Cisco Cisco Prime Network 3.8 Release Notes
9
Cisco Prime Network 3.8.1 Release Notes
OL-26395-01
New Features and Enhancements in Prime Network 3.8.1
When creating a disovery profile, you first specify the technique(s) to be used to discover the network.
The most common discovery technique is Ping Sweep, which pings all the IP addresses in a specified
subnet. You can choose a different discovery technique based on protocol data, depending on the
protocols used in your network.
The most common discovery technique is Ping Sweep, which pings all the IP addresses in a specified
subnet. You can choose a different discovery technique based on protocol data, depending on the
protocols used in your network.
After specifying the discovery technique(s), you provide information that is required to create VNEs for
the discovered devices, including the credentials that will be needed to connect to the devices, and the
method the system should use to identify the management IP address.
the discovered devices, including the credentials that will be needed to connect to the devices, and the
method the system should use to identify the management IP address.
Lastly, you have the option to define filters to include/exclude specific devices from the network
discovery results. For example, you might have a subset of devices in the specified subnet that you do
not want to manage, so you could filter these out of the results.
discovery results. For example, you might have a subset of devices in the specified subnet that you do
not want to manage, so you could filter these out of the results.
lists the parameters to be defined before initiating the discovery process.
Table 3
Discovery Profile Settings
Field
Description
Name
A unique name for the discovery profile.
Discovery Technique
The discovery technique to be used to discover the devices in the network. The
most commonly used technique is Ping Sweep. Click on Techniques Based on
Protocol Data to see the other discovery techniques. To select a discovery
technique, click the plus icon next to the technique, check the Enable check
box, and then enter the required information. You have the following options:
most commonly used technique is Ping Sweep. Click on Techniques Based on
Protocol Data to see the other discovery techniques. To select a discovery
technique, click the plus icon next to the technique, check the Enable check
box, and then enter the required information. You have the following options:
•
Ping Sweep—Enter the starting IP address and subnet mask to specify a
range of IP addresses. The system will ping all the IP addresses in this
range and will discover the devices from which it receives a reply.
range of IP addresses. The system will ping all the IP addresses in this
range and will discover the devices from which it receives a reply.
•
Protocol Data Techniques (CDP, Router, Address Resolution, Border
Gateway or OSPF)— Specify the seed device IP address and the number
of hops away from the seed device the system should look for devices to
discover.
Gateway or OSPF)— Specify the seed device IP address and the number
of hops away from the seed device the system should look for devices to
discover.
Note
You can specify multiple techniques in order to locate and discover the
largest number of devices.
largest number of devices.
Credential Settings
Specifies the pool of credentials that the system can use to communicate with
the devices during the VNE creation process. At minimum, you must specify
SNMP v2/v3 credentials and Telnet/SSH credentials. The system will define a
device as “Reachable” if the device is accessible using the defined credentials.
the devices during the VNE creation process. At minimum, you must specify
SNMP v2/v3 credentials and Telnet/SSH credentials. The system will define a
device as “Reachable” if the device is accessible using the defined credentials.