The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
Book Contents Book ContentsCisco Prime Collaboration Assurance - Advanced and Analytics Guide, 12.x (Includes 12.1 and 12.1 Service Pack 1 Features)
This section explains the following:
You need to configure device credentials for all devices that are managed using Cisco Prime Collaboration Assurance. Device credentials are required for discovering devices and updating inventory. If the credentials vary for different devices, create separate credentials profiles; that is, if you want to manage two Cisco Unified Communications Managers with different credentials in Cisco Prime Collaboration Assurance, you must create two separate credentials profiles. For more information, see the table on Credential Profiles Field Descriptions.
The following are some of the requirements while creating credentials profiles:
To add or clone a credential profile:
In the Cisco Prime Collaboration Assurance page, choose Device Inventory > Inventory Management from the Toggle Navigation pane.
For Cisco Prime Collaboration Release 11.5 and later
In the Cisco Prime Collaboration Assruance page, choose Inventory > Inventory Management from the Toggle Navigation pane.
In the Credentials Profile page, click Add and enter the necessary information described in the Table on Credential Profiles Field Descriptions.
After the devices are discovered, you can check the current Inventory table to verify that the credentials have been updated in the Cisco Prime Collaboration Assurance database.
The following table describes the fields on the Credential Profiles page.
Table 1. Credential Profiles Field DescriptionsName of the credential profiles.
(Optional) The credential fields (such as SNMP, HTTP, CLI) are displayed, based on the device type that you have selected.
To reduce rediscovery time, we recommend that you select the device type when you create the credential profiles.
The default device type is "Any" , if you do not select a device type while creating a credential profile.
See cisco.com for the list of device types.
For EX series, MX series, SX series, bare Codec devices, and all profiles with Codec, select the device type as TC_CE .
While managing coresident PLM, you should provide both CLI and HTTP credentials.
For Cisco Prime Collaboration Release 12.1 and later
While managing co-resident PLM, you should provide both CLI and HTTP credentials.
Ensure the following conditions are met for the Router to be identified as a Cisco Unified Border Element (CUBE):
For Cisco Prime Collaboration Release 11.6 and later
For EX series, MX series, SX series, DX series with CE image, bare Codec devices, and all profiles with Codec, select the device type as Codec.
For MSE devices, select Cisco MCU as the device type.
For Cisco Prime Collaboration Release 11.5 and later
For Cisco Virtualized Voice Browser devices, select Virtualized Voice Browser device type.
You can enter any credentials (SNMP, HTTP, CLI , MSI) to create an "Any" credential profile. You must create an "Any" credential profile to run auto-discovery (Ping Sweep and CDP discovery). However, you can run logical discovery also.
If your network has multiple subnets, then create an "Any" profile for each subnet.
The IP address is version 4 or version 6.
IP Address Pattern
IP address of the devices for which the credentials are provided. You must:
We recommend that you:
Avoid using patterns such as 150.*.*.*, 192.78.22.1?, 150.5.*.*/24.
If you are unable to find a common pattern for the devices, enter *.*.*.*.
Minimize the use of wildcard character (*), while defining the IP address patterns in the credential profiles .
For Cisco Prime Collaboration Release 11.5 and later
Inventory > Inventory management > Manage Credentials
Use of wildcard character may increase the discovery time.
See SNMPv2C to understand how the patterns are used.
General SNMP Options
SNMP Timeout - The default is 10 seconds.
SNMP Retries - The default is 2.
SNMP Version - Selecting an SNMP version is mandatory.
Used to discover and manage the device.
SNMP Read Community String
You can provide either SNMPv1 or SNMPv2C credentials. We recommend that you use different SNMP credentials for Cisco TelePresence systems and network devices.
Cisco Prime Collaboration Assurance searches the credential profiles, based on the IP address pattern. Cisco Prime Collaboration Assurance then chooses a profile for which the SNMP credentials match. There can be multiple matching profiles, that is, profiles with the same SNMP credentials. In such cases, Cisco Prime Collaboration Assurance chooses the profile that matches first.
For Cisco Prime Collaboration Release 11.1 and earlier
If multiple profiles have the same SNMP credentials but different CLI credentials, Cisco Prime Collaboration Assurance might chose a profile that contains the correct SNMP credentials but incorrect CLI credentials for the device. If this occurs, the troubleshooting workflow might not work.
SNMP Write Community String
Used to discover and manage the device.
SNMP Security Name - Enter a security name.
SNMP Authentication Protocol - You can choose either MD5 or SHA.
SNMP Authentication Passphrase - Enter a passphrase.
For Cisco Prime Collaboration Release 11.5 and later
SNMP Privacy Protocol - You can choose either AES128, or DES.
Used to access the device through CLI to discover media path for troubleshooting.
CLI Login Username and Password
The CLI credentials are used during the troubleshooting workflow. If the credentials are not entered or if the entered credentials are incorrect, the troubleshooting workflow feature may not work.
For Cisco Prime Collaboration Release 11.5 and later
The CLI credentials are used to manage video test call and analyze call signaling through SIP Call Flow Analyzer.
For Cisco Prime Collaboration Release 12.1 and later
Ensure the following conditions are met for the Router to be identified as a Cisco Unified Border Element (CUBE):
Used to access the device through HTTP to poll system status and meeting information.
HTTP Username and Password
Cisco Prime Collaboration Assurance first checks the access for HTTP. If the access attempt fails, then Cisco Prime Collaboration Assurance checks the access for HTTPS.
If you log in to Cisco TMS using the format, then ensure that you add the same value in the HTTPS Username field.
Used to retrieve the session status information from the Cisco Unified CM.
(Optional) JTAPI Username and Password.
Password must not contain a semicolon (;) or equals (=).
For Cisco Prime Collaboration Release 11.5 and later
Used to retrieve the session status information from the Cisco Unified CM.
For Cisco Prime Collaboration Release 12.1 SP1
A new set of JTAPI specific parameters are introduced to secure the JTAPI (TLS v1.2) connection.
Following are a set of JTAPI specific parameters.
The check box enables you to enter the parameters in (enable or disable) the new Secure JTAPI fields.
2. TFTP Server IP Address - Specify the IP address of the TFTP Server.
The value must be one of the nodes on the CUCM cluster. Make sure that the TFTP service is running on that node.
3. TFTP Server Port - The TFTP Server Port defaults to 69.
Do not change the default value unless the System Administrator recommends.
4. CAPF Server IP Address - Specify the IP address of the CAPF Server.
5. CAPF Server Port - The CAPF Server Port number defaults to 3804.
Ensure that the value entered matches with the value that is configured in Cisco Unified Communication Manager.
7. Instance ID for Publisher - This field specifies the application instance identifier configured in CAPF Settings section of Application or End User CAPF profile configuration page in the Cisco Unified Communication Manager cluster.
8. Secure Authentication String – Enter the Authentication String configured in CAPF Settings section of Application or End User CAPF profile configuration page in the respective Communication Manager Publisher.
The section on Troubleshooting Secure JTAPI Connections lists the details of troubleshooting the possible errors and recommended actions "with setup of CUCM for Secure JTAPI and Sessions not coming up on Conference Diagnostics" resepctively.
For Cisco Prime Collaboration Release 11.5 and later
The following devices are renamed in Credential Profiles Page:
You do not need to add credentials for Cisco Device, Cisco Unified Communications Manager Express (Cisco Unified CME), and UC500 Series devices in Credential Profiles page.
For Cisco Prime Collaboration Release 11.1 and earlier
In Cisco Prime Collaboration Assurance, when a device is added, the SSL certificates are exchanged for credential validation by accessing a protected resource using HTTPS. During exchange, the SSL certificate is not stored in Cisco Prime Collaboration Assurance trust-store and communication with the device fails, at a later point of time. It is recommended that you manually import the SSL certificate to Cisco Prime Collaboration Assurance trust-store to access the device.
Cisco Prime Collaboration Assurance enables you to check the authenticity of the SSL certificate during its communication with the devices or applications over HTTPS. However, this is not mandatory as you can still continue to discover the devices without authenticating the certificate.
Cisco Prime Collaboration Assurance does not validate the certificates from the devices or applications it communicates by default.
To enable the SSL certificate authentication:
Choose System Administration > Certificate Management .
In the Device Certificate Management tab, check the Enable SSL certificate authentication for device discovery check box.
Click the Import Certificates button.
Restart the Cisco Prime Collaboration Assurance server for the changes in trust manager to take effect.
cm/admin# application stop cpcm
cm/admin# show application status cpcm
cm/admin# application start cpcm
If you have modified credentials for the devices that you are currently managing in the Cisco Prime Collaboration Assurance application, you must modify the relevant credential profiles in the Cisco Prime Collaboration Assurance database.
If the credentials are incorrect, a major event — Device is inaccessible is triggered from Cisco Prime Collaboration Assurance ( Monitor > Alarms & Events > Events ).
To edit a credential profile:
Choose Device Inventory > Inventory Management .
For Cisco Prime Collaboration Release 11.5 and later
Choose Inventory > Inventory Management
From the Inventory Management page, select a device and click Modify Credentials .
Update the credentials as described in the Table on Credential Profiles Field Descriptions.
Cisco Prime Collaboration Assurance takes a few minutes to update its database with the modified credentials. After the credentials are updated, an informational event, Device is accessible from Collaboration Manager, is triggered. Cisco Prime Collaboration Assurance uses the updated credentials in the next polling job.
For Cisco Prime Collaboration Release 11.5 and later
If device discovery fails because of incorrect credentials, you can test the credentials for the failed devices and rediscover those devices. Choose Inventory > Inventory Management > Discovery Jobs for a list of devices that were not discovered.
Do not run this task when a discovery job is in progress.
To verify device credentials:
For Cisco Prime Collaboration Release 11.5 and later
Choose Inventory > Inventory Management .
From the Credential Profiles page, select the profile name to use for testing the credentials, and click Verify .
Enter a valid device IP address to test the credentials. You can verify only one device at a time, and you cannot enter expressions such as *.*.*.*, 192.2.*.*, and so on.
Click Test . You can see an inprogress moving icon next to the test button till the task completes. The test results are displayed under the Test Credential Result pane.
If the verification fails, see the possible reasons listed in Credential Verification Error Messages.
Note | All the nodes in the cluster may not be running all the protocols. For example, JTAPI may not be running on all the nodes. As a result, the credential validation test may fail for some of your nodes. After fixing the credentials issue, test the device credentials again and run the discovery for that device. After the devices are discovered, you can verify if the access information is updated in the Cisco Prime Collaboration Assurance database in the current Inventory table. |
The credential verification error messages are tabulated below.
Table 2. Credential Verification Error MessagesSNMP Request: Received no response from IP Address.
Failed for one of the following reasons:
Either the device response time is slow or the device is unreachable.
Failed to fetch table due to: Request timed out.
Either the device response time is slow or the device is unreachable.
Increase the SNMP Timeout and Retries values in the credential profile.
The configured SNMPv3 security level is not supported on the device.
Device does not support the configured SNMPv3 security level.
Change the SNMPv3 security level to the supported security level in the credential profile.
The SNMPv3 response was not received within the stipulated time.
Either the device response time is slow or the device is unreachable.
Verify the device connectivity.
SNMPv3 Engine ID is wrong.
Incorrect engine ID entered in the credential profile.
Enter the correct SNMPv3 engine ID in the credential profile.
SNMPv3 message digest is wrong.
Failed for one of the following reasons:
SNMPv3 message decryption error.
Cannot decrypt the SNMPv3 message.
Verify that the correct SNMPv3 authentication algorithm is entered in the credential profile.
Unknown SNMPv3 Context.
The configured SNMPv3 context in the credential profile does not exist on the device.
Verify that the configured SNMPv3 context is correct in the credential profile.
Unknown SNMPv3 security name.
Either the SNMPv3 username is incorrect in the credential profile or the SNMPv3 username is not configured on the device.
Verify that the correct SNMPv3 username is set in the credential profile and on the device.
Login authentication failed.
Incorrect credentials entered in the credential profile.
Verify and reenter the device CLI credentials in the credential profile.
Either SSH or Telnet service may not be running on the device.
Server returned HTTP response code: 401 for URL.
Either the HTTP service is not running or the URL is invalid.
The HTTP or HTTPS service is not running.
Verify whether the HTTP or HTTPS service is running on the device.
HTTP check failed.
Incorrect HTTP credentials entered in the credential profile.
Verify and reenter the device HTTP credentials in the credential profile.
For Cisco Prime Collaboration Release 11.1 and earlier
Failed to access MSI.
Incorrect MSI credentials entered in the credential profile.
Verify and reenter the device MSI credentials in the credential profile.
You can delete only unused credential profiles. We recommend that you do not delete the credential profile of a device that is being managed in the Cisco Prime Collaboration Assurance application.
To delete a credential profile:
Choose Device Inventory > Inventory Management .
For Cisco Prime Collaboration Release 11.5 and later
Choose Inventory > Inventory Management
In the Inventory Management page, click Manage Credentials . The credentials for a device that appears first on the list are displayed by default.
Select the profile name and click Delete .