Cisco Prime Discovery - PI-UCS-APL-K9 - Configured with 2 Interfaces - Prime 3.2
When you have two interfaces configured on the PI-UCS-APL-K9, which interface is referenced when the Prime discovery process modifies "the device configuration(s) to add a trap receiver in order for Prime Infrastructure to receive the necessary notifications"?
Also, what interface on the PI-UCS-APL-K9 is used to receive SNMP traps?
We have a PI-UCS-APL-K9 running Cisco Prime Infrastructure 3.2. It is configured with Gig 0 on one network and Gig 1 on a different network. Gig 1 is on the network we use to manage our network devices. Gig 0 is not reachable by our network devices.
I noticed a trap receiver (snmp-server host xxx.xxx.xxx.xxx) configured on all of our devices that has the IP of the Gig 0 interface of the PI-UCS-APL-K9. I removed that configuration line because it is not reachable by our devices but Prime put it back sometime during the night. Prime doesn't appear we have any defined jobs to configure that line. I assume this is happening as part of a recurring discovery process.
Inviting all network professionals in operations! We'd like to understand what would be valuable for you in a mobile application. Your response will help Cisco improve a product feature that could benefit you. Thanks!
Click here to take the sur...
Cisco’s software-defined wide area network (SD-WAN) solution allows user to quickly and seamlessly establish an overlay fabric to connect an enterprise’s data centers, branch and campus locations, as well as colocation facilities in order to imp...
1. Log into CLI of DNAC:
ssh maglev@< DNAC appliance IP> -p 2222
2. Run this curl command to get token to get member id:
curl -X POST -u admin:<admin user password> -H -V https://<CLUSTER-IP>/api/system/v1/identitymgmt/token
Enterprise Switching Business Unit is glad to announce Beta release 16.12.2 for all Catalyst 9200/9300/9400/9500/9600 and Catalyst 3650/3850 Platforms. This release is made available to allow users to test, evaluate and share fee...
Purpose of the document
This document describes the general recommendations or best practices when designing and deploying the Cisco SD-Access technology. The document assumes that the reader has a general overview of Cisco's SD-Access for Distributed C...