|
|
This chapter provides an explanation of collection tasks and reports categorized under the Monitoring menu option, as follows:
Figure 9-1, "Monitoring Menu," provides a view of the Monitoring menu in the menu task bar.

This section contains the following categories:
Collect router configuration files to audit services provisioned by MPLS VPN Solution. You must do this after you populate targets and the directory repository and prior to any other steps.
To set up routers for collection, be sure to implement the following requirements:
When setting up collection from routers, be sure that all the routers have the same prompts as in the csm.properties file for netsys.router.loginprompt and netsys.router.passwordprompt. The default values match the default values on Cisco routers. They are as follows:
netsys.router.loginprompt = Username:
netsys.router.passwordprompt = Password:
If you use nonstandard router prompts in the csm.properties file, be sure you set the same values for all the routers from which you collect.
When DNS is being used in the customer's network, it is also recommended that IP addresses are configured in the target database. If DNS is not properly configured on the routers and no IP addresses are configured in the target database, collections will fail due to a time-out.
If collections fail, verify that DNS is enabled by entering the following commands on the router:
ip domain-lookup
ip name-server <a.b.c.d>
where: <a.b.c.d> is a valid DNS.
![]() |
Note If DNS is not being used in the customer network, DNS should be disabled on all routers. To disable DNS, it is important to enter the following command on all routers: no ip domain-lookup |
To collect configuration files, targets must first be created in the database, Setup > Create Targets From Router Configurations. To collect router configuration files, implement the following steps:

![]() |
Note An alternative to selecting Monitoring > Collect Router Configuration Files is to select Tools > Tasks and then in the Actions menu item, select New Task > Collect Router Configuration Files and click Ok. Both paths navigate to the same wizard. |
Step 2 The next window provides information about the choices: collecting the Cisco router configuration from the selected routers or importing Cisco router configuration files. This is just an information window; click Next to continue.
Step 3 The next window is shown in Figure 9-3, "Action to Perform for Collect Router Configuration."

This window allows you to collect router configuration information from either of the following:
Step 4 Click Next to continue.
Live collection of router configuration performs a telnet operation to the routers to collect the running configuration of each router. A prerequisite is to configure the password database with passwords.
For collection of router configuration, you have navigated from VPN Console > Monitoring > Collect Router Configuration > Live Collection of Router Configuration. Implement the following steps:
In the window in Figure 9-4, "Selecting Devices for Router Configuration Collection," first click the Network drop-down menu to choose a specific network.
This window has two areas with the column headings Network, Name, Domain, and Role. The upper area includes all the routers within the network selected from the Network drop-down menu. The lower area is populated to include all the routers that you choose in Step 2 and Step 3.
In the upper area, you can sort the routers on each of the column headings, Network, Name, Domain, and Role. Just click that column header to sort on it. Because the names are unique, you will probably want to sort on Name.

Step 2 This step explains how to move routers from the upper area to the lower area, thus selecting the routers from which router configuration data is collected.
If you do not select any devices in the upper area, you can select Add All and all the devices appear in the lower area. If you select one or more devices, you can click Add and only those devices appear in the lower area.
Step 3 If you decide not to choose the routers now listed in the lower area, you can either select Remove All to eliminate all the selections in the lower area, or you can select those devices that you want to eliminate and click Remove.
You can continue editing the set of routers in the lower area by repeating Step 2 and Step 3.
Step 4 Click Next, when you want to choose the devices that appear in the lower block as the devices from which router configuration data will be collected.
Step 5 The next window is shown in Figure 9-5, "Selecting Additional Configuration Collection Options."

The window in Figure 9-5, "Selecting Additional Configuration Collection Options," allows you to Mask passwords in collected files or not. Masked passwords appear as "XXXX" in the collected configuration.
Step 6 Leave the default of Mask passwords in collected files or unselect it.
Step 7 Click Next to continue.
Step 8 In the next window, as shown in Figure 9-6, "Providing a Task Name for Live Collection of Router Configuration," provide a unique Task Name.
![]() |
Note From the drop-down menu, you can view the last 30 existing task names for this specific task type. This can facilitate the creation of a unique task name and the adherence to the existing task naming conventions. From the drop-down list, you can select a similar task name to the one you want to create and then click on it. The name will appear in the Task Name field. Then you can edit the name to be a unique name. Otherwise, you can highlight Enter Name Here and enter a unique name in the Task Name field. |

Step 9 Click Next to continue.
Step 10 In the next window, you can choose to schedule the task by selecting Yes and clicking Next. In this case the next step is Step 11.
You can choose not to schedule the task by selecting No and clicking Next. In this case, the next step is Step 12.
Step 11 If you chose to schedule the task, in the next window, choose the scheduling directions and click Next. See Chapter 13, "Scheduling," for a detailed description of scheduling.
Step 12 If you did not schedule the task, you are informed that "The task manager is about to save the task." If you did schedule the task, you are informed that "The task manager is about to save and schedule the task." If you want to change your mind on the scheduling instructions, click Back and return to Step 10 or Step 11. When you are ready to save and schedule the task, click Next.
Step 13 You are informed that "All steps are done." Click Close to close the wizard.
Collected router configurations that exist in files in a directory can be imported. A network must first be created by navigating Device > Targets > New Target.
![]() |
Note It is critical that each filename being imported is the same as the name of the corresponding router. If a domain name is defined, this must be used as an extension to the filename. For example, if the router name is Router1 and the domain name is mydomain.com, the name of the file must be Router1.mydomain.com. All files in this directory must be configuration files. |
To import router configurations from files, you have navigated from VPN Console > Monitoring > Collect Router Configuration > Import Router Configuration from Files. Implement the following steps:

The next window, as shown in Figure 9-8, "Selecting Name of Network that Contains the Routers Corresponding to the Configuration Files to Import," allows you to select the name of the network containing the routers for the configuration files that you want to import.

Step 2 Click the drop-down menu and click a network that was created in the hierarchy pane navigating Device Inventory > Targets > New Target.
Step 3 Click Next to continue.
Step 4 In the next window, as shown in Figure 9-9, "Providing a Task Name for Importing Router Configurations," provide a unique Task Name.
![]() |
Note From the drop-down menu, you can view the last 30 existing task names for this specific task type. This can facilitate the creation of a unique task name and the adherence to the existing task naming conventions. From the drop-down list, you can highlight a similar task name to the one you want to create and then click on it. The name will appear in the Task Name field. Then you can edit the name to be a unique name. Otherwise, you can highlight Enter Name Here and enter a unique name in the Task Name field. |

Step 5 Click Next to continue.
Step 6 In the next window you can choose to schedule the task by selecting Yes and clicking Next. In this case, the next step is Step 7.
You can choose not to schedule the task by selecting No and clicking Next. In this case, the next step is Step 8.
Step 7 If you chose to schedule the task, in the next window, choose the scheduling directions and click Next. See Chapter 13, "Scheduling," for a detailed description of scheduling.
Step 8 If you did not schedule the task, you are informed that "The task manager is about to save the task." If you did schedule the task, you are informed that "The task manager is about to save and schedule the task." If you want to change your mind on the scheduling instructions, click Back and return to Step 6 or Step 7. When you are ready to save and schedule the task, click Next.
Step 9 You are informed that "All steps are done." Click Close to close the wizard.
This section contains the following categories:
Accounting data is collected to provide end-to-end usage information on VPN-based network traffic and to provide a complete billing solution. Collected accounting data is used by the Accounting Server for various levels of aggregation for accounting reports and API accounting information.
Prior to collecting VPN Accounting data, implement the following sections:
Prior to collecting VPN Accounting data, implement the following steps for each and every PE router, to determine whether SNMP is enabled. If SNMP is enabled, these steps will lead you to the first GUI path. If SNMP is not enabled, these steps will direct you on how to enable SNMP.
Step 2 Go into the enable state.
Step 3 Enter the command show snmp.
Step 4 Determine whether the following line is present:
% SNMP agent not enabled
Step 5 If the line in Step 4 is not present, you have determined that SNMP is enabled. Then enter the show run command to view the SNMP community strings at the end of the configuration file. The strings shown in Step 7 appear near the end of the listing. If you have more routers to verify, return to Step 1 and follow these steps for the next router that you want to verify. Otherwise, proceed to the "NetFlow Settings on the Router" section.
If the line in Step 4 is present, proceed to Step 6.
Step 6 To turn on SNMP, at the prompt, enter the command config t.
Step 7 Enter the following commands:
snmp-server community <userstring> RO
snmp-server community <userstring> RW
where:
<userstring> is typically public with the RO setting and private with the RW setting.
Step 8 If you have more routers to verify, return to Step 1 and follow these steps for the next router that you want to verify.
![]() |
Note These SNMP strings must agree with those listed in the target password database for each router. (Refer to the "New Target" section.) |
NetFlow Collector must be running.
ip flow-export version 5
ip flow-export destination <ipaddress> <port>
![]() |
Note The VERSION and PORT parameters must coincide with the settings configured in the NetFlow Collector. |
Step 2 Activate the CE-facing MAJOR Interface, as follows:
ip route-cache flow
Step 3 To see current flows in the router flow-cache, issue the following command:
show ip cache flow
NetFlow Collector uses a pre-allocated cache, which by default has 64K entries where each flow (uni-directional) gets one entry. Each entry uses 68 bytes. The number of NetFlow Collector entries can be expanded if traffic requirements and machine resources warrant, as follows:
ip flow-cache entries <#>
Implement the following steps:
#Set format to Comma Separated for VPNSC:
CSV_FORMAT YES
#Use long file names with dates:
LONG_OUTPUTFILE_SUFFIX yes
Step 2 On the NetFlow Collector device, edit the nfconfig.file file as follows:
#Use the Detail Call Record aggregation scheme for VPNSC:
Thread DETCALLREC
Aggregation DetailCallRecord
Period 30
Port 9996
State Active
DataSetPath /opt/CSCOnfc/Data
Binary Yes
Compression No
Max Usage
![]() |
Note Failure to do this results in blank VPN accounting reports. |
To collect VPN accounting data, implement the following steps:

![]() |
Note An alternative to selecting Monitoring > Collect VPN Accounting Data is to select Tools > Tasks and then in the Actions menu item select New Task > Collect VPN Accounting Data and click Ok. Both paths navigate to the same wizard. |
The resulting window is shown in Figure 9-11, "Collect VPN Accounting DataIntro." Be sure to read the recommended scheduling frequency.

Step 2 Click Next to continue.
The next window, as shown in Figure 9-12, "Selecting Devices for Accounting Collection," allows you to specify the NetFlow Collector from which to collect accounting information.

Step 3 In the window in Figure 9-12, "Selecting Devices for Accounting Collection," first click the Network drop-down menu to choose a specific network.
This window has two areas with the column headings Network, Name, Domain, and Role. The upper area includes all the targets selected in this step. The lower area is populated to include all the targets that you choose in Step 4 and Step 5, that is, all the collectors.
In the upper area, you can sort the collectors on each of the column headings, Network, Name, Domain, and Role. Just click that column header to sort on it.
Step 4 This step explains how to move devices to the lower area, thus selecting the NetFlow Collector hosts (indicated as Net Flow in the Role column) from which accounting data will be collected.
If you do not select any devices in the upper area, you can select Add All and all the devices appear in the lower area. If you select one or more devices, you can click Add and only those devices appear in the lower area.
![]() |
Note For traffic to be properly mapped across the VPN network, all NetFlow collectors must be collected from in a single task. |
Step 5 If you decide not to choose the devices now listed in the lower area, you can either select Remove All to eliminate all the selections in the lower area, or you can select those devices that you want to eliminate and click Remove.
You can continue editing the set of devices in the lower area by repeating Step 4 and Step 5.
Step 6 Click Next, when you want to choose the devices that appear in the lower block as the collectors for which accounting data will be collected.
Step 7 In the next window, as shown in Figure 9-13, "Providing a Task Name for Collection of Accounting Data," provide a unique Task Name.
![]() |
Note From the drop-down menu, you can view the last 30 existing task names for this specific task type. This can facilitate the creation of a unique task name and the adherence to the existing task naming conventions. From the drop-down list, you can highlight a similar task name to the one you want to create and then click on it. The name will appear in the Task Name field. Then you can edit the name to be a unique name. Otherwise, you can highlight Enter Name Here and enter a unique name in the Task Name field. |

Step 8 Click Next to continue.
Step 9 In the next window, you can choose to schedule the task by selecting Yes and clicking Next. In this case the next step is Step 10.
You can choose not to schedule the task by selecting No and clicking Next. In this case, the next step is Step 11.
Step 10 If you chose to schedule the task, in the next window, choose the scheduling directions and click Next. See Chapter 13, "Scheduling," for a full detailed description of scheduling.
Step 11 If you did not schedule the task, you are informed that "The task manager is about to save the task." If you did schedule the task, you are informed that "The task manager is about to save and schedule the task." If you want to change your mind on the scheduling instructions, click Back and return to Step 8 or Step 10. When you are ready to save and schedule the task, click Next.
Step 12 You are informed that "All steps are done." Click Close to close the wizard.
![]() |
Note Now that you have collected data for accounting, you can view this data as directed in the "View Accounting Reports" section. |
This section contains the following categories:
When you collect VPN routing information, you collect all VPN routing related tables from a Cisco router. You collect the VRF table, VPN CEF table, and BGP tag table. All these tables are correlated into one table called the VFIT (VPN Forwarding Info Table). This VFIT table is stored in the collection repository.
The MPLS VPN Solution accounting and auditing modules use the VFIT table for their internal calculation. When the accounting collection is scheduled, a new VFIT table is automatically collected as part of that process, but the auditing does not collect a new VFIT table. The auditor uses the last VFIT table in the Repository. Therefore, for a meaningful audit, before you run the audit you should Collect VPN Routing Information, which collects the VFIT table.
To set up routers for collection, be sure to implement the following requirements:
When setting up collection from routers, be sure that all the routers have the same prompts as in the csm.properties file for netsys.router.loginprompt and netsys.router.passwordprompt. The default values match the default values on Cisco routers. They are as follows:
netsys.router.loginprompt = Username:
netsys.router.passwordprompt = Password:
If you use nonstandard router prompts in the csm.properties file, be sure you set the same values for all the routers from which you collect.
When DNS is being used in the customer's network, it is also recommended that IP addresses are configured in the target database. If DNS is not properly configured on the routers and no IP addresses are configured in the target database, collections will fail due to a time-out.
If collections fail, verify that DNS is enabled by entering the following commands on the router:
ip domain-lookup
ip name-server <a.b.c.d>
where: <a.b.c.d> is a valid DNS.
![]() |
Note If DNS is not being used in the customer network, DNS should be disabled on all routers. To disable DNS, it is important to enter the following command on all routers: no ip domain-lookup |
To collect VPN routing information for Audit Routing, implement the following steps:

![]() |
Note An alternative to selecting Monitoring > Collect VPN Routing Information is to select Tools > Tasks and then in the Actions menu item select New Task > Collect VPN Routing Information and click Ok. Both paths navigate to the same wizard. |
Step 2 An introduction explains that this will set up a scheduled task that collects VPN routing information from Cisco routers. This information is necessary for the Use VPN routing information during audits behavior modifier option of the audit reports. The information is also used to generate VPN accounting reports (accessible from the Monitoring menu). Click Next to continue.
Step 3 The next window, as shown in Figure 9-15, "Selecting Devices for VPN Routing Information Collection,"allows you to specify devices for which to collect VPN routing information.
In the window in Figure 9-15, "Selecting Devices for VPN Routing Information Collection," first click the Network drop-down menu to choose the device from a specific network.
This window has two areas with the column headings Network, Name, Domain, and Role. The upper area includes all the routers selected by choosing a network from the Network drop-down menu. The lower area is populated to include all the routers that you choose in Step 4 and Step 5.
In the upper area, you can sort the routers on each of the column headings, Network, Name, Domain, and Role. Just click that column header to sort on it.

Step 4 This step explains how to move routers from the upper area to the lower area, thus selecting the routers from which VPN routing information is collected.
![]() |
Note Select only PEs, because there is no VPN routing information in CEs. Do NOT use the Add All button. |
If you do not select any devices in the upper area, you can select Add All and all the devices appear in the lower area. If you select one or more devices, you can click Add and only those devices appear in the lower area.
Step 5 If you decide not to choose the devices now listed in the lower area, you can either select Remove All to eliminate all the selections in the lower area, or you can select those devices that you want to eliminate and click Remove.
You can continue editing the set of routers in the lower area by repeating Step 4 and Step 5.
Step 6 Click Next, when you want to choose the devices that appear in the lower block as the devices for which VPN routing information will be collected.
Step 7 In the next window, as shown in Figure 9-16, "Providing a Task Name for Collection of VPN Routing Information," provide a unique Task Name
![]() |
Note From the drop-down menu, you can view the last 30 existing task names for this specific task type. This can facilitate the creation of a unique task name and the adherence to the existing task naming conventions. From the drop-down list, you can highlight a similar task name to the one you want to create and then click on it. The name will appear in the Task Name field. Then you can edit the name to be a unique name. Otherwise, you can highlight Enter Name Here and enter a unique name in the Task Name field. |

Step 8 Click Next to continue.
Step 9 In the next window, you can choose to schedule the task by selecting Yes and clicking Next. In this case the next step is Step 10.
You can choose not to schedule the task by selecting No and clicking Next. In this case, the next step is Step 11.
Step 10 If you chose to schedule the task, in the next window, choose the scheduling directions and click Next. See Chapter 13, "Scheduling," for a full detailed description of scheduling.
Step 11 If you did not schedule the task, you are informed that "The task manager is about to save the task." If you did schedule the task, you are informed that "The task manager is about to save and schedule the task." If you want to change your mind on the scheduling instructions, click Back and return to Step 9 or Step 10. When you are ready to save and schedule the task, click Next.
Step 12 You are informed that "All steps are done." Click Close to close the wizard.
This section contains the following categories:
Router configurations, known as configuration files, are usually collected at regular intervals and then examined for changes that affect the way the routers do their jobs. The normal collection process does not separate the routers whose configuration files have changed from the routers whose configuration files have not changed. However, the routers whose configuration files have changed are the only ones that need to be collected. SmartCollector finds the routers whose configuration files have changed and puts them in a group to have their configuration files collected.
With SmartCollector, we create a task and schedule it to be run once. When it executes, all the targeted routers are instructed to advise the MPLS VPN Solution software using the Simple Network Management Protocol (SNMP) of any change to their configuration files. MPLS VPN Solution, through the trapcatcher daemon, notes these traps and keeps track of the routers whose configuration files have changed, and thus need to be collected. The purpose of configuring traps (SmartCollector) is to efficiently collect router configuration files from a set of routers grouped by network.
An example of the potential substantial savings is a scenario in which a network has 200 routers but the configuration files for only 20 of the routers have changed. In this example, SmartCollector only collects the configuration files for the 20 that have changed rather than for all 200 routers. If on average only 10% of the routers have their configuration files changed between scheduled collections, each SmartCollection takes only 10% of the resources of a full collection.
Note that periodically (as determined by the cycle_t variable in csm.properties), the scheduler ignores the reduced target list and collects from all routers in the original target list. Thus even those routers whose traps failed to reach the MPLS VPN Solution are collected periodically.
The following is an example of the flow of execution:
1. Create collect router configuration files, as explained in the "Poll a Router's CAR MIB" section, for network N1 (which contains routers: R0, R1, R2, R3, R4).
2. Every hour, the scheduler executes a Collect Config task, which collects from the routers: R0, R1, R2, R3, nd R4.
3. The weakness with this process is that most router configuration files will not have changed and effort is wasted.
4. Solution: Execute Register for configchange traps for the specified routers in network N1. This task instructs all IOS version 12.x based routers to inform MPLS VPN Solution using SNMP traps if configuration files change (from the terminal or by trivial file transfer protocol (tftp)).
5. Starting with the next execution of a Collect Config task, the Collect Config task collects the configuration files of only those routers that have sent SNMP traps to MPLS VPN Solution, signifying that their configuration files may have changed.
6. Every time period defined in the csm.properties file by the cycle_t parameter, the Collect Config task makes a complete collection.
7. In this example, let us assume that the cycle_t parameter is set to 250 minutes, and let us assume that the Collect Config task is scheduled to execute every hour starting at 1:00 p.m. Let us also assume that the Register for configchange traps task was initiated at 1:25 p.m.
8. At 1:00 p.m. a complete collection is executed.
9. No Collect Config task executes when Register for configchange traps executes at 1:25 p.m.
10. At 2:00 p.m., 3:00 p.m., 4:00 p.m., and 5:00 p.m., the Collect Config task executes but collects configuration files only for those routers that have sent traps and are in the Collect Config task's original list of targets.
11. At 6:00 p.m. a full collection occurs, based on the following logic:
![]() |
Note The clock starts for the cycle_t parameter when Register for configchange traps is executed. The next full collection is the first Collect Configs task scheduled after meeting the minimum of the cycle_t parameter, based on SmartCollector. |
To set up prior to configuring traps, be sure to implement the following requirements:
When setting up collection from routers, be sure that all the routers have the same prompts as in the csm.properties file for netsys.router.loginprompt and netsys.router.passwordprompt. The default values match the default values on Cisco routers. They are as follows:
netsys.router.loginprompt = Username:
netsys.router.passwordprompt = Password:
If you use nonstandard router prompts in the csm.properties file, be sure you set the same values for all the routers from which you collect.
When DNS is being used in the customer's network, it is also recommended that IP addresses are configured in the target database. If DNS is not properly configured on the routers and no IP addresses are configured in the target database, collections will fail due to a time-out.
If collections fail, verify that DNS is enabled by entering the following commands on the router:
ip domain-lookup
ip name-server <a.b.c.d>
where: <a.b.c.d> is a valid DNS.
![]() |
Note If DNS is not being used in the customer network, DNS should be disabled on all routers. To disable DNS, it is important to enter the following command on all routers: no ip domain-lookup |
Prior to entering the GUI path for configuring traps, implement the following steps for each and every router, to determine whether SNMP is enabled. If SNMP is enabled, these steps will lead you to the first GUI path. If SNMP is not enabled, these steps will direct you on how to enable SNMP.
Step 2 Go into the enable state.
Step 3 Enter the command show snmp.
Step 4 Determine whether the following line is present:
% SNMP agent not enabled
Step 5 If the line in Step 4 is not present, you have determined that SNMP is enabled. Then enter the show run command to view the SNMP community strings at the end of the configuration file. The strings shown in appear near the end of the listing. If you have more routers to verify, return to Step 1 and follow these steps for the next router that you want to verify. Otherwise, proceed to the "Populate Interface Information for Cisco Router Targets" section.
If the line in Step 4 is present, proceed to Step 6.
Step 6 To turn on SNMP, at the prompt, enter the command config t.
Step 7 Enter the following commands:
snmp-server community <userstring> RO
snmp-server community <userstring> RW
where:
<userstring> is typically public with the RO setting and private with the RW setting.
Step 8 If you have more routers to verify, return to Step 1 and follow these steps for the next router that you want to verify.
![]() |
Note These SNMP strings must agree with those listed in the target password database for each router. (Refer to Chapter 3 in the Cisco VPN Solutions Center: MPLS Solution Provisioning and Operations Guide.) |
Prior to registering the config change traps, you must populate the router interfaces in the directory repository, as follows.

![]() |
Note An alternative to selecting Monitoring > Configure Traps > Populate Interface Information for Cisco Router Targets is to select Tools > Tasks and then in the Actions menu item select New Task > Populate Interface Information for Cisco Router Targets and click Ok. Both paths navigate to the same wizard. |
Step 2 In this Populate Interface Information for Cisco Router TargetsIntro window, click Next.
The next window, as shown in Figure 9-31, "Populate Interface Information for Cisco Router TargetsGet Devices," allows you to specify devices for which to populate interface information.

Step 3 In the window in Figure 9-31, "Populate Interface Information for Cisco Router TargetsGet Devices," first click the Network drop-down menu to choose a specific network.
This window has two areas with the column headings Network, Name, Domain, and Role. The upper area includes all the routers selected in this step. The lower area is populated to include all the routers that you choose in Step 4 and Step 5.
In the upper area, you can sort the routers on each of the column headings, Network, Name, Domain, and Role. Just click that column header to sort on it.
Step 4 This step explains how to move devices to the lower area, thus selecting the routers to populate.
If you do not select any devices in the upper area, you can select Add All and all the devices appear in the lower area. If you select one or more devices, you can click Add and only those devices appear in the lower area.
Step 5 If you decide not to choose the devices now listed in the lower area, you can either select Remove All to eliminate all the selections in the lower area, or you can select those devices that you want to eliminate and click Remove.
You can continue editing the set of devices in the lower area by repeating Step 4 and Step 5.
Step 6 Click Next, when you want to choose the devices that appear in the lower block as the routers to populate.
Step 7 In the next window, as shown in Figure 9-32, "Providing a Task Name for Populating a Router," provide a unique Task Name.
![]() |
Note From the drop-down menu, you can view the last 30 existing task names for this specific task type. This can facilitate the creation of a unique task name and the adherence to the existing task naming conventions. From the drop-down list, you can highlight a similar task name to the one you want to create and then click on it. The name will appear in the Task Name field. Then you can edit the name to be a unique name. Otherwise, you can highlight Enter Name Here and enter a unique name in the Task Name field. |

Step 8 Click Next to continue.
Step 9 In the next window, you can choose to schedule the task by selecting Yes and clicking Next. In this case the next step is Step 10.
You can choose not to schedule the task by selecting No and clicking Next. In this case, the next step is Step 11.
Step 10 If you chose to schedule the task, in the next window, choose the scheduling directions and click Next. See Chapter 13, "Scheduling," for a full detailed description of scheduling.
Step 11 If you did not schedule the task, you are informed that "The task manager is about to save the task." If you did schedule the task, you are informed that "The task manager is about to save and schedule the task." If you want to change your mind on the scheduling instructions, click Back and return to Step 9 or Step 10. When you are ready to save and schedule the task, click Next.
Step 12 You are informed that "All steps are done." Click Close to close the wizard.
This section explains how to register configuration file change traps, which indicates the routers (SmartCollector) for which data will be collected only if the routers have changed.

If Collect Config tasks are running and you initiate SmartCollection by registering for traps, the PEs MUST be IOS version 12.x to return traps.
Step 2 Follow the wizard.
![]() |
Note An alternative to selecting Monitoring > Configure Traps > Register for ConfigChange Traps is to select Tools > Tasks and then in the Actions menu item select New Task > Register for configchange traps and click Ok. Both paths navigate to the same wizard. |
![]() |
Note Configuration files for the routers that are not selected for SmartCollection are not collected. |
Step 3 The first window, as shown in Figure 9-21, "Register for configchange trapsIntro," explains the process. Click Next to continue.

Step 4 The next window allows you to continue to "Register to receive Cisco router configchange traps." Click Next to continue.
Step 5 The next window, as shown in Figure 9-22, "Selecting Devices," allows you to specify the routers that should send traps to MPLS VPN Solution.
In the window in Figure 9-22, "Selecting Devices," first click the Network drop-down menu to choose a specific network.
This window has two areas with the column headings Network, Name, Domain, and Role. The upper area includes all the routers selected in this step. The lower area is populated to include all the routers that you choose in Step 6 and Step 7. The SmartCollector only collects data from the routers that have changed.
In the upper area, you can sort the routers on each of the column headings, Network, Name, Domain, and Role. Just click that column header to sort on it.

Step 6 This step explains how to move devices to the lower area, thus selecting the router configuration files that will be collected only when the router configuration files change.
If you do not select any routers in the upper area, you can select Add All and these will appear in the lower area. If you select one or more routers, you can click Add and only those routers will appear in the lower area.
Step 7 If you decide not to choose the routers now listed in the lower area, you can either select Remove All to eliminate all the selections in the lower area, or you can select those routers that you want to eliminate and click Remove.
You can continue editing the set of routers in the lower area by repeating Step 6 and Step 7.
Step 8 Click Next, when you want to choose the routers that appear in the lower block as the routers for which data will be collected only when the router configuration files change.
![]() |
Note All the unchosen routers from the chosen network are not collected by the Collect Config tasks. |
Step 9 In the next window, as shown in Figure 9-23, "Providing a Task Name to Register for ConfigChange Traps," provide a Task Name.
![]() |
Note From the drop-down menu, you can view the last 30 existing task names for this specific task type. This can facilitate the creation of a unique task name and the adherence to the existing task naming conventions. From the drop-down list, you can highlight a similar task name to the one you want to create and then click on it. The name will appear in the Task Name field. Then you can edit the name to be a unique name. Otherwise, you can highlight Enter Name Here and enter a unique name in the Task Name field. |

Step 10 Click Next to continue.
Step 11 In the next window you can choose to schedule the task by selecting Yes and clicking Next. In this case, the next step is Step 12.
You can choose not to schedule the task by selecting No and clicking Next. In this case, the next step is Step 13.
Step 12 If you chose to schedule the task, in the next window, choose the scheduling directions and click Next. See Chapter 13, "Scheduling," for a detailed description of scheduling.
Step 13 If you did not schedule the task, you are informed that "The task manager is about to save the task." If you did schedule the task, you are informed that "The task manager is about to save and schedule the task." If you want to change your mind on the scheduling instructions, click Back and return to Step 11 or Step 12. When you are ready to save and schedule the task, click Next.
Step 14 You are informed that "All steps are done." Click Close to close the wizard.
This section explains how to deselect routers that you initially chose by SmartCollector, as explained in the "Register for ConfigChange Traps" section. After this procedure is completed, configuration files for all routers are collected whenever a collect configuration task is selected by the scheduler.

Step 2 Follow the wizard.
![]() |
Note An alternative to selecting Monitoring > Configure Traps > Deregister for ConfigChange Traps is to select Tools > Tasks and then in the Actions menu item select New Task > Deregister for configchange traps and click Ok. Both paths navigate to the same wizard. |
The first window explains the process.
Step 3 Click Next to continue.
![]() |
Note An alternative to selecting Monitoring > Configure Traps > Deregister for ConfigChange Traps is to select Tools > Tasks and then in the Actions menu item select New Task > Deregister for configchange traps and click Ok. Both paths navigate to the same wizard. |
The next window allows you to continue to "Deregister to receive Cisco router configchange traps."
Step 4 Click Next to continue.
The next window, as shown in Figure 9-25, "Selecting Devices Not to Trap," allows you to specify routers not to be trapped.
Step 5 In the window in Figure 9-25, "Selecting Devices Not to Trap," first click the Network drop-down menu to choose a specific network.
This window has two areas with the column headings Network, Name, Domain, and Role. The upper area includes all the routers chosen in this step. The lower area is populated to include all the routers that you choose in Step 6 and Step 7, that is all the routers that will return to the status of collecting data at all times.
In the upper area, you can sort the routers on each of the column headings, Network, Name, Domain, and Role. Just select that column header to sort on it.

Step 6 This step explains how to move routers to the lower area, thus selecting the routers that will return to the status of collecting data at all times.
If you do not select any routers in the upper area, you can select Add All and these will appear in the lower area. If you select one or more routers, you can click Add and only those routers will appear in the lower area.
Step 7 If you decide not to choose the routers in the lower area, you can either select Remove All to eliminate all the selections in the lower area, or you can select those routers that you want to eliminate and click Remove. You can continue editing the set of routers in the lower area by repeating Step 6 and Step 7.
Step 8 Click Next, when you want to choose the routers that appear in the lower block as the routers that will return to the status of collecting data at all times.
Step 9 In the next window, as shown in Figure 9-26, "Providing a Task Name to Deregister for ConfigChange Traps," provide a Task Name.
![]() |
Note From the drop-down menu, you can view the last 30 existing task names for this specific task type. This can facilitate the creation of a unique task name and the adherence to the existing task naming conventions. From the drop-down list, you can highlight a similar task name to the one you want to create and then click on it. The name will appear in the Task Name field. Then you can edit the name to be a unique name. Otherwise, you can highlight Enter Name Here and enter a unique name in the Task Name field. |

Step 10 Click Next to continue.
Step 11 In the next window you can choose to schedule the task by selecting Yes and clicking Next. In this case, the next step is Step 12.
You can choose not to schedule the task by selecting No and clicking Next. In this case, the next step is Step 13.
Step 12 If you chose to schedule the task, in the next window, choose the scheduling directions and click Next. See Chapter 13, "Scheduling," for a detailed description of scheduling.
Step 13 If you did not schedule the task, you are informed that "The task manager is about to save the task." If you did schedule the task, you are informed that "The task manager is about to save and schedule the task." If you want to change your mind on the scheduling instructions, click Back and return to Step 11 or Step 12. When you are ready to save and schedule the task, click Next.
Step 14 You are informed that "All steps are done." Click Close to close the wizard.
The file csm.properties holds information for target collector files in the variables prefixed with netsys.datacollector.cct. You can use a text editor to reset the properties for the csm.properties file. These files, their defaults, and what they represent are explained in Table 9-1, "Property Settings for SmartCollector."
| Property | Default Value | Explanation |
|---|---|---|
sc_port | 1607 | The value is the port location at which the SmartCollector listens for traps. |
sc_delay | 120 | The value is the number of seconds between writing traps to the Repository. |
tc_targets | tc_targets | This location is where all traps are kept. This file is for internal use. |
gc_targets | gc_targets | This location is where all unused traps are kept.This file is for internal use. |
gc_failures | This location is where all failed traps are kept. This file is for internal use. | |
cycle_t | 250 | The value is the number of minutes between full collections. |
The following is the default of what you will find in the csm.properties file:
netsys.datacollector.cct.sc_port = 1607netsys.datacollector.cct.sc_delay = 120
netsys.datacollector.cct.tc_targets = tc_targets
netsys.datacollector.cct.gc_targets = gc_targets
netsys.datacollector.cct.gc_failures = gc_failures
netsys.datacollector.cct.cycle_t = 250
This section contains the following categories:
The interface statistics collection feature collects traffic data per interface for one or more Cisco routers.
The following data is collected from the MIB2 interface table:
Prior to collecting interface statistics, implement the following steps for each and every router, to determine whether SNMP is enabled. If SNMP is enabled, these steps will lead you to the first GUI path. If SNMP is not enabled, these steps will direct you on how to enable SNMP.
Step 2 Go into the enable state.
Step 3 Enter the command show snmp.
Step 4 Determine whether the following line is present:
% SNMP agent not enabled
Step 5 If the line in Step 4 is not present, you have determined that SNMP is enabled. Then enter the show run command to view the SNMP community strings at the end of the configuration file. The strings shown in Step 7 appear near the end of the listing. If you have more routers to verify, return to Step 1 and follow these steps for the next router that you want to verify. Otherwise, proceed to the "Interface Statistics" section.
If the line in Step 4 is present, proceed to Step 6.
Step 6 To turn on SNMP, at the prompt, enter the command config t.
Step 7 Enter the following commands:
snmp-server community <userstring> RO
snmp-server community <userstring> RW
where:
<userstring> is typically public with the RO setting and private with the RW setting.
Step 8 If you have more routers to verify, return to Step 1 and follow these steps for the next router that you want to verify.
If this is the last router to verify, proceed to the "Interface Statistics" section.
To collect interface statistics for Cisco routers, implement the following steps:

![]() |
Note An alternative to selecting Monitoring > Interface Statistics is to select Tools > Tasks and then in the Actions menu item select New Task > Interface Statistics Collection for Cisco Routers and click Ok. Both paths navigate to the same wizard. |
Step 2 The first window informs you this wizard sets up a scheduled task that polls for information about router interface statistics, stores the data in the collection repository, and can be accessed using APIs.
Click Next to continue.
Step 3 The next window, as shown in Figure 9-28, "Interface Statistics Collection for Cisco RoutersGet Devices," allows you to specify from which devices to collect interface statistics.

In the window, first click the Network drop-down menu to choose a specific network.
Step 4 This window has two areas with the column headings Network, Name, Domain, and Role. The upper area includes all the routers selected in this step. The lower area is populated to include all the routers that you choose in Step 5 and Step 6.
In the upper area, you can sort the routers on each of the column headings, Network, Name, Domain, and Role. Just click that column header to sort on it.
Step 5 This step explains how to move devices to the lower area, thus selecting the routers from which interface statistics will be collected.
If you do not select any devices in the upper area, you can select Add All and all the devices appear in the lower area. If you select one or more devices, you can click Add and only those devices appear in the lower area.
Step 6 If you decide not to choose the devices now listed in the lower area, you can either select Remove All to eliminate all the selections in the lower area, or you can select those devices that you want to eliminate and click Remove.
You can continue editing the set of devices in the lower area by repeating Step 5 and Step 6.
Step 7 Click Next, when you want to choose the devices that appear in the lower block as the routers from which interface statistics will be collected.
Step 8 In the next window, as shown in Figure 9-29, "Providing a Task Name for Interface Statistics Collection," provide a unique Task Name.
![]() |
Note From the drop-down menu, you can view the last 30 existing task names for this specific task type. This can facilitate the creation of a unique task name and the adherence to the existing task naming conventions. From the drop-down list, you can highlight a similar task name to the one you want to create and then click on it. The name will appear in the Task Name field. Then you can edit the name to be a unique name. Otherwise, you can highlight Enter Name Here and enter a unique name in the Task Name field. |

Step 9 Click Next to continue.
Step 10 In the next window, you can choose to schedule the task by selecting Yes and clicking Next. In this case the next step is Step 11.
You can choose not to schedule the task by selecting No and clicking Next. In this case, the next step is Step 12.
Step 11 If you chose to schedule the task, in the next window, choose the scheduling directions and click Next. See Chapter 13, "Scheduling," for a full detailed description of scheduling.
Step 12 If you did not schedule the task, you are informed that "The task manager is about to save the task." If you did schedule the task, you are informed that "The task manager is about to save and schedule the task." If you want to change your mind on the scheduling instructions, click Back and return to Step 9 or Step 11. When you are ready to save and schedule the task, click Next.
Step 13 You are informed that "All steps are done." Click Close to close the wizard.
![]() |
Note Reports of interface statistics can only be viewed in Extensible Markup Language (XML) format. For more information about how to generate an XML formatted report, refer to the "XML Data Query Tool" section |
This section contains the following categories:
The committed access rate (CAR) management information bases (MIB) collection feature covers the packets dropped based on the CAR command configured on the router. CAR provides the status for each interface on each router configured with CAR. CAR is a bandwidth management tool that controls internet protocol (IP) traffic transmission rates into the network during periods of network congestion. CAR achieves this control through rate limiting (with burst capabilities) and also classifies and marks packets using IP Precedence and quality-of-service (QoS) group settings. CAR MIBs provide the status for the token bucket parameters, associated access lists, and configurable action policies for each rate limit.
![]() |
Note CAR MIB data can be viewed in reports By Customer or By Network. See the "View CAR MIB Report" section. To view a CAR MIB report By Customer, the CAR must be configured and collected from CE routers. |
When setting up collection from routers, be sure that all the routers have the same prompts as in the csm.properties file for netsys.router.loginprompt and netsys.router.passwordprompt. The default values match the default values on Cisco routers. They are as follows:
netsys.router.loginprompt = Username:
netsys.router.passwordprompt = Password:
If you use nonstandard router prompts in the csm.properties file, be sure you set the same values for all the routers from which you collect.
When DNS is being used in the customer's network, it is also recommended that IP addresses are configured in the target database. If DNS is not properly configured on the routers and no IP addresses are configured in the target database, collections will fail due to a time-out.
If collections fail, verify that DNS is enabled by entering the following commands on the router:
ip domain-lookup
ip name-server <a.b.c.d>
where: <a.b.c.d> is a valid DNS.
![]() |
Note If DNS is not being used in the customer network, DNS should be disabled on all routers. To disable DNS, it is important to enter the following command on all routers: no ip domain-lookup |
Prior to polling a router's CAR MIB, implement the following steps for each and every router, to determine whether SNMP is enabled. If SNMP is enabled, these steps will lead you to the first GUI path. If SNMP is not enabled, these steps will direct you on how to enable SNMP.
Step 2 Go into the enable state.
Step 3 Enter the command show snmp.
Step 4 Determine whether the following line is present:
% SNMP agent not enabled
Step 5 If the line in Step 4 is not present, you have determined that SNMP is enabled. Then enter the show run command to view the SNMP community strings at the end of the configuration file. The strings shown in Step 7 appear near the end of the listing. If you have more routers to verify, return to Step 1 and follow these steps for the next router that you want to verify. Otherwise, proceed to the "Populate Interface Information for Cisco Router Targets" section.
If the line in Step 4 is present, proceed to Step 6.
Step 6 To turn on SNMP, at the prompt, enter the command config t.
Step 7 Enter the following commands:
snmp-server community <userstring> RO
snmp-server community <userstring> RW
where:
<userstring> is typically public with the RO setting and private with the RW setting.
Step 8 If you have more routers to verify, return to Step 1 and follow these steps for the next router that you want to verify.
If this is the last router to verify, proceed to the "Populate Interface Information for Cisco Router Targets" section.
Prior to entering the GUI path to poll a router's CAR MIB, you must populate the router interfaces in the directory repository. This is necessary for the reports to accurately list the Interface Names (see the "View CAR MIB Report" section). If you do not populate the router interfaces in the directory repository, the Interface Name defaults to DUMMY. If this happens, it is possible to run this wizard after this oversight is identified and rerun the reports.
Populate as follows:

![]() |
Note An alternative to selecting Monitoring > Configure Traps > Populate Interface Information for Cisco Router Targets is to select Tools > Tasks and then in the Actions menu item select New Task > Populate Interface Information for Cisco Router Targets and click Ok. Both paths navigate to the same wizard. |
Step 2 In this Populate Interface Information for Cisco Router TargetsIntro window, click Next.
The next window, as shown in Figure 9-31, "Populate Interface Information for Cisco Router TargetsGet Devices," allows you to specify devices for which to populate interface information.

Step 3 In the window in Figure 9-31, "Populate Interface Information for Cisco Router TargetsGet Devices," first click the Network drop-down menu to choose a specific network.
This window has two areas with the column headings Network, Name, Domain, and Role. The upper area includes all the routers selected in this step. The lower area is populated to include all the routers that you choose in Step 4 and Step 5.
In the upper area, you can sort the routers on each of the column headings, Network, Name, Domain, and Role. Just click that column header to sort on it.
Step 4 This step explains how to move devices to the lower area, thus selecting the routers to populate.
If you do not select any devices in the upper area, you can select Add All and all the devices appear in the lower area. If you select one or more devices, you can click Add and only those devices appear in the lower area.
Step 5 If you decide not to choose the devices now listed in the lower area, you can either select Remove All to eliminate all the selections in the lower area, or you can select those devices that you want to eliminate and click Remove.
You can continue editing the set of devices in the lower area by repeating Step 4 and Step 5.
Step 6 Click Next, when you want to choose the devices that appear in the lower block as the routers to populate.
Step 7 In the next window, as shown in Figure 9-32, "Providing a Task Name for Populating a Router," provide a unique Task Name.
![]() |
Note From the drop-down menu, you can view the last 30 existing task names for this specific task type. This can facilitate the creation of a unique task name and the adherence to the existing task naming conventions. From the drop-down list, you can highlight a similar task name to the one you want to create and then click on it. The name will appear in the Task Name field. Then you can edit the name to be a unique name. Otherwise, you can highlight Enter Name Here and enter a unique name in the Task Name field. |

Step 8 Click Next to continue.
Step 9 In the next window, you can choose to schedule the task by selecting Yes and clicking Next. In this case the next step is Step 10.
You can choose not to schedule the task by selecting No and clicking Next. In this case, the next step is Step 11.
Step 10 If you chose to schedule the task, in the next window, choose the scheduling directions and click Next. See Chapter 13, "Scheduling," for a full detailed description of scheduling.
Step 11 If you did not schedule the task, you are informed that "The task manager is about to save the task." If you did schedule the task, you are informed that "The task manager is about to save and schedule the task." If you want to change your mind on the scheduling instructions, click Back and return to Step 9 or Step 10. When you are ready to save and schedule the task, click Next.
Step 12 You are informed that "All steps are done." Click Close to close the wizard.
To poll a router's CAR MIB, implement the following steps:

![]() |
Note An alternative to selecting Monitoring > Poll a Router's CAR MIB is to select Tools > Tasks and then in the Actions menu item select New Task > Poll a Router's CAR MIB and click Ok. Both paths navigate to the same wizard. |
Step 2 The first window informs you this wizard creates a task to poll Cisco routers for data from the CAR MIB.
Click Next to continue.
Step 3 The next window informs you that next you can start polling a Cisco router(s) CAR MIB.
Click Next to continue.
Step 4 The next window, as shown in Figure 9-34, "Poll a Router's CAR MIBGet Devices," allows you to specify which devices to poll for the router's CAR MIB information.

In the window, first click the Network drop-down menu to choose a specific network.
Step 5 This window has two areas with the column headings Network, Name, Domain, and Role. The upper area includes all the routers selected in this step. The lower area is populated to include all the routers that you choose in Step 6 and Step 7.
In the upper area, you can sort the routers on each of the column headings, Network, Name, Domain, and Role. Just click that column header to sort on it.
Step 6 This step explains how to move devices to the lower area, thus selecting the routers from which CAR MIB data will be polled.
If you do not select any devices in the upper area, you can select Add All and all the devices appear in the lower area. If you select one or more devices, you can click Add and only those devices appear in the lower area.
Step 7 If you decide not to choose the devices now listed in the lower area, you can either select Remove All to eliminate all the selections in the lower area, or you can select those devices that you want to eliminate and click Remove.
You can continue editing the set of devices in the lower area by repeating Step 6 and Step 7.
Step 8 Click Next, when you want to choose the devices that appear in the lower block as the routers for which CAR MIB data will be polled.
Step 9 In the next window, as shown in Figure 9-35, "Providing a Task Name for Polling a Router's CAR MIB," provide a unique Task Name. Then click Next.

![]() |
Note If the task name that you enter is not unique, you will receive an error message indicating this. Click OK and enter a new unique task name. |
Step 10 In the next window, you can choose to schedule the task by selecting Yes and clicking Next. In this case the next step is Step 11.
You can choose not to schedule the task by selecting No and clicking Next. In this case, the next step is Step 12.
Step 11 If you chose to schedule the task, in the next window, choose the scheduling directions and click Next. See Chapter 13, "Scheduling," for a full detailed description of scheduling.
![]() |
Note The recommendation is to collect every quarter hour to avoid multiple counter wraps. This requires four separate tasks to be scheduled, each starting 15 minutes apart and reoccurring every hour. You may need to increase the frequency of collections to more than every quarter hour, dependent upon the speed of the interfaces and the volume of traffic on the router being polled. |
Step 12 If you did not schedule the task, you are informed that "The task manager is about to save the task." If you did schedule the task, you are informed that "The task manager is about to save and schedule the task." If you want to change your mind on the scheduling instructions, click Back and return to Step 10. When you are ready to save and schedule the task, click Next.
Step 13 You are informed that "All steps are done." Click Close to close the wizard.
![]() |
Note Now that you have polled a router's CAR MIB, you can view this data as directed in the "View CAR MIB Report" section. |
This section contains the following categories:
The SLA server collects the relevant performance data, stores it persistently, aggregates it, and presents useful reports (see the "View SLA Reports" section). The SLA server is based on the SA Agent MIB. The MPLS VPN Solution software leverages the SA Agent MIB to monitor SLA performance on a 24 x 7 basis. Using the MIB, you can monitor network traffic for the popular protocols: Dynamic Host Configuration Protocol (DHCP), Domain Name System (DNS), Hyper text Transfer Protocol (HTTP), Internet Control Message Protocol Echo (ICMP Echo), Jitter (voice jitter), Transmission Control Protocol Connect (TCP Connect), and User Datagram Protocol Echo (UDP Echo).
Prior to provisioning SLA definitions and collecting SLA data, implement the following sections:
Prior to collecting SA Agent data for SLA, implement the following steps for each and every router, to determine whether SNMP is enabled. If SNMP is enabled, these steps will lead you to the first GUI path. If SNMP is not enabled, these steps will direct you on how to enable SNMP.
Step 2 Go into the enable state.
Step 3 Enter the command show snmp.
Step 4 Determine whether the following line is present:
% SNMP agent not enabled
Step 5 If the line in Step 4 is not present, you have determined that SNMP is enabled. Then enter the show run command to view the SNMP community strings at the end of the configuration file. The strings shown in Step 7 appear near the end of the listing. If you have more routers to verify, return to Step 1 and follow these steps for the next router that you want to verify. Otherwise, proceed to Step 9.
If the line in Step 4 is present, proceed to Step 6.
Step 6 To turn on SNMP, at the prompt, enter the command config t.
Step 7 Enter the following commands:
snmp-server community <userstring> RO
snmp-server community <userstring> RW
where:
<userstring> is typically public with the RO setting and private with the RW setting.
Step 8 If you have more routers to verify, return to Step 1 and follow these steps for the next router that you want to verify.
Step 9 To provision a UDP Echo SLA, enter the following command on the router:
service udp-small-servers
Step 10 To provision a Jitter SLA, enter the following command on the source router and the destination router:
rtr responder
![]() |
Note These SNMP strings must agree with those listed in the target password database for each router. (Refer to Chapter 3 in the Cisco VPN Solutions Center: MPLS Solution User Guide.) |
To set up the Device Inventory repository, implement the following steps:
Step 2 Choose the target network by double-clicking on the network of your choice.
Step 3 From the resulting window, select SNMP-configured routers and click on Actions.
Step 4 Then choose either Edit Target or Edit Multiple. Choose the Passwords option and confirm that the router passwords and SNMP strings concur with what is configured on the routers.
Step 5 To populate the IP addresses into the Device Inventory repository, choose Tools > Tasks > Actions > New Task > Populate Interface Information for Cisco Router Targets and follow this wizard.
To set up the VPN Repository, implement the following steps:
Step 2 Refer to Chapter 3 of the Cisco VPN Solutions Center: MPLS Solution User Guide for steps to confirm the CE's SA Agent status.

![]() |
Note An alternative to selecting Monitoring > Provision SLA Definitions and Collect SLA Data is to select Tools > Tasks and then in the Actions menu item select New Task > Provision SLA Definitions and Collect SLA Data and click Ok. Both paths navigate to the same wizard. |
The first window informs you this wizard creates/deletes SLA definitions on SA Agent enabled routers and collects data for SLA monitoring.
Step 2 Click Next to continue.
The next window, as shown in Figure 9-37, "Selecting an SLA Operation," allows you to select one of the following options:

Step 3 After you make your selection, click Next to continue.
When you select Create SLA, you can create one or more SA Agent probes on multiple routers.
When you navigate from Monitoring > Provision SLA Definitions and Collect SLA Data and then choose Create SLA, you can then implement the following steps:
The next window, as shown in Figure 9-38, "Selecting CEs to Create SLAs," allows you to select one or more CEs.

The CEs for the chosen customer and VPN appear in the field with the column headings CE Name, Network Name, and Domain Name.
Step 2 Select one or more CEs for which you want to create SLAs. Press the Ctrl key to highlight multiple CEs.
Step 3 Click Next to continue.
The next window is shown in Figure 9-39, "Selecting an IP Address for Each CE."

Step 4 For each CE click the drop-down menu to choose a specific source IP address for that CE.
Step 5 Click Next to continue.
The next window is shown in Figure 9-40, "Selecting Values for SLA Common Parameters."

Step 6 Enter the values for the common SLA parameters that are needed for each of the protocols.
The fields in Figure 9-40, "Selecting Values for SLA Common Parameters," are as follows:
.
| ToS Value | Binary Value | Meaning |
|---|---|---|
7 | 111 | In contract, best class |
6 | 110 | In contract, second best class |
5 | 101 | In contract, third best class |
4 | 100 | In contract, worst class |
3 | 011 | Out of contract, best class |
2 | 010 | Out of contract, second best class |
1 | 001 | Out of contract, third best class |
0 | 000 | Out of contract, worst class |
Step 7 Click Next to continue.
The next window is shown in Figure 9-41, "Selecting a Protocol and Protocol Specific Data."

Step 8 Select a protocol and enter the fields associated with it.
The protocols and the protocol-specific parameters are as follows:






Step 9 Press the Add button to the right of the top data field in Figure 9-47, "Selecting the DHCP Protocol and its Specific Data." Data will appear in the top data field based on all the parameters you specify.
Step 10 Create SLAs for other protocols by selecting other protocols, one at a time, completing the fields associated with the protocol, and pressing the Add button.
Step 11 If after you review the data in the top data field, you decide to eliminate an SLA or multiple sequential SLAs, highlight the SLA or press the Ctrl button and highlight multiple SLAs, and then click the Delete button to the right of the top data field.
Step 12 After you have the SLAs that you want to create correctly specified in the top data field, click Next to continue.
Step 13 In the next window, as shown in Figure 9-48, "Providing a Task Name for Creation of SLAs," provide a unique Task Name.
![]() |
Note From the drop-down menu, you can view the last 30 existing task names for this specific task type. This can facilitate the creation of a unique task name and the adherence to the existing task naming conventions. From the drop-down list, you can highlight a similar task name to the one you want to create and then click on it. The name will appear in the Task Name field. Then you can edit the name to be a unique name. Otherwise, you can highlight Enter Name Here and enter a unique name in the Task Name field. |

Step 14 Click Next.
Step 15 In the next window, you can choose to schedule the task by selecting Yes and clicking Next. In this case the next step is Step 16.
Otherwise, you can choose not to schedule the task by selecting No and clicking Next. In this case, the next step is Step 17.
Step 16 If you chose to schedule the task, in the next window, choose the scheduling directions and click Next. See Chapter 13, "Scheduling," for a full detailed description of scheduling.
Step 17 If you did not schedule the task, you are informed that "The task manager is about to save the task." If you did schedule the task, you are informed that "The task manager is about to save and schedule the task." If you want to change your mind on the scheduling instructions, click Back and return to Step 15 or Step 16. When you are ready to save and schedule the task, click Next.
Step 18 You are informed that "All steps are done." Click Close to close the wizard.
Delete SLA deletes an SA Agent probe from the router.
When you navigate from Monitoring > Provision SLA Definitions and Collect SLA Data and then choose Delete SLA, you can then implement the following steps:
The next window, as shown in Figure 9-49, "Selecting CEs to Delete SLAs," allows you to select one or more CEs.

Step 2 Click the VPN drop-down menu to choose a specific VPN.
The CEs for the chosen customer and VPN appear in the field with the column headings CE Name, Network Name, and Domain Name.
Step 3 Select one or more CEs for which you want to delete SLAs. Press the Ctrl key to highlight multiple CEs.
Step 4 Click Next to continue.
The next window is shown in Figure 9-50, "Selecting SLAs to Delete."

Step 5 Highlight one or more SLAs to delete.
Step 6 Press the Ctrl key to highlight multiple SLAs.
Step 7 Click Next to continue.
Step 8 In the next window, as shown in Figure 9-51, "Providing a Task Name for Deletion of SLAs," provide a unique Task Name.
![]() |
Note From the drop-down menu, you can view the last 30 existing task names for this specific task type. This can facilitate the creation of a unique task name and the adherence to the existing task naming conventions. From the drop-down list, you can highlight a similar task name to the one you want to create and then click on it. The name will appear in the Task Name field. Then you can edit the name to be a unique name. Otherwise, you can highlight Enter Name Here and enter a unique name in the Task Name field. |

Step 9 Click Next to continue.
Step 10 In the next window, you can choose to schedule the task by selecting Yes and clicking Next. In this case the next step is Step 11.
You can choose not to schedule the task by selecting No and clicking Next. In this case, the next step is Step 12.
Step 11 If you chose to schedule the task, in the next window, choose the scheduling directions and click Next. See Chapter 13, "Scheduling," for a full detailed description of scheduling.
Step 12 If you did not schedule the task, you are informed that "The task manager is about to save the task." If you did schedule the task, you are informed that "The task manager is about to save and schedule the task." If you want to change your mind on the scheduling instructions, click Back and return to Step 10 or Step 11. When you are ready to save and schedule the task, click Next.
Step 13 You are informed that "All steps are done." Click Close to close the wizard.
Collect Data for SLA Monitoring downloads SLA statistics collected over the last hour from one or more specified routers. The specified routers have the relevant SA Agent probes programmed on them, which are collecting SLA statistics.
![]() |
Note Data for a new SLA does not appear until one hour after the creation of the SLA. |
When you navigate from Monitoring > Provision SLA Definitions and Collect SLA Data and then choose Collect Data for SLA Monitoring, you can then implement the following steps:
The next window, as shown in Figure 9-52, "Selecting CEs to Collect Data for SLA Monitoring," allows you to select one or more CEs.

Step 2 Click the VPN drop-down menu to choose a specific VPN.
The CEs for the chosen customer and VPN appear in the field with the column headings CE Name, Network Name, and Domain Name.
Step 3 Select one or more CEs from which you want to collect SA Agent data. Press the Ctrl key to highlight multiple CEs.
Step 4 Click Next to continue.
Step 5 In the next window to appear, as shown in Figure 9-53, "Providing a Task Name to Collect Data for SLA Monitoring," provide a unique Task Name.
![]() |
Note From the drop-down menu, you can view the last 30 existing task names for this specific task type. This can facilitate the creation of a unique task name and the adherence to the existing task naming conventions. From the drop-down list, you can highlight a similar task name to the one you want to create and then click on it. The name will appear in the Task Name field. Then you can edit the name to be a unique name. Otherwise, you can highlight Enter Name Here and enter a unique name in the Task Name field. |

Step 6 Click Next to continue.
Step 7 In the next window, you can choose to schedule the task by selecting Yes and clicking Next. In this case the next step is Step 8.
You can choose not to schedule the task by selecting No and clicking Next. In this case, the next step is Step 9.
Step 8 If you chose to schedule the task, in the next window, choose the scheduling directions and click Next. See Chapter 13, "Scheduling," for a full detailed description of scheduling.
Step 9 If you did not schedule the task, you are informed that "The task manager is about to save the task." If you did schedule the task, you are informed that "The task manager is about to save and schedule the task." If you want to change your mind on the scheduling instructions, click Back and return to Step 7 or Step 8. When you are ready to save and schedule the task, click Next.
Step 10 You are informed that "All steps are done." Click Close to close the wizard.
Accounting reports, which are based on processed accounting data, provide network usage and planning information. Billing systems can get the traffic usage from the Accounting Server, which leverages collected accounting data and provides complete billing services to customers.
After collecting VPN accounting data, explained in the "Collect VPN Accounting Data" section, you can view reports about VPN accounting data. As shown in Figure 9-54, "View Accounting Reports," from the VPN Console window, choose Monitoring > View Accounting Reports, followed by one of the following types of reports:

For information within the Accounting Reports, first see the generic report fields and their explanations in Chapter 14, "Reports Overview." Additionally each report has a report-specific Results area and bottom task bar information.
Traffic Summary reports are time-based drill-down reports that display total packets and total K bytes for traffic that can be mapped to the VPN world (VPN Traffic) and otherwise to Unmappable Traffic. Traffic Summary acts as a starting point to get to other reports.
To display a Traffic Summary report, implement the following step:

You receive a report similar to the example in Figure 9-56, "Example Traffic Summary Report."

For a description of the Traffic Summary report, first see the explanation of the generic report fields in "Reports Overview." The section Results Area for Traffic Summary Report provides information specific to the Traffic Summary report.
The columns of information are as follows:
Application Type Summary reports provide total packets and total K bytes for each application type.
To display an Application Type Summary report, implement the following step:

You receive a report similar to the example in Figure 9-58, "Example Application Type Summary Report."

For a description of the Application Type Summary report, first see the explanation of the generic report fields in "Reports Overview." The section Results Area for Application Type Summary Report provides information specific to the Application Type Summary report.
The columns of information are as follows:
Customer Summary reports provide total packets and total K bytes for each customer plus drill-down reports for customer site, type of service, and application type.
To display a Customer Summary report, implement the following step:

You receive a report similar to the example in Figure 9-60, "Example Customer Summary Report."

For a description of the Customer Summary report, first see the explanation of the generic report fields in "Reports Overview." The section Results Area for Customer Summary Report provides information specific to the Customer Summary report.
The columns of information are as follows:
PE to PE Traffic Summary provides a report of all traffic between PE to PE plus drill-down reports for: PE to connected CE; PE to remote CE; PE traffic; PE to CE.
To display a PE to PE Traffic Summary report, implement the following step:

You receive a report similar to the example in Figure 9-62, "Example PE to PE Traffic Summary Report."

For a description of the PE to PE Traffic Summary report, first see the explanation of the generic report fields in "Reports Overview." The section Results Area for PE to PE Traffic Summary Report provides information specific to the PE to PE Traffic Summary report.
The columns of information are as follows:
CE to CE Traffic Summary provides a report of all traffic between CE to CE.
To display a CE to CE Traffic Summary report, implement the following steps:

You receive a window similar to the example in Figure 9-64, "Customer Chooser for CE to CE Traffic Summary."

Step 2 In the Select a Customer field in Figure 9-64, "Customer Chooser for CE to CE Traffic Summary," highlight the row or rows that indicate the customer or customers you want to select.
Step 3 In the Report Time Level drop-down list, select from among the following choices:
Step 4 Click OK to generate a report based on the information you specified in this window, as shown in Figure 9-65, "Example CE to CE Traffic Summary Report." If you click Cancel, you will return to the VPN Console window.

For a description of the CE to CE Traffic Summary report, first see the explanation of the generic report fields in "Reports Overview." The section Results Area for CE to CE Traffic Summary Report provides information specific to the CE to CE Traffic Summary report.
The columns of information are as follows:
Type of Service Summary reports provide total packets and total K bytes for each TOS.
To display a Type of Service Summary report, implement the following step:

You receive a report similar to the example in Figure 9-67, "Example Type of Service Summary Report."

For a description of the Type of Service Summary report, first see the explanation of the generic report fields in "Reports Overview." The section Results Area for Type of Service Summary Report provides information specific to the Type of Service Summary report.
The columns of information are as follows:
Customer Traffic Volume (CECE) reports on all traffic volume for a specific customer between customer edge router (CE) to CE in packets or K bytes (by TOS).
To display a Customer Traffic Volume (CECE) report, implement the following steps:

You receive a window similar to the example in Figure 9-69, "CE Chooser for Customer Traffic Volume (CECE)."

Step 2 In the Customer drop-down menu in Figure 9-69, "CE Chooser for Customer Traffic Volume (CECE)," click to get a list of Customers.
Step 3 Select the customer for which you want information.
In the Customer field, each row of information is about a specific CE for the specified Customer. It includes the following columns of information and a row for each CE.
![]() |
Note In the Customer field, you can click the column header name for any column you want to sort. |
Step 4 Select a CE for which you want information and highlight that row.
Step 5 In the Direction area, select either Origin or Destination to select traffic originated from or targeted to the selected CE, respectively.
Step 6 In the Report Time Level drop-down list, select from among the following choices:
Step 7 Click OK to generate a report based on the information you specified in this window, as shown in Figure 9-70, "Example Customer Traffic Volume (CECE) Report." If you click Cancel, you will return to the VPN Console window.

For a description of the Customer Traffic Volume (CECE) report, first see the explanation of the generic report fields in "Reports Overview." The section Results Area for Customer Traffic Volume (CECE) Report provides information specific to the Customer Traffic Volume (CECE) report.
The columns of information are as follows:
Network Traffic Volume (PEPE) reports on all traffic volume between provider edge router (PE) to PE in packets or K bytes (by TOS).
To display a Network Traffic Volume (PEPE) report, implement the following steps:

You receive a window similar to the example in Figure 9-72, "PE Chooser for Network Traffic Volume (PEPE)."

In the PE field, each row of information is about a specific PE. It includes the following columns of information.
![]() |
Note In the PE field, you can click the column header name for any column you want to sort. |
Step 2 Select the PE for which you want information and highlight that row.
Step 3 In the Direction area, select whether you want to view the Origin, to select traffic originated from the selected PEs, or the Destination, to select traffic targeted toward the selected PEs.
Step 4 In the Report Time Level drop-down list, select from among the following choices:
Step 5 Click OK to generate a report based on the information you specified in this window, as shown in Figure 9-73, "Example Network Traffic Volume (PEPE) Report." If you click Cancel, you will return to the VPN Console window.

For a description of the Network Traffic Volume (PEPE) report, first see the explanation of the generic report fields in "Reports Overview." The section Results Area for Network Traffic Volume (PEPE) Report provides information specific to the Network Traffic Volume (PEPE) report.
The columns of information are as follows:
Traffic Volume (PECE) reports on all traffic between PE to CE (by TOS).
To display a Traffic Volume (PECE) report, implement the following steps:

You receive a window similar to the example in Figure 9-75, "PE Chooser for Traffic Volume (PECE).

In the PE field, each row of information is about a specific PE. It includes the following columns of information.
![]() |
Note In the PE field, you can click the column header name for any column you want to sort. |
Step 2 Select the PE for which you want information and highlight that row.
Step 3 In the Direction area, select whether you want to view the Origin, to select traffic originated from the selected PEs, or the Destination, to select traffic targeted toward the selected PEs.
Step 4 In the Report Time Level drop-down list, select from among the following choices:
Step 5 Click OK to generate a report based on the information you specified in this window, as shown in Figure 9-76, "Example Traffic Volume (PECE) Report." If you click Cancel, you will return to the VPN Console window.

For a description of the Traffic Volume (PECE) report, first see the explanation of the generic report fields in "Reports Overview." The section Results Area for Traffic Volume (PECE) Report provides information specific to the Traffic Volume (PECE) report.
The columns of information are as follows:
Prior to viewing the committed access rate (CAR) management information bases (MIB) reports, you need to poll a router's CAR MIB, as explained in the "Poll a Router's CAR MIB" section. The CAR MIB status data is collected and kept in the Repository. The aggregator aggregates the data to generate hourly, daily, weekly, monthly, and yearly data.
You can view the collected data in the Repository. From the VPN Console window, choose Monitoring > View CAR MIB Reports, followed by one of the following types of reports, as shown in Figure 9-77, "Choose from View CAR MIB Report":

To display the CAR MIB status for specific managed customer CE routers, implement the following steps:

You receive a window similar to the example in Figure 9-79, "Customer Chooser for CAR MIB Report by Customer."

Step 2 In the Select a Customer field in Figure 9-79, "Customer Chooser for CAR MIB Report by Customer," highlight only one customer for which you want report information.
![]() |
Note The wizard will inappropriately allow you to select more than one customer. Do not do this. If you select more than one customer, only the first customer in the list appears in the report. |
Step 3 In the Report Time Level drop-down list, select from among the following choices:
Step 4 Click OK to generate a report based on the information you specified in this window, as shown in Figure 9-80, "Example CAR MIB Status Report by Customer." If you click Cancel, you will return to the VPN Console window.

For a description of the CAR MIB Status Report by customer, first see the explanation of the generic report fields in "Reports Overview." The following sections provide information specific to the CAR MIB Status Report, by customer:
The columns of information are as follows:
![]() |
Note If the Interface Name field defaults to DUMMY, run the wizard explained in the "Populate Interface Information for Cisco Router Targets" section. Then rerun this report. |
Selections in the bottom task bar for CAR MIB Status Report by customer include the following:
To display the CAR MIB status for specific PE routers, implement the following steps:

You receive a window similar to the example in Figure 9-82, "Network Chooser for CAR MIB Report by Network."

Step 2 In the Select a Network field in Figure 9-82, "Network Chooser for CAR MIB Report by Network," highlight only one network for which you want report information.
![]() |
Note The wizard will inappropriately allow you to select more than one network. Do not do this. If you select more than one network, only the first network in the list appears in the report. |
Step 3 In the Report Time Level drop-down list, select from among the following choices:
Step 4 Click OK to generate a report based on the information you specified in this window, as shown in Figure 9-83, "Example CAR MIB Status Report by Network." If you click Cancel, you will return to the VPN Console window.

For a description of the CAR MIB Status Report by network, first see the explanation of the generic report fields in "Reports Overview." The "Results Area for CAR MIB Status Report, By Network" section provides information specific to the CAR MIB Status Report, by network.
The columns of information are as follows:
![]() |
Note If the Interface Name field defaults to DUMMY, run the wizard explained in the "Populate Interface Information for Cisco Router Targets" section. Then rerun this report. |
Data reports show all collected data in the database. These reports can be used as a debugging tool to determine whether your collections were successful and available for other reports or applications.
From the VPN Console window, choose Monitoring > View Data Report, as shown in Figure 9-84, "Choose View Data Report," followed by one of the following types of reports:

When you display data reports by target device, you will see collected data that belongs to a specific target device. Implement the following steps:

You receive a window similar to the example in Figure 9-86, "By Device Target Chooser."

Step 2 In the Network drop-down menu in Figure 9-86, "By Device Target Chooser," click to get a list of networks.
Step 3 Select the network from which you want information.
In the device field, each row of information is about a specific device in the specified network. It includes the following columns of information for each device.
Step 4 Select a device for which you want information and highlight that row.
Step 5 In the Select a Dataset Type area, use the drop-down menu and highlight the type of data you want to choose. The choices are:
Step 6 Click OK to generate a report that shows all the collected data of the selected dataset type that belongs to the selected target device.
An example of a generated report is shown in Figure 9-87, "Data Report By Device." An explanation of the columns of information is in the "Results Area for Data Reports" section.

When you display data reports by network, you will see collected data that belongs to a specific network and the data that belongs to all the devices in that network. Implement the following steps:

You receive a window similar to the example in Figure 9-89, "By Network Chooser."

Step 2 In the Select a Network field, highlight the network from which you want to view data.
Step 3 In the Select a Dataset Type area, use the drop-down menu and highlight the dataset type you want to choose. The choices are:
Step 4 Click OK to generate a report that shows all the collected data of the selected dataset type that belongs to the selected network or to all the devices in that network.
An example of a generated report is shown in Figure 9-90, "Data Report By Network." An example of the columns of information is explained in the "Results Area for Data Reports" section.

When you display data reports by dataset type, you will see a report of collected data in the Repository of the specified dataset type. Implement the following steps:

You receive a report of collected data in the Repository of the selected dataset type.
An example of a generated report is shown in Figure 9-92, "Data Report By Dataset Type." An explanation of the columns of information is explained in the "Results Area for Data Reports" section.

The result of choosing Monitoring > View Data Report is like the example in Figure 9-93, "Example of Data Report."

Data can be collected from different types of sources. Data can be collected from a target device or a network. This data can then be presented by target, by network, or by dataset type. For a more specific report, see the following:
The types of information in this report are the following:
After collecting SA Agent data for SLA monitoring, explained in the "Collect VPN Routing Information" section, you can view reports about the aggregated data. From the VPN Console window, choose Monitoring > View SLA Reports followed by one of the following types of reports, as shown in Figure 9-94, "Choose from View SLA Reports."

For information within the SLA Reports, first see the generic report fields and their explanations in Chapter 14, "Reports Overview." Additionally each report has a report-specific Results area and bottom task bar information.
When you choose Summary Report, you can drill down to time-based reports that show the parameters: Connectivity as a percentage, Max. Delay in milliseconds, and Threshold Violation as a percentage. These parameters are available in annual, monthly, weekly, daily, and hourly reports. For each parameter, you can generate detailed reports that show more related parameters. The reports can be aggregated by: Source Router (the source of the SLA), SLA identifier, customer name, or VPN name.
To display a Summary Report, implement the following step:

You receive a report similar to the example in Figure 9-96, "Example Summary Report."
![]() |
Note The default report is the Monthly report. |

For a description of the Summary Report, first see the explanation of the generic report fields in "Reports Overview." The following sections provide information specific to the Summary Report:
The columns of information are as follows:
Selections in the bottom task bar for Summary Report include the following:
![]() |
Note You can navigate to different types of reports from the Summary Report. |
When you choose to Aggregate By and the report shows only one parameter, either Connectivity %, Max. Delay (ms), or Threshold Violation %, then in the monthly, weekly, and daily report levels the following color scheme appears:
![]() |
Note In these reports green indicates a good state and red indicates a state to be concerned about. |
Jitter Report displays statistics that are measured only by Voice Jitter SLAs originated in a selected router. The reports are time based. They show hourly, daily, weekly, monthly, and annual data and can be aggregated by: SLA ID, source router, destination router, VPN, or Customer. Each of the following arguments are shown both in the direction of source to destination and in the direction of destination to source:
To display a Jitter Report, implement the following steps:

You receive a window similar to the example in Figure 9-98, "CE Chooser for Jitter Report."

Step 2 In the Customer drop-down menu in Figure 9-98, "CE Chooser for Jitter Report," click to show a list of Customers.
Step 3 Select the customer for which you want information.
In the Customer field, each row of information is about a specific CE for the specified Customer. It includes the following columns of information and a row for each CE.
![]() |
Note In the Customer field, you can click the column header name for any column you want to sort. |
Step 4 Highlight the row for the CE for which you want information.
Step 5 In the Direction area, select whether you want to view the traffic going Forward or Backward from the selected CE.
Step 6 In the Jitter Parameter drop-down list, select from among the following choices:
Step 7 In the Report Time Level drop-down list, select from among the following choices:
Step 8 Click OK to generate a report based on the information you specified in this window, as shown in Figure 9-99, "Example Jitter ReportForward Max. Jitter Aggregated by Destination Router." If you click Cancel, you will return to the VPN Console window.

For a description of the Jitter Report, first see the explanation of the generic report fields in "Reports Overview." The following sections provide information specific to the Jitter Report:
The first column depends on your selection from Aggregate By and subsequent columns depend on the time level you chose.
Selections in the bottom task bar for Jitter Report include the following:
HTTP Report displays statistics that are measured only by HTTP SLAs. The reports are time based. They show hourly, daily, weekly, monthly, and annual data.
To display an HTTP Report, implement the following step:

The resulting types of reports are explained in the following sections:
For each summary report, you can drill down to the corresponding stages report. The stages are the different HTTP protocol stages: dns lookup, tcp connection, and transaction. The reports show the distribution in percentage of parameters among these three stages.
The parameters are:
Similar to the SLA Summary report, the Summary HTTP Report shows the arguments: percentage of connectivity, Max Delay in milliseconds, and percentage of Threshold violation, which may each be aggregated by SLA ID, source router, VPN, or Customer. See the example in Figure 9-101, "Summary HTTP Report Aggregated by Source Router."

From each Summary HTTP Report, you can drill down to the corresponding stages report from the Stages Report drop-down menu in the bottom task bar. The stages are the different HTTP protocol stages: DNS, TCP Connection, and Transaction. The reports show the distribution in percentage of arguments in the stages: Round Trip Time (ms), Timeouts (#), and Errors (#). See the example in Figure 9-102, "HTTP Stages ReportRound Trip Time Aggregated by Source Router."

Customer Packet Drop (CECE) provides reports that show the packet drop percentage among CEs of a specific customer. This information is measured only for the SLAs with the Jitter protocol. The reports are aggregated by class of service. The reports are annually, monthly, weekly, daily, and hourly. You can navigate along the time scale.
To display a Customer Packet Drop (CECE) report, implement the following step:

You receive a window similar to the example in Figure 9-104, "CE Chooser for Customer Packet Drop (CECE)."

The information about Figure 9-104, "CE Chooser for Customer Packet Drop (CECE)," is explained in the following categories:
Step 2 In the Customer drop-down menu in Figure 9-104, "CE Chooser for Customer Packet Drop (CECE)," select one or more rows to select one or more CEs.
In the Customer field, each row of information is about a specific CE for the specified Customer. It includes the following columns of information and a row for each CE.
![]() |
Note In the Customer field, you can click the column header name for any column you want to sort. |
Step 3 Select one or more CEs for which you want information and highlight those rows.
Step 4 In the Direction area, select whether you want to view the Origin, to select traffic originated from the selected PEs, or the Destination, to select traffic targeted toward the selected PEs.
Step 5 In the Report Time Level drop-down list, select from among the following choices:
Step 6 Click OK to generate a report based on the information you specified in this window, as shown in Figure 9-105, "Example Customer Packet Drop (CECE) Report." If you click Cancel, you will return to the VPN Console window.

The columns of information are as follows:
![]() |
Note N/A means there were no completions for this SLA; no meaningful value can be calculated. |
Customer Round Trip Delay (CECE) provides reports that show the Max/Min and Avg. round-trip time (in milliseconds) among CEs of a specific customer. The statistics are for all the probe types. The reports are aggregated by class of service. The reports are annually, monthly, weekly, daily, and hourly. You can navigate along the time scale.
To display a Customer Round Trip Delay (CECE) report, implement the following step:

You receive a window similar to the example in Figure 9-107, "CE Chooser for Customer Round Trip Delay (CECE)."

Step 2 In the Customer drop-down menu in Figure 9-107, "CE Chooser for Customer Round Trip Delay (CECE)," select one or more rows to select one or more CEs.
In the Customer field, each row of information is about a specific CE for the specified Customer. It includes the following columns of information and a row for each CE.
![]() |
Note In the Customer field, you can click the column header name for any column you want to sort. |
Step 3 Select one or more CEs for which you want information and highlight those rows.
Step 4 In the Report Time Level drop-down list, select from among the following choices:
Step 5 Click OK to generate a report based on the information you specified in this window, as shown in Figure 9-108, "Example Customer Round Trip Delay (CECE) Report." If you click Cancel, you will return to the VPN Console window.

The columns of information are as follows:
![]() |
Note N/A means there were no completions for this SLA; no meaningful value can be calculated. |
Network Packet Drop (PEPE) provides reports that show the packet drop percentage among all the shadow SA Agent CEs in the network. The network packet drop between PEs is measured by the shadow SA Agent CEs that are connected to the PEs. This information is measured only for the SLAs with the Jitter protocol. The reports are aggregated by class of service. The reports are annually, monthly, weekly, daily, and hourly. You can navigate along the time scale.
To display a Network Packet Drop (PEPE) report, implement the following steps:

You receive a window similar to the example in Figure 9-110, "CE Chooser for Network Packet Drop (PEPE)."

Step 2 In the Customer drop-down menu in Figure 9-110, "CE Chooser for Network Packet Drop (PEPE)," select one or more rows to select one or more PEs.
![]() |
Note In the Customer field, you can click the column header name for any column you want to sort. |
Step 3 Select one or more CEs for which you want information and highlight those rows.
Step 4 In the Direction area, choose either Origin or Destination to select SLAs originated or targeted to this shadow SA Agent CE, respectively
Step 5 In the Report Time Level drop-down list, select from among the following choices:
Step 6 Click OK to generate a report based on the information you specified in this window, as shown in Figure 9-111, "Example Network Packet Drop (PEPE) Report." If you click Cancel, you will return to the VPN Console window.

The columns of information are as follows:
![]() |
Note N/A means there were no completions for this SLA. |
Network Round Trip Delay (PEPE) provides reports that show the Max/Min and Avg. round-trip time among shadow SA Agent CEs in the network. The statistics are for all the probe types. The reports are aggregated by class of service. The reports are annually, monthly, weekly, daily, and hourly. You can navigate along the time scale.
To display a Network Round Trip Delay (PEPE) report, implement the following steps:

You receive a window similar to the example in Figure 9-113, "CE Chooser for Network Round Trip Delay (PEPE)."

In the Customer field, each row of information is about a shadow SA Agent CE. It includes the following columns of information and a row for each CE.
![]() |
Note In the Customer field, you can click the column header name for any column you want to sort. |
Step 2 Select one or more CEs for which you want information and highlight those rows.
Step 3 In the Direction area, choose either Origin or Destination to select SLAs originated or targeted to this shadow SA Agent CE, respectively
Step 4 In the Report Time Level drop-down list, select from among the following choices:
Step 5 Click OK to generate a report based on the information you specified in this window, as shown in Figure 9-114, "Example Network Round Trip Delay (PEPE) Report." If you click Cancel, you will return to the VPN Console window.

The columns of information are as follows:
![]() |
Note N/A means there were no completions for this SLA. |
SLA Definition provides a report that shows all the SLAs on the SA Agent routers from which data was collected. The SLA Definition report shows the SLA ID given to each SLA. SLAs in the report may have been deleted but are kept in the SLA Definition to match the old collected data.
To display an SLA Definition report, implement the following step:

You receive a window similar to the example in Figure 9-116, "Example SLA Definition Report."

The Results area gives rows of information.
![]() |
Note Click on the column label to sort by that type. For example, if you sort on Source, the IP addresses are displayed numerically. |
The columns help you identify the particular SLA for which you can show the statistics in the reports. The columns indicate the following:
Verification reports track status information from executed collections. The status information is associated with each individual target. Each collection attempt generates a set of attributes and corresponding status for each target accessed by the collection. Attributes are used to track the success or failure of various operations such as accessing a target or collecting information.
These reports provide a quick way to check whether there are any connectivity problems to collected targets (for example, any bad passwords or unreachable targets).
The data is merged into a database of most current information, with newer values overwriting older values. The report accessible from View Verification Report provides views of subsets of this data. A short delay may occur between when the collection completes and when the data is visible in these reports.
From the VPN Console window, choose Monitoring > View Verification Report, as shown in Figure 9-117, "Choose View Verification Report."

For information within the Verification Reports, first see the generic report fields and their explanations in Chapter 14, "Reports Overview." Additionally, verification reports have unique information in the following sections:
The result of choosing View Verification Report is like the example in Figure 9-118, "Example of Verify Collect Latest Summary."

This first report provides a summary of the latest connectivity and collection information for all targets. Each row provides a count of how many targets had the listed status for the listed attribute. This report provides a quick way to determine whether there are problems with connections. The columns indicate the following:
As shown in Figure 9-118, "Example of Verify Collect Latest Summary," the bottom task bar includes the following buttons, which when clicked provide new reports:
![]() |
Note The All Attributes button shows on the bottom task bar from the Network Summary report. |
Click the Network Summary button to get this report. It provides the same information as in Figure 9-118, "Example of Verify Collect Latest Summary." However, the information is broken down by network and an additional column Network is added, as shown in Figure 9-119, "Example of Verify Collect Latest Network Summary."

Click the Connectivity button to get this report. It provides detailed connectivity information for each target, as shown in Figure 9-120, "Example of Verify Collect Latest Connectivity."

The purpose of this report is to show any connectivity problems encountered during collections. The first three columns identify a target and the remaining columns provide the connectivity status for the target. This report can be used, for example, to identify any invalid password problems encountered during collections.
The columns indicate the following:
Click the Collections button to get this report, as shown in Figure 9-121, "Example of Verify Collect Latest Collections."

This report does not contain data in this release.
The columns indicate the following:
Click the All Attributes button to get this report, as shown in Figure 9-122, "Example of Verify Collect Latest Attributes."

The columns indicate the following:
The Extensible Markup Language (XML) Data Query Tool retrieves performance data from the Repository.This method expedites data extraction and avoids overcustomization of the reports.
The performance data retrieved by the query is saved to a file in XML format and includes a document type definition (DTD).
To gain access to the Data Query Tools, implement the following steps:

Step 2 The result is a window as appears in Figure 9-124, "Data Query Tools." From this window you can click on any of the choices and the explanation of those paths is as follows:

This section explains how to make all the choices in the SA Agent Data Query Tool.
To navigate in the SA Agent Data Query Tool, implement the following steps:

Step 2 Choose one of the following:
This tool enables you to retrieve all the Service Level Agreement (SLA) Definitions on the Service Assurance Agent (SA Agent) routers from which data was collected. The definitions are saved as a well-formed, valid XML file that includes a Document Type Definition (DTD).
To navigate in the SLA Definitions, implement the following:

Step 2 Click on the associated button to choose either of the following:
Step 3 Click Query. The resulting window is as shown in Figure 9-127, "SA Agent Process Completion."

Step 4 If you want to view the query log, click Query SA Agent Log. The log gives the parameters of the query, an indication of whether information was found, and the number of results found. The results depend on whether you chose All SLA Definitions or Active SLA Definitions only in Step 2.
Step 5 If you want to save the results of the query, click Save Result. The result is as shown in Figure 9-128, "Save Result."

Step 6 If you chose to save the results in Step 5, browse to the location or enter the location where you want to save the results and click OK. The results are then saved in the specified file as text.
This tool queries the Repository for SA Agent data. The Query can be based on time period and time level of the data. Advanced Query enables the user to organize the data by SLA ID, Customer, VPN, source router, or destination router. The Advanced Query allows the user to specify data retrieval criteria such as protocol, Class of Service, customer, VPN, source router, and destination router. The data is saved as a well-formed, valid XML file that includes a DTD.
To navigate in the SA Agent Data Query Tool, implement the following steps:

Step 2 In the top area, the Define the time period area, do the following:
![]() |
Note The date and time specified in the Begin row must precede the date and time specified in the End row. |
![]() |
Note The queried data start time spans from the Begin to the End specified dates and times. For example, if the Time Level is set to Monthly; the Begin information is set to December 28, 1999 at 12:00 a.m.; and the End information is set to February 25, 2000 at 12:00 a.m., the monthly data of January, 200 and February, 2000 appears. |
Step 3 In the bottom area, click one of the following:


This selection results in a Query SLA Definitions Log report. Implement the following step:
This selection results in a Query SA Agent Data Log report. Implement the following step:
This section explains how to make all the selections in the Accounting Data Query Tool.
To navigate in the Accounting Data Query Tool, implement the following steps:

Choose one of the following:
This tool queries the repository for Accounting data. The Query can be based on time period and time level of the data. The Advanced Query enables the user to organize the data by application type or by Class of Service, and to retrieve the data for a specific application type and/or Class of Service. Accounting statistics can be retrieved by specifying the source and destination of the traffic. The source and destination can be one of the following: PE router, customer, customer site, or CE router. Querying for the traffic traversing between two CEs requires both CEs to belong to the same customer, likewise for traffic traversing between two sites. The data is saved as a well-formed, valid XML file that includes a DTD.
To navigate in the Accounting Data, implement the following steps:

Step 2 In the top area, the Define the time period area, do the following:
![]() |
Note The date and time specified in the Begin row must precede the date and time specified in the End row. |
![]() |
Note The queried data start time spans from the Begin to the End specified dates and times. For example, if the Time Level is set to Monthly; the Begin information is set to December 28, 1999 at 12:00 a.m.; and the End information is set to February 25, 2000 at 12:00 a.m., the monthly data of January, 200 and February, 2000 appears. |
Step 3 In the bottom area, click one of the following:


This selection results in a Query Accounting Data Log report. Implement the following step:
This section explains how to make all the choices in the CAR MIB Data Query Tool.
To navigate in the CAR MIB Data Query Tool, implement the following steps:

Step 2 Choose one of the following:
This tool queries the Repository for CAR MIB status data. CAR is a bandwidth management tool that controls IP traffic transmission rates into the network during periods of network congestion. CAR MIBs provide the status for the token bucket parameters and associated access list. CAR MIB status data is collected and aggregated into hourly, daily, weekly, monthly, and annual bins, and the data is kept in the Repository. The CAR MIB data query is based on time period and time level of the data. The status data can be retrieved for: Customer, for the different managed CE routers that belong to the customer; for Customer Site, for the different mapped CE routers that belong to the customer site; for Network, for the PE routers in the specified network; for Router. The data is saved in a well-formed, valid XML file that includes a DTD.
To navigate in the CAR MIB Data, implement the following steps:

Step 2 In the top area, the Define the time period area, do the following:
![]() |
Note The date and time specified in the Begin row must precede the date and time specified in the End row. |
![]() |
Note The queried data start time spans from the Begin to the End specified dates and times. For example, if the Time Level is set to Monthly; the Begin information is set to December 28, 1999 at 12:00 a.m.; and the End information is set to February 25, 2000 at 12:00 a.m., the monthly data of January, 200 and February, 2000 appears. |
Step 3 In the middle area, click the button next to one of the following choices:
Step 4 In the bottom area, click one of the following:
This selection results in a Query CAR MIB Data Log report. Implement the following step:
This section explains how to make all the choices in the Interface Stats (MIB2) Query Tool.
To navigate in the Interface Stats (MIB2) Query Tool, implement the following steps:

Step 2 Choose one of the following:
This tool queries the Repository for interface statistics (MIB2). The interface statistics are collected and saved into the Repository per router. The statistics include packet counters for the different router interfaces. The interfaces are identified by index number, which is a unique and constant number, at least from one reinitialization of the router's network management system to another. The different counters are wrapped around numbers with a maximum value of 2 to the power of 32-1. The data is saved in a well-formed, valid XML file that include a DTD.
To navigate in the Interface Stats (MIB2), implement the following steps:

Step 2 In the top area, the Define the time period area, do the following:
![]() |
Note The date and time specified in the Begin row must precede the date and time specified in the End row. |
![]() |
Note The queried data start time spans from the Begin to the End specified dates and times. For example, if the Time Level is set to Monthly; the Begin information is set to December 28, 1999 at 12:00 a.m.; and the End information is set to February 25, 2000 at 12:00 a.m., the monthly data of January, 200 and February, 2000 appears. |
Step 3 In the middle area, click the button next to one of the following choices:
Step 4 In the bottom area, click one of the following:
This selection results in a Query Interface Stats Log report. Implement the following step:
![]()
![]()
![]()
![]()
![]()
![]()
![]()
Posted: Thu Sep 21 12:34:30 PDT 2000
Copyright 1989-2000©Cisco Systems Inc.