflect this name change.

    3. The concept of a baseline Data Repository was added to the Cisco NSM 4.0 release, however, it was not adequately documented. See Section, "Baseline Data Repository", for a detailed description of this feature.

    4. Information on how you manage router types using Cisco NSM is lacking in the Cisco NSM 4.0 documentation. Cisco NSM collects router type information from your network through the Wizard Manager's "Collect Device-Related Data from MIBs" collection wizard and saves it to a router types dataset file in the baseline Data Repository (hereafter referred to as Repository). A separate master router types file named data.router_types exists in the baseline directory. This file can be edited by clicking on the Routers with Observed Types button in the Data-Summary window.

    5. Information on how you import Catalyst Database information into the Cisco NSM is lacking in the Cisco NSM 4.0 documentation. Catalyst switch information is imported from the VLANDirector (only versions 1.3 and 1.3.1 are supported) database and must be saved to a file you place in the $ECSP_DATA/<baseline-name> directory. Following are the steps you must follow to accomplish this task:

        (a) Invoke the Wizard Manager's "Administer Password Database" wizard and add the VLANDirector host and user information to the Device Password Database.

        (b) Invoke the Wizard Manager's "Collect Catalyst Database" wizard, making certain the full path to the Catalyst Database is used when it is anything other than the default (that is, /opt/CSCOvlan).

        (c) Load the Catalyst switch information into a baseline. To do this, you must:

        * Select the File menu's Open Baseline option in the Cisco Netsys window.

        * Select a baseline and then click on the Routers button in the Open Baseline window.

        * Click on the Add button in the Routers window.

        * Specify the directory pointed to by the $ECSP_TMPDIR environment variable in the
           "Go to:" text field in the New Router window, select the file with the database name,    then click on the OK button. View the "Collect Catalyst Database" wizard's standard out    log file for the exact directory and file names.

    6. Information on how you create and import unsupported Layer 2/SNMP MIB2 data sets into the Netsys Performance Service Manager is lacking in the Cisco NSM 4.0 documentation. For the Netsys Performance Service Manager to use this data for performance report generation and performance analysis, you must create an ASCII file with a .mdf suffix appended to the file's name and convert the unsupported Layer 2/SNMP MIB2 data into the format supported by the Netsys Performance Service Manager. Following are the components of a sample .mdf file showing the required format of the Layer 2/SNMP MIB2 data. All records shown in the sample .mdf file require all fields to be specified as indicated below. You must not omit any field.

General Information:
    # Typically the data in the file is in sets. You will typically have one
    # "type-xxx" line followed by one or more "data-xxx" lines. The "type-xxx"
    # lines help understand the fields in the "data-xxx" lines.
    type-snmp-stats,type,interval_info,contained_types, version
    data-snmp-stats,interval,["25 Nov 97 17:34:00" "25 Nov 97 17:35:00"], [
    buffers mib2-ifstats cisco-ifstats cpu],1.0
     
    # The above two lines are global to an mdf file. The type line indicates that
    # the fields in the data line are,
    #   type             Internal usage. Use the value "interval".
    #   interval_info    Data capture time interval. Consists of start and end
    #                    time. Use the format in the example above.
    #   contained_types  Types of data contained in the mib stats.
    #                    In prior releases, the user had to choose the various
    #                    types of mib stats collected. Nowadays, all four
    #                    types are collected. So the value of the field should
    #                    always be as shown in the example above.
    #   version          version #. Keep it 1.0
    
Buffer Stats:
    # The next two lines provide Buffer stats. The field names match the names
    # defined in the MIB and should be pretty self explanatory. All values are
    # comma separated.
    type-router-buffers,router_name,bufferFail,bufferNoMem,bufferSmallHits,buffe
    rSmallMisses,bufferMediumHits,bufferMediumMisses,bufferBigHits,bufferBigMiss
    es,bufferLargeHits,bufferLargeMisses,bufferHugeHits,bufferHugeMisses,bufferS
    mallTrims,bufferSmallCreates,bufferMediumTrims,bufferMediumCreates,bufferBig
    Trims,bufferBigCreates,bufferLargeTrims,bufferLargeCreates,bufferHugeTrims,b
    ufferHugeCreates,
    data-router-buffers,andale,0,0,590,0,280,0,51,0,0,0,194,0,0,0,0,0,0,0,0,0,0,0,
    
MIB2 Stats:
    # The next set of lines contain MIB2 stats. They are organized as one line per
    # interface, for each interface of the router. You can group data lines for
    # all interfaces of all routers for which you have the mib stats. These fields
    # are what is defined in the standard portion of MIB2. Each interface is
    # identified by its IP address.
    type-mib2-ifstats,router_name,interface_id,ifIndex,ifInOctets,ifInUcastPkts,
    ifInNUcastPkts,ifInErrors,ifOutOctets,ifOutUcastPkts,ifOutNUcastPkts,ifOutEr
    rors,
    data-mib2-ifstats,andale,192.168.114.239,1,65294,199,176,0,1831,22,0,0,
    data-mib2-ifstats,andale,40.128.16.52,2,6254,5,24,0,111822,247,3,0,
    data-mib2-ifstats,andale,192.168.132.5,3,1546,5,4,0,1561,19,0,0,
    
Interface Stats:
    # The following set of lines contain detailed interface stats from the Cisco
    # enterprise portion of mib2. Data is again organized as the standard MIB2
    # stats, that is, one data line per interface of a router. Each interface is
    # identified by its IP address.
     
    type-cisco-ifstats,router_name,interface_id,locIfInBitsSec,locIfInPktsSec,lo
    cIfOutBitsSec,locIfOutPktsSec,locIfInputQueueDrops,locIfOutputQueueDrops,loc
    IfIgnored,locIfSlowInPkts,locIfSlowOutPkts,locIfSlowInOctets,locIfSlowOutOct
    ets,locIfFastInPkts,locIfFastOutPkts,locIfFastInOctets,locIfFastOutOctets,lo
    cIfotherInPkts,locIfotherOutPkts,locIfotherInOctets,locIfotherOutOctets,locI
    fipInPkts,locIfipOutPkts,locIfipInOctets,locIfipOutOctets,locIfdecnetInPkts,
    locIfdecnetOutPkts,locIfdecnetInOctets,locIfdecnetOutOctets,locIfxnsInPkts,l
    ocIfxnsOutPkts,locIfxnsInOctets,locIfxnsOutOctets,locIfclnsInPkts,locIfclnsO
    utPkts,locIfclnsInOctets,locIfclnsOutOctets,locIfappletalkInPkts,locIfapplet
    alkOutPkts,locIfappletalkInOctets,locIfappletalkOutOctets,locIfnovellInPkts,
    locIfnovellOutPkts,locIfnovellInOctets,locIfnovellOutOctets,locIfapolloInPkt
    s,locIfapolloOutPkts,locIfapolloInOctets,locIfapolloOutOctets,locIfvinesInPk
    ts,locIfvinesOutPkts,locIfvinesInOctets,locIfvinesOutOctets,locIfbridgedInPk
    ts,locIfbridgedOutPkts,locIfbridgedInOctets,locIfbridgedOutOctets,locIfsrbIn
    Pkts,locIfsrbOutPkts,locIfsrbInOctets,locIfsrbOutOctets,locIfchaosInPkts,loc
    IfchaosOutPkts,locIfchaosInOctets,locIfchaosOutOctets,locIfpupInPkts,locIfpu
    pOutPkts,locIfpupInOctets,locIfpupOutOctets,locIfmopInPkts,locIfmopOutPkts,l
    ocIfmopInOctets,locIfmopOutOctets,locIflanmanInPkts,locIflanmanOutPkts,locIf
    lanmanInOctets,locIflanmanOutOctets,locIfstunInPkts,locIfstunOutPkts,locIfst
    unInOctets,locIfstunOutOctets,locIfspanInPkts,locIfspanOutPkts,locIfspanInOc
    tets,locIfspanOutOctets,locIfarpInPkts,locIfarpOutPkts,locIfarpInOctets,locI
    farpOutOctets,locIfprobeInPkts,locIfprobeOutPkts,locIfprobeInOctets,
    data-cisco-ifstats,andale,192.168.114.239,0,0,0,0,0,0,0,375,19,65294,1561,0,
    3,0,270,12,5,720,300,347,16,61205,1232,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0
    ,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0
    ,0,0,0,0,0,0,0,0,0,0,
    data-cisco-ifstats,andale,40.128.16.52,4294966296,0,1000,0,0,0,0,29,249,6254
    ,110307,0,0,0,0,0,5,0,300,18,203,4124,49134,0,0,0,0,0,0,0,0,0,40,0,60560,0,0
    ,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0
    ,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,
    data-cisco-ifstats,andale,192.168.132.5,0,0,0,0,0,0,0,9,18,1546,1487,0,0,0,0
    ,0,5,0,300,0,12,0,888,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,
    0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,
    data-cisco-ifstats,andale,192.168.133.65,0,0,0,0,0,0,0,0,5,0,300,0,0,0,0,0,5
    ,0,300,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0
    ,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,
    
CPU Stats:
    # The next two lines provide the CPU stats for the router.
    # It provides the CPU utilization for current, average over last 1 minute and
    # average over last 5 minutes.
     
    type-cpu,router_name,busyPer,avgBusy1,avgBusy5,
    data-cpu,andale,0,0,0,
     
    

    7. Information on how you import user created traffic data sets into the Netsys Performance Service Manager is lacking in the Cisco NSM 4.0 documentation. Following are the steps you must follow to accomplish this:

        (a) Convert the traffic data to the format supported by Cisco NSM. See "Chapter 3 - Section 3.1.7" in the Netsys Performance Service Manager Reference Guide for a description of the supported format. The traffic data must reside in an ASCII file with a .tdf suffix in the file's name.

        (b) When it does not already exist, create the $ECSP_DATA/<baseline-name>/datasets directory.

        (c) Copy the traffic data files (*.tdf) to the $ECSP_DATA/<baseline-name>/datasets directory.

        (d) Re-open the baseline (<baseline-name>). The traffic data is imported into the Netsys Performance Service Manager.

    8. The "Collect Traffic From NetFlow" wizard instructions in the Netsys Performance Service Manager Reference Guide are rather sparse. Following are the modified instructions.

    9. The options available through the Advanced Options window have been reorganized. The functionality remains the same, however the listed options are presented in a different order. The Advanced Options window is available through the Open Baseline window.

    10. The Real Bandwidth and Real Delay fields in the Link window were renamed
    Outgoing Direction Real Bandwidth and Outgoing Direction Real Delay, respectively.

    11. The View Historical HTML Reports button in the Schedule window is now labeled
    View Web Reports. This modification has only been applied to the on-line HTML documentation.

    12. The Edit Sending Router and Edit Receiving Router buttons in the Diagnostic Report window were renamed Sending Router Params and Receiving Router Params, respectively. The Edit Router button in the Connectivity Problem Diagnosis window was renamed
    Router Parameters.

    13. The printed version of Chapter 11 (Modifying Router Configuration Attributes for "what-if" Simulation) in the 4.1 Netsys Connectivity Service Manager User's Guide contains erroneous information in Section 11.3, step 6. You are told to select the "199.35.38.6 netsys9a Ethernet2/4" entry from the list of next hop routers entry in the New IP Static Routes window, when in fact, you should select the "199.35.35.161 netsys9a Ethernet0/3" entry, as shown in Figure 11-17. The on-line HTML version of this chapter contains the correct information.

    14. The printed version of Chapter 11 (Modifying Router Configuration Attributes for "what-if" Simulation) in the 4.1 Netsys Connectivity Service Manager User's Guide contains erroneous information in Section 11.6, step 12. The snapshot is wrong and the text states the Ethernet0/1 interface is used to reach router netsys9a, when in fact, the Ethernet1/5 interface is used. The on-line HTML version of this chapter contains the correct information.

    15. The printed version of Chapter 5 (Report Manager) in the 4.0 Netsys Connectivity Service Manager General Reference Guide discusses the "IP Routing Table Coverage Exceptions" and "IPX Routing Table Coverage Exceptions" reports. "Table" was subsequently removed from their titles and is reflected in the on-line version of the documentation.

    16. The printed version of Chapter 5 (Report Manager) in the 4.0 Netsys Connectivity Service Manager General Reference Guide contains a snapshot of a window entitled Exceptions by Requirement Set. As shown in the on-line version of the documentation, the window is actually entitled Exceptions by Policy Set.

    17. Additional options are available in the Topology View window's Tools menu. The Labels options provide the same functionality as the window's Labels buttons. The Show Objects options provide the same functionality as the window's Options buttons. The Zoom options provide the same functionality as the window's Zoom buttons.

    18. The instructions on how you obtain the scripts needed to interface the Cisco NSM software with the CiscoWorks software, in the printed version of Appendix D in the 4.0 Netsys Connectivity Service Manager General Reference Guide, are incorrect. The files are now located at ftp://www.cisco.com/cisco/netmgmt/ciscoworks/netsys-cwi and the CW-Connectivity.tar file was replaced by the CW-Connectivity.tar.Z file. After ftp'ing this file, you must first decompress this file by invoking the "uncompress CW-Connectivity.tar.Z" command. You then invoke the "tar -xf CW-Connectivity.tar" command as currently described. Also note, after invoking the above tar command, a README file and the CiscoWorks scripts are now installed in the current working directory. You no longer need to invoke the tar command against the netsys.tar file, as that file no longer exists.

    19. When you click on a cross reference to a figure, the Netscape Navigator browser scrolls the figure off the screen. The figure's caption is displayed as the first line on the viewer's screen at this point. Scroll back up to view the figure associated with the figure's caption.

    20. A busy cursor is not displayed when you click on a window's Help button and the Netscape Navigator browser is in the process of starting.

General Information

This section provides general information and suggestions about how to use the Cisco NSM 4.2 software.

Netsys Connectivity Service Manager

    1. You should not invoke the Cisco NSM software as root.

    2. When you previously scheduled reports and/or collections using the 3.x version of the Scheduler process, you must kill the 3.x netsys_scheduler process prior to scheduling reports and/or collections using the Cisco NSM 4.x Scheduler. Note also, the 3.x Scheduler files are not compatible with the Cisco NSM 4.x Scheduler.

    3. The ECSP_TMPDIR environment variable defaults to the $ECSP_DATA/tmp directory. We strongly recommend you do not set the ECSP_TMPDIR environment variable to point to the /tmp directory so as to avoid losing all of the files saved to this directory when your machine is rebooted.

    4. When you use the Scheduler, your baseline directories and the directory defined by the ECSP_TMPDIR environment variable must be accessible by the same path on every machine you run the Cisco NSM software.

    5. The ExplainAll analysis (invoked from the Policies Analysis window), only pertains to No Route, Routing Loop, and Access List problems. All other violations are not currently analyzed.

    6. When you plan on running the Netscape browser while using the Cisco NSM 4.x software, we recommend you create an alias to start the netscape process with the -install option to avoid running into potential color map problems. You can also start the Cisco NSM 4.x software using the -install option with the ctk command. A drawback to these options is that on some machines, color map flashing occurs when moving the cursor over other windows.

    7. To ensure the various reports created by the Netsys Connectivity Service Manager are up-to-date and contain the latest information, we strongly recommend you click on the Connectivity button in the Cisco Netsys window's Analysis pane once you modify network element attributes.

    8. When opening a baseline you created using a previous version of the Netsys Connectivity Service Manager, existing layouts are not discarded. There is a chance the topology is more complete than it was in previous versions, therefore, all new devices, WAN clouds, and campuses are laid out along the bottom of the Topology View windows, where they can be repositioned, when desired. Note that new devices and campuses can also result from a modification to a configuration file.

    9. The Wizard Manager's "Create WAN/LAN Subnet" wizard is not the same as the "Add Serial Link" option accessible from the router icon in the Topology View window. Whereas the "Add Serial Link" option is used to fill in missing information with regards to a known, existing subnet and can be persistently saved, the "Create WAN/LAN Subnet" wizard is used as a "what-if" scheme resulting in the creation of hypothetical IP interfaces on different routers, with new IP addresses for a new subnet and can not be persistently saved or managed.

    10. When you modify a router configuration file using the Netsys Connectivity Service Manager's configuration editor (for example, vi or emacs), the modifications are not saved when the delta feature is invoked, as changes made through the Configuration editor are not included in the object model and therefore, are not available for export until the next time you load the baseline.

    11. Configuration files in the $ECSP_DATA/<baseline_dir>/config directory are under SCCS control. Do not modify the permissions on these files, as this might cause some SCCS operations to fail. It is also important not to manually copy files into or directly modify the files in the config directory. The only safe way to modify files in the config directory is through the Configuration editor started from within the Netsys Connectivity Service Manager.

    12. With the exception of SRB, RSRB, and DLSw+ bridging, bridging routers are not modeled. This may result in unnecessary integrity checks as well as a cluttered or wrong topology.

    13. End-to-end Source Route Bridging connectivity policies are supported, requiring the Netsys Connectivity Service Manager to decide whether to bridge or route end-to-end connectivity policies. The following heuristic is used:

        (a) For an IP or IPX connectivity policy originating at an end system, the Netsys Connectivity Service Manager looks at the directly connected routers to the source. When the routers have IP/IPX routing enabled, routing is attempted. Otherwise, bridging is attempted.

        (b) IP connectivity policies originating at a router are routed, not bridged.

        (c) SNA connectivity policies are bridged.

    14. For bridged connectivity policies, it is assumed that spanning, as opposed to all-rings, Explorer packets are used.

    15. IP redirect is not modeled.

    16. Tunneling simulation is supported in a limited fashion.

    17. As the Netsys Connectivity Service Manager can not recognize a host's default router setting, it attempts to determine the host's next hop by evaluating routers linked to the segment where the host is located. In the case where none of the linked routers have a valid routing table entry for the destination, a BLOCKED or NO ROUTE status results.

Netsys Performance Service Manager

    1. We strongly recommend you provide accurate router type information, either manually or through collection from the routers, in order to ensure accurate router modeling.

    2. To ensure the various reports created by the Netsys Performance Service Manager are up-to-date and contain the latest information, we strongly recommend you click on the Performance button in the Cisco Netsys window's Analysis pane once you have modified network element attributes.

    3. When collecting MIB data on a Frame Relay interface with multiple subinterfaces, the "MIB Interface Detail" report lists the packets for the entire Frame Relay interface under the name of the subinterface with the lowest numeric address.

    4. An assumption is made that route-cache is enabled for Source-Route Bridging (SRB).

    5. The effects of custom and priority queueing on end-to-end delay are not taken into consideration when simulating router performance and capacity.

    6. The capacity values for LANs and links are based on actual bandwidth. By default, the configured bandwidth is used. When the router's actual bandwidth is different from the configured bandwidth, you can modify the actual bandwidth using the load interface capacity under data collection. When a change is made, you are prompted whether the change should be persistently stored when you exit the Netsys Performance Service Manager.

    7. In the "Broadcast and Routing Update Overhead Report", a LAN's speed is expressed in Mbps (megabits per second), whereas for Serial links, speed is expressed in Kbps (kilobits per second).

    8. The only IP header compression commands considered when analyzing efficiency and calculating utilization are ip tcp header-compression and
    frame-relay ip tcp header-compression.

    9. Network resource utilization calculations assume load balancing between all possible paths (this represents an average utilization) bounded by the "Max Number of Routes" setting.

    10. Units in the AvgDelay column in the End-to-End Delay Report are in milliseconds.

    11. IP Accounting records the number of bytes (IP header and data) and packets switched through the system on a source and destination IP address basis. Only outbound, transit IP traffic is measured; traffic generated by the router or terminating in the router is not included in the Accounting statistics.

    12. The "End-to-End Delay Report" does not show conversations between end points not having connectivity.

    13. The 4.x Netsys Performance Service Manager interfaces with NetScout 3.2, 3.3, and 4.1.2 console software. The 3.x version of the Performance Tools only interface with NetScout 3.2 and 3.3 console software.

Netsys LAN Service Manager

    1. You must have access to a CWSI (CiscoWorks for Switched Internetworking) VLanDirector program, operating on a machine running the UNIX operating system, in order to export configuration and spanning-tree information into the Netsys LAN Service Manager for topology creation.

    2. It is not necessary to have VLANs to run VLANDirector.

    3. The VLanDirector program can run on the same or a separate machine as the Netsys LAN Service Manager.

Known Software Problems

This section provides a list of problems known to exist with the 4.2 version of the Cisco NSM software at the time this document was written.

Netsys Connectivity Service Manager

    1. At sites that have not installed Hewlett Packard's set of periodic recommended patches, a possibility exists that some of the shared libraries used by the Cisco NSM 4.2 product may be out of date. This is indicated by the observance of a number of unknown symbol errors from the Dynamic Library Loader (dld), prior to a core dump occurring. The solution is to update the C++ and C runtime libraries. You can obtain corresponding patches through HP's Electronic Support Center at http://us-support.external.hp.com. The current set of patches that fix the dld problems are PHSS_16585 and PHCO_16723. Note, however, that at any time, these patches may be superseded by subsequent patches from HP.

    2. Router hostnames containing more than fifty characters cause Cisco NSM to dump core. To avoid this problem, please create router hostnames that contain fifty or less characters.

    3. If the system clock, of the UNIX host that Cisco NSM is running, is set back to an earlier time, the execution of certain scheduled tasks may be skipped. To workaround this problem, you must reschedule those tasks.

    4. A simulation problem exists with in-bound access lists applied to an interface. When a packet's destination is to another interface on the same router with an in-bound access list, the access list is ignored. Note, in-bound access lists for packets passing through the router work properly.

    5. The "Administer/Untar Baseline Data" wizard's "Copy Baseline Repository Data From One Baseline to Another" option, does not function properly when you specify to select the data to be copied based on the time value being equal to a specific time. Instead, you must select a time using the "less than or equal to" or "greater than or equal to" logical operators.

    6. Host names containing the characters listed below have those characters changed to an underscore ("_") character by the Netsys Connectivity Service Manager. This can result in duplicate hostnames and router configuration files. This then results in one of the duplicate router configuration files being dropped when the baseline is created. The characters are: "$", "'", ";", "#", "\Q", "{", "}", "[", "]", as well as the space, quote, and all control characters.

    7. The Add IP/IPX/SAP/SNA Policies windows display a maximum of 4999 source and destination end systems. This limitation makes it possible for policies between some of the source and destination end systems in the topology to not be analyzed. The following workarounds are available:

        (a) you can use the Topology View window's QuickPath feature to analyze connectivity when your network contains more than 4999 source and destination end systems.

        (b) you can use the "Define Connection Policy" wizard to define connection policies between the unlisted LANs. This wizard allows you to select unlisted LANs but not router logical interfaces or WAN interfaces.

    8. The Diagnosis buttons in the reports available through the Service Level Exceptions window are not activated until you display the "Exceptions by Policy Set" report. The Service Level Exceptions window is displayed when you double-click on the Service Level Exceptions entry in the Report Manager window.

    9. When you change the location of a baseline Data Repository, all scheduled wizards for that baseline must be rescheduled.

    10. When you modify baseline router configuration files through the Netsys Connectivity Service Manager's Configuration editor (for example, vi or emacs), the modifications you make are overwritten when you also have automatic router configuration file collection scheduled. The workaround is to maintain separate baselines: one working copy and one copy containing automatically updated configuration files.

    11. When many open baseline operations are invoked from within the same ctk session, it is possible for the Netsys Connectivity Service Manager to run out of file descriptors. The symptoms include errors opening files, inability to write to directories, permissions problems, etc. The workaround is to exit the Netsys Connectivity Service Manager and then restart it with the ctk command.

    12. When the Netsys Connectivity Service Manager routes traffic using a static route to an unknown next hop IP address, the route fails. A connectivity analysis displays a "No Route" condition. This is especially prevalent when using dial backup.

    13. Both generated and ungenerated reports appear as Ready in the Report Manager window. When you modify underlying data that affects reports, the reports that have been generated have their status changed to "Out-of-date", whereas the status of the reports that were never generated continue to be shown as "Ready".

    14. The Inventory report is not saved when you click on the Save button in the Report Manager window, and therefore, can not be re-loaded as a historical report. You can however, save this report with the Inventory window's Save/Print button.

    15. When using the QuickSolver feature, the status "incorrect direct route" can be erroneously displayed in the Explanation Propagation window when a WAN connection is missing between the two interfaces shown in this window.

    16. When using the QuickSolver feature, IPX host addresses corresponding to router ports, have "0.0000.0000.0000" displayed as their addresses.

    17. When a QuickSolver analysis is performed on a path that failed because it matched a static route pointing to an unknown address, the recommended fix produced by the QuickSolver may suggest cancelling out the static address with the unknown address; however, rather than providing the address in the command, it erroneously uses the term "unknown" in the address field of the IOS command.

    18. Propagation of EIGRP routes may be incorrect when a one-to-one correspondence between the primary and secondary addresses on adjacent routers running EIGRP does not exist.

    19. When you edit a router configuration file from within the Netsys Connectivity Service Manager, you must specify complete interface and command names as the use of unambiguous, partial interface or command names is not supported by the Netsys Connectivity Service Manager. For example, when you want to restart a previously shut down interface, you must add the
    no shutdown (as opposed to no shut) command after the shutdown command in the router configuration file.

    20. The Netsys Connectivity Service Manager applies case sensitivity to AppleTalk zones. While this is not a problem for Cisco routers, it can be a problem for other routers supporting AppleTalk.

    21. OSPF virtual links are not supported in this release.

    22. When the Window Manager appears to lock up, press Esc (Escape).

    23. When the red interface labels or round trip paths are displayed in the Topology View window, object selection can be difficult. The workarounds are to turn off the displaying of the interface labels by clicking in the Topology View window's background, and to turn off the displaying of round trip paths by deselecting the Round Trip Path button in the Topology Manager window, prior to selecting an object.

    24. The simulator does not handle indirect source route bridging (that is, bridging from one virtual ring group to another by having two token ring ports on the same router go to the same token ring).

    25. When the "DLSw Peer On Demand" policy file set is analyzed, a promiscuous relation between DLSw pairs is erroneously reported as having an OK status, rather than a PROMISCUOUS status.

    26. When a static route exists to a dangling serial link and a link is added to this interface, you must click on the Connectivity button in the Cisco Netsys window's Analysis pane for the static route to appear in the routing table.

    27. When the destination address in the Policies Analysis window is empty, it represents the pseudo-network (0.0.0.0), generated for example, by the RIP protocol.

    28. Analysis uses tick count as the IPX RIP metric on all routers unless the router's configuration file contains a version command with an IOS version number less than 9.21, in which case hop count is used as the metric. This is correct behavior for IOS 9.21+; however for IOS versions less than 9.21, when a version command is not present, tick count is erroneously used as the IPX RIP metric. The workaround is to make sure you include the version command for any router running an IOS version less than 9.21.

    29. Entries in an IPX routing table generated by the Netsys Connectivity Service Manager differ from those in an actual router running IOS 9.21+. Consider the entry: R 8a [1/7] Ethernet4 netsys3. In the table generated by the Netsys Connectivity Service Manager, [1/7] represents [RIP or directly connected route/hop count or tick count], where RIP=1, directly connected=0. In an actual router, [1/7] represents [tick count/hop count]. See the previous issue for additional information.

    30. In analysis for RIP, IGRP, and EIGRP, a redistributed static route that is summarized can get back to its source. This differs from actual router behavior.

Netsys Performance Service Manager

    1. The "Network Performance Summary" and "Traffic Summary" reports are not saved when you click on the Save button in the Report Manager window, and therefore, can not be re-loaded as historical reports. You can save these reports with the Save/Print button in the Report windows. As a workaround, you can generate the "Network Performance Summary Report" from the Scheduler. The report is named: "Network Summary Report for Default Data Definition" and you can view it through the Historical Report entry in the Report Manager window or with a Netscape browser.

    2. Do not request connectivity analysis on SNA traffic from the "End-to-End Delay" or "End-to-End Conversation" reports. The workaround is to create the connectivity policies directly within the Netsys Connectivity Service Manager.

    3. Values greater than 2^32 cannot be entered into text fields in the Wizard Manager's "Create Traffic" and "Edit Traffic" wizards.

    4. When the path defined by the NSHOME environment variable is longer than 64 characters, the Netsys Performance Service Manager can not access the NetScout probes. The workaround is to create a symbolic link, which must be less than 64 characters in length, to the NSHOME directory and then set the NSHOME environment variable to that symbolic link. For example, in the default case where the NetScout executables are installed in the ECSP_HOME tree, NSHOME is set to:

        $ECSP_HOME/resources/datamgmt/netscout

Obtaining Help

If you experience problems installing or using the 4.2 Cisco NSM software or obtaining or installing the required license, please call Cisco Systems at 1-800-553-2447 or send email to tac@cisco.com.

Cisco Connection Online

Cisco Connection Online (CCO) is Cisco Systems' primary, real-time support channel. Maintenance customers and partners can self-register on CCO to obtain additional information and services.

Available 24 hours a day, 7 days a week, CCO provides a wealth of standard and value-added services to Cisco's customers and business partners. CCO services include product information, product documentation, software updates, release notes, technical tips, the Bug Navigator, configuration notes, brochures, descriptions of service offerings, and download access to public and authorized files.

CCO serves a wide variety of users through two interfaces that are updated and enhanced simultaneously: a character-based version and a multimedia version that resides on the World Wide Web (WWW). The character-based CCO supports Zmodem, Kermit, Xmodem, FTP, and Internet e-mail, and it is excellent for quick access to information over lower bandwidths. The WWW version of CCO provides richly formatted documents with photographs, figures, graphics, and video, as well as hyperlinks to related information.

You can access CCO in the following ways:

For a copy of CCO's Frequently Asked Questions (FAQ), contact cco-help@cisco.com. For additional information, contact cco-team@cisco.com.


Note If you are a network administrator and need personal technical assistance with a Cisco product that is under warranty or covered by a maintenance contract, contact Cisco's Technical Assistance Center (TAC) at 800 553-2447, 408 526-7209, or tac@cisco.com. To obtain general information about Cisco Systems, Cisco products, or upgrades, contact 800 553-6387, 408 526-7208, or cs-rep@cisco.com.

Documentation CD-ROM

Cisco documentation and additional literature are available in a CD-ROM package, which ships with your product. The Documentation CD-ROM, a member of the Cisco Connection Family, is updated monthly. Therefore, it might be more current than printed documentation. To order additional copies of the Documentation CD-ROM, contact your local sales representative or call customer service. The CD-ROM package is available as a single package or as an annual subscription. You can also access Cisco documentation on the World Wide Web at http://www.cisco.com, http://www-china.cisco.com, or http://www-europe.cisco.com.

If you are reading Cisco product documentation on the World Wide Web, you can submit comments electronically. Click Feedback in the toolbar and select Documentation. After you complete the form, click Submit to send it to Cisco. We appreciate your comments.





hometocprevnextglossaryfeedbacksearchhelp
Posted: Mon Apr 12 17:23:37 PDT 1999
Copyright 1989-1999©Cisco Systems Inc.