Manualsbrain.com
en
Deutsch
Español
Français
Italiano
Português
Русский
조선말, 한국어
日本語
中文
Manuals
Brands
Cisco
Cisco Prime Infrastructure 3.0
White Paper
Cisco Cisco Prime Infrastructure 3.0 White Paper
Download
Like
Full screen
Standard
Page
of
63
Go
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Page 3 of 63
Managing Configuration Archives ....................................................................................................................... 26
Comparing Configuration .................................................................................................................................... 27
Image Management................................................................................................................................................ 27
Setting Up Image Management .......................................................................................................................... 27
Importing Software Images ................................................................................................................................. 28
Image Distribution ............................................................................................................................................... 28
Configuration Templates ....................................................................................................................................... 29
Choosing a Configuration Template .................................................................................................................... 29
Defining Shared Policy Objects ........................................................................................................................... 30
Wireless Controller Configuration........................................................................................................................ 31
RRM/Clean Air .................................................................................................................................................... 31
Build RF Profiles ................................................................................................................................................. 32
Apply RF Profiles to AP Groups ..................................................................................................................... 33
Automated Deployment ......................................................................................................................................... 34
Compliance ............................................................................................................................................................ 35
Prerequisites ....................................................................................................................................................... 35
Creating Compliance Policy ................................................................................................................................ 35
Creating Policy Profiles ....................................................................................................................................... 36
Run Compliance Audit ........................................................................................................................................ 36
View Violation Summary ..................................................................................................................................... 37
PSIRT and EoX Reports ..................................................................................................................................... 37
Clients and Users .................................................................................................................................................. 38
Client Troubleshooting ........................................................................................................................................ 38
ISE Integration ................................................................................................................................................ 39
MSE Integration .............................................................................................................................................. 40
Monitoring .............................................................................................................................................................. 41
Monitoring Policies .............................................................................................................................................. 41
Viewing Alarms and Events ................................................................................................................................ 42
Configuring Alarm Severity ................................................................................................................................. 43
Customizing Traps and Syslogs .......................................................................................................................... 43
Defining Custom Trap Events ......................................................................................................................... 43
Defining Custom Syslog Events ..................................................................................................................... 44
Forwarding Alarms as Traps to Notification/Trap Receivers ............................................................................... 44
AVC and QoS Configuration ................................................................................................................................. 45
Monitoring Application and Services ................................................................................................................... 45
Prerequisites ....................................................................................................................................................... 45
AVC Supported Platforms ................................................................................................................................... 45
Readiness Assessment ...................................................................................................................................... 45
AVC Configuration .............................................................................................................................................. 46
Different Approaches to Enable AVC ............................................................................................................. 46
Enabling AVC on Wireless Controllers ........................................................................................................... 46
Associate Endpoints to Sites .......................................................................................................................... 46
Managing Netflow Data Sources ......................................................................................................................... 46
Viewing AVC Metrics .......................................................................................................................................... 47
Classify Unknown Traffic by Defining Custom Application .................................................................................. 47
Updating Application Definitions (NBAR2 Protocol Pack) ................................................................................... 48
Multi-NAM Capabilities within Cisco Prime Infrastructure ................................................................................... 48
Netflow Dashlets ................................................................................................................................................. 48
Lync Monitoring ..................................................................................................................................................... 48
Setting Up Microsoft Lync Monitoring ................................................................................................................. 49
Monitoring Microsoft Lync ................................................................................................................................... 49
PfR Monitoring ....................................................................................................................................................... 50
Site-to-Site PfR Topology.................................................................................................................................... 51
Prev
Next
1
2
3
4
5
…
63