Cisco Cisco Prime Network 3.8 Release Notes

Page of 26
 
9
Cisco Prime Network 3.8.1 Release Notes
OL-26395-01
  New Features and Enhancements in Prime Network 3.8.1
When creating a disovery profile, you first specify the technique(s) to be used to discover the network. 
The most common discovery technique is Ping Sweep, which pings all the IP addresses in a specified 
subnet. You can choose a different discovery technique based on protocol data, depending on the 
protocols used in your network. 
After specifying the discovery technique(s), you provide information that is required to create VNEs for 
the discovered devices, including the credentials that will be needed to connect to the devices, and the 
method the system should use to identify the management IP address.
Lastly, you have the option to define filters to include/exclude specific devices from the network 
discovery results. For example, you might have a subset of devices in the specified subnet that you do 
not want to manage, so you could filter these out of the results.
 lists the parameters to be defined before initiating the discovery process.
Table 3
Discovery Profile Settings
Field
Description
Name
A unique name for the discovery profile.
Discovery Technique
The discovery technique to be used to discover the devices in the network. The 
most commonly used technique is Ping Sweep. Click on Techniques Based on 
Protocol Data to see the other discovery techniques. To select a discovery 
technique, click the plus icon next to the technique, check the Enable check 
box, and then enter the required information. You have the following options:
Ping Sweep—Enter the starting IP address and subnet mask to specify a 
range of IP addresses. The system will ping all the IP addresses in this 
range and will discover the devices from which it receives a reply.
Protocol Data Techniques (CDP, Router, Address Resolution, Border 
Gateway or OSPF)— Specify the seed device IP address and the number 
of hops away from the seed device the system should look for devices to 
discover. 
Note
You can specify multiple techniques in order to locate and discover the 
largest number of devices. 
Credential Settings
Specifies the pool of credentials that the system can use to communicate with 
the devices during the VNE creation process. At minimum, you must specify 
SNMP v2/v3 credentials and Telnet/SSH credentials. The system will define a 
device as “Reachable” if the device is accessible using the defined credentials.