The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
Book Contents Book ContentsCisco DNA Assurance User Guide, Release 2.2.3
Before you begin using the Assurance application, you must configure Assurance . This chapter provides the basic tasks you must do to set up Assurance . Use this chapter in conjunction with the Cisco Digital Network Architecture Center User Guide.
Assurance is not supported over NATed connections to managed devices.
Before you begin using the Assurance application, you must set up Cisco DNA Center to use Assurance .
See the following illustration and the procedure that follows to understand the basic workflow.
Install Cisco DNA Center .
Do the following in any order:
Note | Cisco Wireless Controllers must be discovered using the Management IP address instead of the Service Port IP address. If not, the related wireless controller 360 and AP 360 pages will not display any data. |
Note | If sites are already created, you can skip this step and run Discovery. |
Make sure that the devices appear in the device Inventory.
You must wait for all the devices to get into a Managed state.
Add devices to sites.
If you are adding APs, we recommend that you assign and position them on a floor map.
If your network uses Cisco Identity Services Engine for user authentication, you can configure Assurance for Cisco ISE integration. This enables you to see more information about wired clients, such as the username and operating system, in Assurance .
Configure the syslog, SNMP traps, and NetFlow Collector servers using Telemetry.
(Recommended) To view AI-driven issues and gain network insights, configure Cisco AI Network Analytics data collection.
(Recommended) To have access to the latest Machine Reasoning workflows, update the Machine Reasoning Knowledge Base.
Start using the Assurance application.
The Discovery feature scans the devices in your network and sends the list of discovered devices to Inventory.
The Discovery feature scans the devices in your network and sends the list of discovered devices to Inventory.
The Discovery feature also can work with the Device Controllability feature to configure the required network settings on devices, if these settings are not already present on the device.
There are three ways for you to discover devices:
When configuring the Discovery criteria, remember that there are settings that you can use to help reduce the amount of time it takes to discover your network:
Note | For Cisco SD-Access Fabric and Cisco DNA Assurance , we recommend that you specify the device's loopback address. |
Regardless of the method you use, you must be able to reach the device from Cisco DNA Center and configure specific credentials and protocols in Cisco DNA Center to discover your devices. These credentials can be configured and saved in the Design > Network Settings > Device Credentials window or on a per-job basis in the Discovery window.
If a device uses a first hop resolution protocol like Hot Standby Router Protocol (HSRP) or Virtual Router Redundancy Protocol (VRRP), the device might be discovered and added to the inventory with its floating IP address. Later, if HSRP or VRRP fails, the IP address might be reassigned to a different device. This situation can cause issues with the data that Cisco DNA Center retrieves for analysis.
Before you run Discovery, complete the following minimum prerequisites:
When Cisco DNA Center discovers a device, it uses one of the device's IP addresses as the preferred management IP address. The IP address can be that of a built-in management interface of the device, another physical interface, or a logical interface such as Loopback0. You can configure Cisco DNA Center to use the device's loopback IP address as the preferred management IP address, provided the IP address is reachable from Cisco DNA Center .
When you choose Use Loopback IP as the preferred management IP address, Cisco DNA Center determines the preferred management IP address as follows:
After a device is discovered, you can update the management IP address from the Inventory window.
The following are the guidelines and limitations for Cisco DNA Center to discover your Cisco Catalyst 3000 Series Switches and Catalyst 6000 Series Switches:
You can discover devices using Cisco Discovery Protocol (CDP), an IP address range, or LLDP. This procedure shows you how to discover devices and hosts using CDP. For more information about the other discovery methods, see Discover Your Network Using an IP Address Range and Discover Your Network Using LLDP.
Click the menu icon () and choose Tools > Discovery .
Click Add Discovery .
In the Discovery Name field, enter a name.
Expand the IP Address/Range area if it is not already visible, and configure the following fields:
Note | If you choose Use Loopback IP and the device does not have a loopback interface, Cisco DNA Center chooses a management IP address using the logic described in Preferred Management IP Address. |
Note | To use the loopback interface IP address as the preferred management IP address, make sure that the CDP neighbor's IP address is reachable from Cisco DNA Center . |
Expand the Credentials area and configure the credentials that you want to use for the Discovery job.
Choose any of the global credentials that have already been created or configure your own Discovery credentials. If you configure your own credentials, you can save them only for the current job by clicking Save or you can save them for the current and future jobs by checking the Save as global settings check box and then clicking Save .
Field | Description |
---|---|
Name/Description | Name or phrase that describes the CLI credentials. |
Username | Name that is used to log in to the CLI of the devices in your network. |
Password | Password that is used to log in to the CLI of the devices in your network. For security reasons, re-enter the password as confirmation. |
Note | Passwords are encrypted for security reasons and are not displayed in the configuration. |
Note | Passwords are encrypted for security reasons and are not displayed in the configuration. |
Passwords are encrypted for security reasons and are not displayed in the configuration.
Passwords are encrypted for security reasons and are not displayed in the configuration.
Authentication type to be used. (Enabled if you select AuthPriv or AuthNoPriv as the authentication mode.) Choose one of the following authentication types:
SNMPv3 password used for gaining access to information from devices that use SNMPv3. These passwords (or passphrases) must be at least eight characters in length.
Privacy type. (Enabled if you select AuthPriv as the authentication mode.) Choose one of the following privacy types:
SNMPv3 privacy password that is used to generate the secret key for encrypting messages that are exchanged with devices that support AES128 encryption. Passwords (or passphrases) must be at least eight characters long.
Field | Description |
---|---|
Retries | Number of times Cisco DNA Center tries to communicate with network devices using SNMP. |
Timeout | Number of seconds between retries. |
The password must contain from 7 to 128 characters, including at least one:
The password cannot contain spaces or angle brackets (< >). Note that some Cisco IOS XE devices do not allow a question mark (?).
You can configure up to 10 HTTPS write credentials:
The password must contain from 7 to 128 characters, including at least one:
The password cannot contain spaces or angle brackets (< >). Note that some Cisco IOS XE devices do not allow a question mark (?).
NETCONF provides a mechanism to install, manipulate, and delete configurations of network devices. NETCONF will be disabled if you choose Telnet in the Advanced area.
To configure the protocols to be used to connect with devices, expand the Advanced area and do the following tasks:
Click Discover and select whether to run the discovery now or schedule the discovery for a later time.
Click the notifications icon to view the scheduled discovery tasks. Click Edit to edit the discovery task before the discovery starts. Click Cancel to cancel the scheduled discovery job before it starts.
The Discoveries window displays the results of your scan.
The Discovery Details pane shows the status (active or inactive) and the Discovery configuration. The Discovery Devices pane displays the host names, IP addresses, and status of the discovered devices.
You can discover devices using an IP address range, CDP, or LLDP. This procedure shows you how to discover devices and hosts using an IP address range. For more information about the other Discovery methods, see Discover Your Network Using CDP and Discover Your Network Using LLDP.
Your devices must have the required device configurations, as described in Discovery Prerequisites.
Click the menu icon () and choose Tools > Discovery .
Click Add Discovery .
In the Discovery Name field, enter a name.
Expand the IP Address/Ranges area, if it is not already visible, and configure the following fields:
Note | Cisco Wireless Controllers must be discovered using the management IP address instead of the service port IP address. If not, the related wireless controller 360 and AP 360 pages will not display any data. |
Note | If you choose Use Loopback IP and the device does not have a loopback interface, Cisco DNA Center chooses a management IP address using the logic described in Preferred Management IP Address. |
Expand the Credentials area and configure the credentials that you want to use for the Discovery job.
Choose any of the global credentials that have already been created or configure your own Discovery credentials. If you configure your own credentials, you can save them for only the current job by clicking Save , or you can save them for the current and future jobs by checking the Save as global settings check box and then clicking Save .
Field | Description |
---|---|
Name/Description | Name or phrase that describes the CLI credentials. |
Username | Name that is used to log in to the CLI of the devices in your network. |
Password | Password that is used to log in to the CLI of the devices in your network. For security reasons, re-enter the password as confirmation. |
Note | Passwords are encrypted for security reasons and are not displayed in the configuration. |
Note | Passwords are encrypted for security reasons and are not displayed in the configuration. |
Click SNMP v2c and configure the following fields:
Passwords are encrypted for security reasons and are not displayed in the configuration.
Passwords are encrypted for security reasons and are not displayed in the configuration.
Authentication type to be used. (Enabled if you select AuthPriv or AuthNoPriv as the authentication mode.) Choose one of the following authentication types:
SNMPv3 password used for gaining access to information from devices that use SNMPv3. These passwords (or passphrases) must be at least eight characters in length.
Privacy type. (Enabled if you select AuthPriv as the authentication mode.) Choose one of the following privacy types:
SNMPv3 privacy password that is used to generate the secret key for encrypting messages that are exchanged with devices that support AES128 encryption. Passwords (or passphrases) must be at least eight characters long.
Field | Description |
---|---|
Retries | Number of times Cisco DNA Center tries to communicate with network devices using SNMP. |
Timeout | Number of seconds between retries. |
(Optional) Click HTTP(S) and configure the following fields:
Specifies the kind of HTTPS credentials you are configuring. Valid types are Read or Write .
You can configure up to 10 HTTPS read credentials:
The password must contain from 7 to 128 characters, including at least one:
The password cannot contain spaces or angle brackets (< >). Note that some Cisco IOS XE devices do not allow a question mark (?).
You can configure up to 10 HTTPS write credentials:
The password must contain from 7 to 128 characters, including at least one:
The password cannot contain spaces or angle brackets (< >). Note that some Cisco IOS XE devices do not allow a question mark (?).
NETCONF provides a mechanism to install, manipulate, and delete configurations of network devices. NETCONF will be disabled if you choose Telnet in the Advanced area.
(Optional) To configure the protocols that are to be used to connect with devices, expand the Advanced area and do the following tasks:
Click Discover and select whether to run the discovery now or schedule the discovery for a later time.
Click the notifications icon to view the scheduled discovery tasks. Click Edit to edit the discovery task before the discovery starts. Click Cancel if you want to cancel the scheduled discovery job before it starts.
The Discoveries window displays the results of your scan.
The Discovery Details pane shows the status (active or inactive) and the Discovery configuration. The Discovery Devices pane displays the host names, IP addresses, and status of the discovered devices.
You can discover devices using Link Layer Discovery Protocol (LLDP), CDP, or an IP address range. This procedure shows you how to discover devices and hosts using LLDP. For more information about the other discovery methods, see Discover Your Network Using CDP and Discover Your Network Using an IP Address Range.
Click the menu icon () and choose Tools > Discovery .
Click Add Discovery .
In the Discovery Name field, enter a name.
Expand the IP Address/Range area and configure the following fields:
Note | If you choose this option and the device does not have a loopback interface, Cisco DNA Center chooses a management IP address using the logic described in Preferred Management IP Address. |
Note | To use the loopback interface IP address as the preferred management IP address, make sure that the LLDP neighbor's IP address is reachable from Cisco DNA Center . |
Expand the Credentials area and configure the credentials that you want to use for the Discovery job.
Choose any of the global credentials that have already been created, or configure your own Discovery credentials. If you configure the credentials, you can choose to save them for future jobs by checking the Save as global settings check box.
Field | Description |
---|---|
Name/Description | Name or phrase that describes the CLI credentials. |
Username | Name that is used to log in to the CLI of the devices in your network. |
Password | Password that is used to log in to the CLI of the devices in your network. For security reasons, re-enter the password as confirmation. |
Note | Passwords are encrypted for security reasons and are not displayed in the configuration. |
Note | Passwords are encrypted for security reasons and are not displayed in the configuration. |
Click SNMP v2c and configure the following fields:
Passwords are encrypted for security reasons and are not displayed in the configuration.
Passwords are encrypted for security reasons and are not displayed in the configuration.
Authentication type to be used. (Enabled if you select AuthPriv or AuthNoPriv as the authentication mode.) Choose one of the following authentication types:
SNMPv3 password used for gaining access to information from devices that use SNMPv3. These passwords (or passphrases) must be at least eight characters in length.
Privacy type. (Enabled if you select AuthPriv as the authentication mode.) Choose one of the following privacy types:
SNMPv3 privacy password that is used to generate the secret key for encrypting messages that are exchanged with devices that support AES128 encryption. Passwords (or passphrases) must be at least eight characters long.
Field | Description |
---|---|
Retries | Number of times Cisco DNA Center tries to communicate with network devices using SNMP. |
Timeout | Number of seconds between retries. |
(Optional) Click HTTP(S) and configure the following fields:
Specifies the kind of HTTPS credentials you are configuring. Valid types are Read or Write .
You can configure up to 10 HTTPS read credentials:
The password must contain from 7 to 128 characters, including at least one:
The password cannot contain spaces or angle brackets (< >). Note that some Cisco IOS XE devices do not allow a question mark (?).
You can configure up to 10 HTTPS write credentials:
The password must contain from 7 to 128 characters, including at least one:
The password cannot contain spaces or angle brackets (< >). Note that some Cisco IOS XE devices do not allow a question mark (?).
(Optional) To configure the protocols to be used to connect with devices, expand the Advanced area and do the following tasks:
Click Discover and select whether to run the discovery now or schedule the discovery for a later time.
Click the notifications icon to view the scheduled discovery tasks. Click Edit to edit the discovery task before the discovery starts. Click Cancel if you want to cancel the scheduled discovery job before it starts.
The Discoveries window displays the results of your scan.
The Discovery Details pane shows the status (active or inactive) and the Discovery configuration. The Discovery Devices pane displays the host names, IP addresses, and status of the discovered devices.
Manage Discovery Jobs
Click the menu icon () and choose Tools > Discovery .
Click View All Discoveries .
To stop an active Discovery job, perform these steps:
To restart an inactive Discovery job, perform these steps:
You can clone a Discovery job and retain all of the information defined for that job.
You should have run at least one Discovery job.
Click the menu icon () and choose Tools > Discovery .
Click View All Discoveries .
From the Discoveries pane, select the Discovery job.
Click Copy & Edit .
Cisco DNA Center creates a copy of the Discovery job, named Copy of Discovery_Job .
(Optional) Change the name of the Discovery job.
Define or update the parameters for the new Discovery job.
Click the menu icon () and choose Tools > Discovery .
Click View All Discoveries .
From the Discoveries pane, select the Discovery job that you want to delete.
Click OK to confirm.
You can view information about a Discovery job, such as the settings and credentials that were used. You also can view the historical information about each Discovery job that was run, including information about the specific devices that were discovered or that failed to be discovered.
Run at least one Discovery job.
Click the menu icon () and choose Tools > Discovery .
Click View All Discoveries .
From the Discoveries pane, select the Discovery job. Alternatively, use the Search function to find a Discovery job by device IP address or name.
Click the down arrow next to one of the following areas for more information:
You can create a network hierarchy that represents your network's geographical locations. Your network hierarchy can contain sites, which contains buildings and areas.
The Design area is where you create the structure and framework of your network, including the physical topology, network settings, and device type profiles that you can apply to devices throughout your network. Use the Design workflow if you do not already have an existing infrastructure. If you have an existing infrastructure, use the Discovery feature. For more information, see About Discovery.
You can perform these tasks in the Design area:
Create your network hierarchy.
Define global network settings.
Define network profiles.
You can create a network hierarchy that represents your network's geographical locations. Your network hierarchy can contain sites, which in turn contain buildings and areas. You can create site and building IDs to easily identify where to apply design settings or configurations later. By default, there is one site called Global .
The network hierarchy has a predetermined hierarchy:
You can change the site hierarchy for unprovisioned devices while preserving AP locations on sitemaps. Note, however, that you cannot move an existing floor to a different building.
The following is a list of tasks that you can perform:
Cisco DNA Center allows you to easily define physical sites and then specify common resources for those sites. The Design area uses a hierarchical format for intuitive use, while eliminating the need to redefine the same resource in multiple places when provisioning devices. By default, there is one site called Global . You can add more sites, buildings, and areas to your network hierarchy. You must create at least one site before you can use the provision features.
Click the menu icon () and choose Design > Network Hierarchy .
Result: A world map appears in the right pane.
From the map toolbar, click + Add Site and choose Add Area .
You can also hover your cursor over the ellipsis next to the parent site in the left pane, and then choose Add Area .
Enter the site name in the Area Name field.
The Area Name field has the following restrictions:
From the Parent drop-down list, choose a parent node.
By default, Global is the parent node.
Result: The site is created under the parent node in the left pane.
Click the menu icon () and choose Design > Network Hierarchy .
In the Network Hierarchy window, click +Add Site > Add Building .
Alternatively, you can hover your cursor over the ellipsis next to the parent site in the left pane, and choose Add Building .
Add the building details in the Add Building pop-up:
Note | By default, Global is the parent node. |
Note | Alternatively, you can click on the map to input the address. Adding an address causes the Longitude and Latitude coordinates fields to be automatically populated. You can manually change the longitude and latitude coordinates to change the address. |
Result: The building is created and appears under the parent site in the left pane.
After you add a building, you will need to create floors for it.
Click the Menu icon and choose Design > Network Hierarchy .
In the left pane, hover your cursor over the ellipsis next to the building of the floor and choose Add Floor .
In the Floor Name field, enter a name for the floor.
The Floor Name field has the following restrictions:
For the Type (RF Model) drop-down list, choose the RF model to apply for the floor.
The RF model determines how the RF is calculated based on the characteristics of the floor.
In the Floor Image area, drag and drop the floor plan file to upload the floor plan.
Cisco DNA Center supports the file types DXF, DWG, JPG, GIF, PNG, and PDF for floor plans.
After you import a floor plan, make sure that you enable the overlay visibility (From the floor, click View Options and enable the overlay toggles in Overlay Objects ). By default, overlays are not displayed after you import a map.
If you upload a CAD file (DXF or DWG file type), use the Floormap pop-up to choose the CAD layers that you want to appear as floor elements in the map:
Note | For a layer to appear in the 3D view, it is required to have a 3D Wall/Shelving Type value. The wall/shelving type affects attenuation and how the heatmap is calculated. |
Enter the floor map dimensions in the Width , Length , and Height fields.
Manage Network Hierarchy
You can upload a CSV file or a map archive file that contains an existing network hierarchy. For example, you can upload a CSV file with location information that you exported from Cisco Prime Infrastructure. For information about exporting maps from Cisco Prime Infrastructure, see Export Maps Archive.
Before importing a map archive file into Cisco DNA Center , make sure that the devices such as Cisco Wireless Controllers and the associated APs are discovered and listed on the Cisco DNA Center inventory page.
Click the menu icon () and choose Design > Network Hierarchy .
From the tool bar, click Import and choose Import Sites .
Drag and drop your CSV file, or navigate to where your CSV file is located, then click Import .
If you do not have an existing CSV file, click Download Template to download a CSV file that you can edit and upload.
To import the Cisco Prime Infrastructure maps tar.gz archive file, choose Import > Map Import .
Drag and drop the map archive file into the boxed area in the Import Site Hierarchy Archive dialog box.
Click Save to upload the file.
Result: The Import Preview window appears, which shows the imported file.
You can export maps archive files from Cisco Prime Infrastructure and import them into Cisco DNA Center .
From the Cisco Prime Infrastructure user interface, choose Maps > Wireless Maps > Site Maps (New) .
From the Export drop-down list, choose Map Archive .
On the Select Sites window, configure the following. You can either select map information or calibration information to be included in the maps archive.
Click Generate Map Archive . A message Exporting data is in progress is displayed.
Result: A tar file is created and is saved to your local machine.
You can search the network hierarchy to quickly find a site, building, or area. This is particularly helpful after you have added many sites, areas, or buildings.
To search the tree hierarchy, in the Find Hierarchy search field in the left pane and enter either the partial or full name of the site, building, or floor name that you are searching.
Result: The tree hierarchy is filtered based on the text you enter in the search field.
Click the menu icon () and choose Design > Network Hierarchy .
In the left pane, hover your cursor over the ellipsis next to the site and choose Edit Area .
In the Edit Area pop-up, make the necessary edits.
Click Update to save your changes.
Click the menu icon () and choose Design > Network Hierarchy .
In the left pane, hover your cursor over the ellipsis next to the site and choose Delete Area .
In the dialog box, click OK to confirm the deletion.
Click the menu icon () and choose Design > Network Hierarchy .
In the left pane, hover your cursor over the ellipsis next to the building and choose Edit Building .
In the Edit Building pop-up, make the necessary edits.
Click Update to save your changes.
Click the menu icon () and choose Design > Network Hierarchy .
In the left pane, hover your cursor over the ellipsis next to the building and choose Delete Building .
In the dialog box, click OK to confirm the deletion.
Deleting a building deletes all its container maps. APs from the deleted maps are moved to Unassigned state.
After you add a floor, you can edit the floor map so that it contains obstacles, areas, and APs on the floor.
Click the Menu icon and choose Design > Network Hierarchy .
In the left pane, hover your cursor over the ellipsis next to the floor and choose Edit Floor .
In the Edit Floor pop-up, make the necessary changes.
Click Update to save the changes.
The floor view navigation pane provides access to multiple map functions like:
While viewing a floor map, click Add/Edit from the map toolbar to enter edit mode. While in edit mode, you can do the following:
Add, position, and delete the following devices:
Add, edit, and delete the following overlay objects:
Follow these guidelines while placing APs on the floor map:
Cisco DNA Center computes heatmaps for the entire map that show the relative intensity of the Radio Frequency (RF) signals in the coverage area. For 2D wireless maps, the heatmap is only an approximation of the actual RF signal intensity because it does not consider the RF signal reflection and other effects impacting the signal.
Make sure that you have Cisco APs in your inventory. If not, discover APs using the Discovery feature. See About Discovery.
Click the menu icon () and choose Design > Network Hierarchy .
In the left pane, click the building floor.
From the map toolbar, click Add/Edit .
Ensure the APs toggle is enabled from the map toolbar.
From the map left pane, click Add APs .
From the Add APs slide-in pane, check the check boxes of the access points to select the APs in bulk, and click Add Selected . Alternatively click Add next to an access point.
You can search for access points using the search option available. Use the Filter field to search for access points using the AP name, MAC address, model, or Cisco Wireless Controller. The search is case-insensitive. The search result appear in a table. Click Add to add one or more of these APs to the floor area.
Result: Newly added APs appear in the Unpositioned category from the map left pane in edit mode.
Close the Add APs window after assigning APs to the floor area.
From the map toolbar, click Add/Edit .
From the map left pane, click an AP from the Unpositioned category to position the AP.
To position the AP, do one of the following:
Use the Edit AP slide-in pane to configure details of the AP such as:
Note | For external APs, you must select an antenna, or the AP will not be present in the map. |
Note | This option does not appear for omnidirectional antennas because their pattern is nondirectional in azimuth. |
After you have completed placing and configuring access points, click Save from the map toolbar.
If a Cisco Connected Mobile Experiences (CMX) is synchronized with Cisco DNA Center , you can view the location of clients on the heatmap. See Create Cisco CMX Settings.
Result: The heatmap is generated based on the new position of the AP.
To delete APs from the floor map, click Remove APs from the map left pane while in edit mode.
From the Delete APs slide-in pane, check the check boxes next to the access points that you want to delete, and click Delete Selected .
Hover your cursor over the AP icon on the floor map to view AP details, Rx neighbor information, client information, and Device 360 information.
Note | For Device 360 to open, you must have the Assurance application installed. |
Make sure you have the Cisco AP 1800S sensor in your inventory. The Cisco Aironet 1800s Active Sensor must be provisioned using Plug and Play for it to show up in the Inventory. See the Provision the Wireless Cisco Aironet 1800s Active Sensor topic in the Cisco DNA Assurance User Guide.
A sensor device is a dedicated AP 1800s sensor. The Cisco Aironet 1800s Active Sensor gets bootstrapped using PnP. After it obtains the Assurance server reachability details, it directly communicates with the Assurance server.
Click the menu icon () and choose Design > Network Hierarchy .
In the left pane, click the building floor.
From the map toolbar, click Add/Edit .
From the map toolbar, click the Sensors toggle.
From the Add Sensors slide-in pane, check the check boxes of the sensors that you want to add. Alternatively, click Add next to the sensor row to add sensors.
You can search for specific sensors using the search option. Use the Filter field and search using the name, MAC address, or model of a sensor. The search is case-insensitive. The search results are displayed in the table. Click Add to add one or more these sensors to the floor area.
Result: Newly added sensors appear in the Unpositioned category from the map left pane in edit mode.
Close the Add Sensors slide-in pane after assigning sensors to the floor map.
From the map toolbar, click Add/Edit .
From the map left pane, click a sensor in the Unpositioned category to position the sensor.
Click on the location of the floor map to position the sensor.
After you have completed placing and adjusting sensors, click Save .
To delete a sensor from the floor map, click Remove APs from the map left pane while in edit mode.
Check the check boxes of the sensors that you want to delete, and click Delete Selected .
By default, any floor area or outside area defined as part of a building map is considered as a wireless coverage area.
If you have a building that is nonrectangular or you want to mark a nonrectangular area within a floor, you can use the map editor to draw a coverage area or a polygon-shaped area.
Click the menu icon () and choose Design > Network Hierarchy .
In the left pane, click the building floor.
From the map toolbar, click Add/Edit .
From the map toolbar, click the Coverage Areas toggle.
From the map left pane, click the Coverage Area icon.
In the Coverage Area pop-up window, enter a name for the coverage area in the field and click Add Coverage .
Use the drawing tool to create the coverage area shape:
Note | The coverage area shape must have at least 3 points. |
After you can finish creating the coverage area, click Save from the map toolbar.
To edit a coverage area, do the following:
To delete a coverage area, do the following:
You can create obstacles so that they can be considered while computing Radio Frequency (RF) prediction heatmaps for access points.
Click the menu icon () and choose Design > Network Hierarchy .
In the left pane, select the floor.
Click Edit , which is located above the floor plan in the middle pane.
In the Overlays panel, next to Obstacles , click Add .
In the Obstacle Creation dialog box, choose an obstacle type from the Obstacle Type drop-down list. The type of obstacles that you can create are Thick Wall , Light Wall , Heavy Door , Light Door , Cubicle , and Glass .
Click Add Obstacle .
Move the drawing tool to the area where you want to create an obstacle.
Click the drawing tool to start and stop a line.
After you have outlined the area, double-click the area to highlight it.
In the Obstacle Creation window, click Done .
Click Save to save the obstacle on the floor map.
To edit an obstacle, in the Overlays panel, next to Obstacles , click Edit .
All the available obstacles are highlighted on the map.
Click Save after the changes.
To delete an obstacle, in the Overlays panel, next to Obstacles , click Delete .
All the available obstacles are highlighted on the map.
Hover your cursor over the obstacle and click to delete.
You can create inclusion and exclusion areas to further refine location calculations on a floor. You can define the areas that are included (inclusion areas) in the calculations and those areas that are not included (exclusion areas). For example, you might want to exclude areas such as an atrium or stairwell within a building, but include a work area, such as cubicles, labs, or manufacturing floors.
Click the menu icon () and choose Design > Network Hierarchy .
In the left pane, click a building floor.
From the map toolbar, click Add/Edit .
From the map toolbar, click the Location Regions toggle.
From the map left pane, click the Inclusion icon.
Use the drawing tool to create the inclusion area:
After you are finish creating inclusion areas, click Save from the map toolbar.
To further refine location calculations on a floor, you can define areas that are excluded (exclusion areas) in the calculations. For example, you might want to exclude areas such as an atrium or stairwell within a building. As a rule, exclusion areas are defined within the borders of an inclusion area.
Click the menu icon () and choose Design > Network Hierarchy .
In the left pane, click a building floor.
From the map toolbar, click Add/Edit .
From the map toolbar, click the Location Regions toggle.
From the map left pane, click the Exclusion icon.
Use the drawing tool to create the exclusion area:
After you are finish creating exclusion areas, click Save from the map toolbar.
In the Overlays panel, next to Location Regions , click Edit .
Make the necessary changes, and click Save .
In the Overlays panel, next to Location Regions , click Delete .
Hover your cursor over the region that you want to delete, and click Delete .
You can define a rail line on a floor that represents a conveyor belt. Also, you can define an area around the rail area known as the snap-width to further assist location calculations. This represents the area in which you expect clients to appear. Any client located within the snap-width area is plotted on the rail line (majority) or outside of the snap-width area (minority).
The snap-width area is defined in feet or meters (user-defined) and represents the distance that is monitored on either side (east and west or north and south) of the rail.
Click the menu icon () and choose Design > Network Hierarchy .
In the left pane, select the floor.
Click Edit , which is located above the floor plan in the middle pane.
In the Overlays panel, next to Rails , click Add .
Enter a snap-width (feet or meters) for the rail, and click Add Rail .
A drawing icon appears.
Click the drawing icon at the starting point of the rail line. Click again when you want to stop drawing the line or change the direction of the line.
Click the drawing icon twice when the rail line is drawn on the floor map. The rail line appears on the map and is bordered on either side by the defined snap-width region.
In the Overlays panel, next to Rails , click Edit .
The available rails are highlighted on the map.
Make changes, and click Save .
In the Overlays panel, next to Rails , click Delete .
All the available rail lines are highlighted on the map.
Hover your cursor over the rail line that you want to delete, and click Delete .
Click the menu icon () and choose Design > Network Hierarchy .
In the left pane, click a building floor.
From the map toolbar, click Add/Edit .
From the map toolbar, click the Markers toggle.
Enter the name for the marker, and then click Add Marker .
Use the drawing tool to place the marker:
Click Save from the map toolbar.
Click the View Options, which is located above the floor plan in the middle pane. The floor map along with these panels appear in the right pane: Access Points , Sensor , Overlay Objects , Map Properties , and Global Map Properties .
You can modify the appearance of the floor map by selecting or unselecting various parameters. For example, if you want to view only the access point information on the floor map, check the Access Point check box. You can expand each panel to configure various settings available for each floor element.
To view access points on a map, click the On/Off button next to Access Points . Expand the Access Points panel to configure these settings:
The AP details are reflected on the map immediately. Hover your cursor over the AP icon on the map to view AP details, RX neighbors details, client details, and switch information.
Click the Sensors button to view sensors on the map. Expand the Sensors panel to configure these settings:
Expand the Overlay Objects panel to configure these settings. Use the On/Off buttons to view these overlay objects on the map.
Expand the Map Properties panel to configure:
Expand the Global Map Properties panel to configure:
For 2D wireless maps, you can apply various filters to access points and sensors. Click Data in the map toolbar to begin. Based on the filter criteria, the search results appear in a table.
The Inventory function retrieves and saves details, such as host IP addresses, MAC addresses, and network attachment points about devices in its database.
The Inventory function retrieves and saves details, such as host IP addresses, MAC addresses, and network attachment points about devices in its database.
The Inventory feature can also work with the Device Controllability feature to configure the required network settings on devices, if these settings are not already present on the device.
Inventory uses the following protocols, as required:
After the initial discovery, Cisco DNA Center maintains the inventory by polling the devices at regular intervals. The default interval is every six hours. However, you can change this interval up to 24 hours, as required for your network environment. For more information, see Update the Device Polling Interval. Also, a configuration change in the device triggers an SNMP trap, which in turn triggers device resynchronization. Polling occurs for each device, link, host, and interface. Only the devices that have been active for less than one day are displayed. This prevents stale device data, if any, from being displayed. On average, polling 500 devices takes approximately 20 minutes.
You can update the polling interval at the global level for all devices by choosing System > Settings > Network Resync Interval or at the device level for a specific device by choosing Device Inventory . When you set the polling interval using the Network Resync Interval , that value takes precedence over the Device Inventory polling interval value.
If you do not want a device to be polled, you can disable polling.
Make sure that you have devices in your inventory. If not, discover devices using the Discovery feature.
Click the menu icon () and choose Provision > Network Devices > Inventory .
Select the devices that you want to update.
Click Update Polling Interval .
From the Update Resync Interval dialog box, in the Status field, click Enabled to turn on polling or click Disabled to turn off polling.
In the Polling Time field, enter the time interval (in minutes) between successive polling cycles. Valid values are from 25 to 1440 minutes (24 hours).
The device-specific polling time supersedes the global polling time. If you set the device-specific polling time and then change the global polling time, Cisco DNA Center continues to use the device-specific polling time.
The Inventory table displays information for each discovered device. Click the column header to sort the rows in ascending order. Click the column header again to sort the rows in descending order.
To choose which columns to show or to hide in the table, click . Note that the column selection does not persist across sessions.
When you select devices and choose a different view from the Focus drop-down list, your selection persists in each new view.
By default, 25 entries are shown in the Inventory table. Click Show More to view more entries. You can view up to 200 entries in the Inventory table.
If there are more than 25 entries in the Inventory table and you choose a different view from the Focus drop-down list, the number of entries persists in each new view.
Make sure that you have devices in your inventory. If not, discover devices using the Discovery feature.
Click the menu icon () and choose Provision > Network Devices > Inventory .
The Inventory window displays the device information gathered during the discovery process. The following table describes the information that is available.
Name of the device.
Click the device name to view the following device details:
Details : Displays details such as the device name, reachability status, manageability status, IP address, device model, role, uptime, site, and so on.
For Cisco Catalyst 2000, 3000, and 9000 Series Switches, either click a port in the ports view or click the port name in the Ports table to view the maximum allocated power and power drawn details of the port.
Error-disabled ports are shown in yellow. Click an error-disabled port in ports view to view the error reason. To activate an error-disabled port, clear the MAC address and shut down the port.
You can click the Search or Filter option to view the details of the desired VLAN.
Note | Running configuration data is not supported for devices such as wireless or legacy controllers. |
IP address of the device.
Shows the device support level as follows:
The following is a list of the various statuses:
Shows the device status as follows:
MAC address of the device.
Cisco IOS software that is currently running on the device.
Cisco product part number.
Cisco device serial number.
Period of time that the device has been up and running.
Role assigned to each discovered device during the scan process. The device role is used to identify and group devices according to their responsibilities and placement within the network. If Cisco DNA Center is unable to determine a device role, it sets the device role to Unknown.
If you manually change the device role, the assignment remains static. Cisco DNA Center does not update the device role even if it detects a change during a subsequent device resynchronization.
If required, you can use the drop-down list in this column to change the assigned device role. The following device roles are available:
The site to which the device is assigned. Click Assign if the device is not assigned to any site. Click Choose a Site , select a site from the hierarchy, and click Save . For more information, see About Network Hierarchy.
Most recent date and time that Cisco DNA Center scanned the device and updated the database with new information about the device.
Group of related devices, such as routers, switches, hubs, or wireless controllers.
Series number of the device; for example, Cisco Catalyst 4500 Series Switches.
The polling interval for the device. This interval can be set globally in Settings or for a specific device in Inventory. For more information, see the Cisco DNA Center Administrator Guide.
Last Sync Status
Status of the last Discovery scan for the device:
You can delete devices from the Cisco DNA Center database, as long as they have not already been added to a site.
When you remove a wireless sensor from the inventory, the sensor is reset to the factory defaults so that when it rejoins, it gets the current configuration.
You must have administrator (ROLE_ADMIN) permissions and access to all devices (RBAC Scope set to ALL) to perform this procedure.
Click the menu icon () and choose Provision > Network Devices > Inventory .
Check the check box next to the device or devices that you want to delete.
You can select multiple devices by checking additional check boxes, or you can select all the devices by checking the check box at the top of the list.
From the Actions drop-down list, choose Inventory > Delete Device .
In the Warning window, check the Config Clean-Up check box to remove the network settings and telemetry configuration from the selected device.
Confirm the action by clicking OK .
Adding devices to a site configures Cisco DNA Center as the Syslog an SNMP Trap Server, which enables Syslog Level 2 and configure global telemetry settings.
In the Cisco DNA Center GUI, click the Menu icon () and choose Provision > Network Devices > Inventory .
Check the check box for the devices that you want to assign to a site.
From the Actions menu, choose Provision > Assign Device to Site .
In the Assign Device to Site slide-in pane, click the link next to the icon for the device.
In the Choose a floor slide-in pane, select the floor to assign to the device.
(Optional) If you selected multiple devices to add to the same location, you can check the Apply to All check box for the first device to assign its location to the rest of the devices.
When assigning devices to a site, if Device Controllability is enabled, a workflow is automatically triggered to push the device configuration from the site to the devices.
If your network uses Cisco ISE for user authentication, you can configure Cisco DNA Center for Cisco ISE integration. This enables you to see more information about wired clients, such as the username and operating system.
Cisco ISE configuration is centralized within NCP (Network Control Platform), which enables you to configure Cisco ISE at one GUI location. The workflow for configuring Cisco ISE is as follows:
Cisco DNA Center uses AAA servers for user authentication and Cisco ISE for both user authentication and access control. Use this procedure to configure AAA servers, including Cisco ISE .
Note | Although pxGrid 2.0 allows up to four pxGrid nodes in the Cisco ISE deployment, Cisco DNA Center releases earlier than 2.2.1.x do not support more than two pxGrid nodes. |
Note | We recommend that you use ERS through the PAN. However, for backup, you can enable ERS on the PSNs. |
Note | For Cisco ISE 2.4 Patch 13, 2.6 Patch 7, and 2.7 Patch 3, if you are using the Cisco ISE default self-signed certificate as the pxGrid certificate, Cisco ISE might reject that certificate after applying those patches. This is because the older versions of that certificate have the Netscape Cert Type extension specified as the SSL server, which now fails (because a client certificate is required). This issue does not occur in Cisco ISE 3.0 and later. For more information, see the Cisco ISE Release Notes. |
Click the menu icon () and choose System > Settings > External Services > Authentication and Policy Servers .
From the Add drop-down list, choose AAA or ISE .
To configure the primary AAA server, enter the following information:
To configure a Cisco ISE server, enter the following details:
Note | This user must be a Super Admin. |
The FQDN consists of two parts, a hostname and the domain name, in the following format:
For example, the FQDN for a Cisco ISE server can be ise.cisco.com.
Click Advanced Settings and configure the settings:
Attention | If you do not enable TACAS for a Cisco ISE server here, you cannot configure the Cisco ISE server as a TACACS server under Design > Network Settings > Network when configuring a AAA server for network device authentication. |
After the required information is provided, Cisco ISE is integrated with Cisco DNA Center in two phases. It takes several minutes for the integration to complete. The phase-wise integration status is shown in the Authentication and Policy Servers window and System 360 window as follows:
Cisco ISE server registration phase:
pxGrid subscriptions registration phase:
If the status of the configured Cisco ISE server is shown as "FAILED" due to a password change, click Retry , and update the password to resynchronize the Cisco ISE connectivity.
To add a secondary server, repeat the preceding steps.
With Cisco DNA Center , you can configure global network settings when devices are assigned to a specific site. Telemetry polls network devices and collects telemetry data according to the settings in the SNMP server, the syslog server, the NetFlow Collector, or the wired client.
Create a site and assign a device to the site. See Create a Site in a Network Hierarchy.
Click the menu icon () and choose Design > Network Settings > Telemetry .
Expand the SNMP Traps area if it is not visible and do one of the following:
Expand the Syslogs area if it is not visible and do one of the following:
Expand the NetFlow area if it is not visible and do one of the following:
Expand the Wired Client Data Collection area and check the Monitor wired clients check box.
This selection turns on IP Device Tracking (IPDT) on the access devices of the site.
By default, IPDT is disabled for the site.
Note: You must enable IPDT to preview the CLI configuration. When provisioning a device, you can preview the CLI configuration before deploying it on device.
Expand the Wireless Controller, Access Point and Wireless Clients Health area and check the Enable Wireless Telemetry check box.
When selected, you can monitor the health of your network's wireless controller, access points, and wireless clients.
Use this procedure to enable Cisco AI Network Analytics to export network event data from wireless controllers as well as the site hierarchy to the Cisco DNA Center .
Click the menu icon () and choose System > Settings .
Scroll down to External Services and choose Cisco AI Analytics .
Do one of the following:
In the Success dialog box, click Okay .
(Recommended) In the AI Network Analytics window, click Download Configuration file.
To disable Cisco AI Network Analytics data collection, you must turn off (disable) the connection to the Cisco AI Network Analytics cloud service. This will disable all of the Cisco AI Network Analytics -related features, such as AI-Driven Issues, Network Heatmap, Site Comparison, and Peer Comparison.
Click the menu icon () and choose System > Settings .
Scroll down to External Services and choose Cisco AI Analytics .
In the Cloud Connection area, click the button to off, such that appears.
To delete your network data from the Cisco AI Network Analytics cloud, contact the Cisco Technical Response Center (TAC) and open a support request.
(Optional) If you have misplaced your previous configuration, click Download configuration file .
Machine Reasoning knowledge packs are step-by-step workflows that are used by the Machine Reasoning Engine (MRE) to identify security issues and improve automated root cause analysis. These knowledge packs are continuously updated as more information is received. The Machine Reasoning Knowledge Base is a repository of these knowledge packs (workflows). To have access to the latest knowledge packs, you can either configure Cisco DNA Center to automatically update the Machine Reasoning Knowledge Base on a daily basis, or you can perform a manual update.
Click the menu icon () and choose System > Settings .
Scroll down to External Services and choose Machine Reasoning Knowledge Base .
When there is a new update to the Machine Reasoning Knowledge Base, the AVAILABLE UPDATE area appears in the Machine Reasoning Knowledge Base window, which provides the Version and Details about the update.
(Recommended) Check the AUTO UPDATE check box to automatically update the Machine Reasoning Knowledge Base.
The Next Attempt area shows the date and time of the next update.
You can perform an automatic update only if Cisco DNA Center is successfully connected to the Machine Reasoning Engine in the cloud.
To manually update the Machine Reasoning Knowledge Base in Cisco DNA Center , do one of the following:
You can view the Cisco DNA Center GUI screens in English (the default), Chinese, Japanese, or Korean.
To change the default language, perform the following task:
In your browser, change the locale to one of the supported languages: Chinese, Japanese, or Korean.
Log in to Cisco DNA Center .
The GUI screens are shown in the selected language.
Assurance supports role-based access control (RBAC), which enables a user with SUPER-ADMIN-ROLE privileges to define custom roles that permit or restrict users access to certain Assurance features.
For more information, see the "Manage Users" chapter in the Cisco DNA Center Administrator Guide.
Use this procedure to define a custom role and then assign a user to that role.
Only a user with SUPER-ADMIN-ROLE permissions can perform this procedure.
Define a custom role.
To assign a user to the custom role you just created, click Add Users .
The User Management > Internal Users window appears, which allows you to assign the custom role to an existing user or to a new user.
If you are an existing user who was logged in when the administrator was making changes to your access permissions, you must log out of Cisco DNA Center and then log back in for the new permission settings to take effect.