cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1825
Views
0
Helpful
13
Replies

LMS 3.2.1 cant see device in ciscoview

Dawit Zeru
Level 1
Level 1

Hi Everyone,

I've a strange problem with LMS CiscoView I can't see ONE (its stack of two) device in the CiscoView.

and im getting an error mesg'

Errror Mesg'.jpg

The LMS is connected to ACS and all the I.T Department can't see this specific device in CiscoView

I've tried:

  • Deleted the device from the LMS and to discover it again.
  • Rest the Demmon
  • Erase it from the ACS and configure it again.

it didn't help.

I can use other functional things like back configuration

Details:

  • LMS 3.2.1
  • Cisco View 6.1.9
  • Device Type - C3750V2-24PS
  • ACS Version – 4.2

I'm attaching those files:

LMS Version

Show Version of the device

Windows systeminfo and version

error mesges

pdshow

Thanks for the help

13 Replies 13

Vinod Arya
Cisco Employee
Cisco Employee

Is LMS integrated with ACS or just for Authentication as PAM? What is the ACS version.

Share the output of NMSROOT/bin/ACSTestTool.pl from command prompt, if the LMS is integrated. Run it as :

NMSROOT/bin/perl NMSROOT/bin/ACSTestTool.pl

Please check if the user who is logged in is in admin group for LMS in ACS.

-Thanks Vinod **Rating Encourages contributors, and its really free. **

Hi Vinod,

thanks for the replay,

the ACS version is 4.2, about how is the LMS integrated with the ACS where do I find it?

The user is in the admin group furthermore the I.T can see all the devices in the network expect this one.

I attaching the command output ACSTestTool.pl

thanks again

Hi

So if everything else from LMS's perspective is working as expected then the issue is most likely on ACS.  Are you using Network Groups?  The LMS server must be in the same group as the devices it monitors.

Hi Nqoldwat,

as i says in the Q. above,

we can see all the devices in the network in the CiscoView expect this device

the security team reconfigure the switch in the ACS and it didn't help.

how can I see if we are using a network group in the ACS, its belong to the security team can you please direct me to it,

Thanks.

Hi

Please send the sysObjectID of the device.

You can retrieve this from the LMS server by running the command:

Solaris server:

$ /opt/CSCOpx/objects/jt/bin/snmpwalk -v2c -c

.1.3.6.1.2.1.1.2

Windows server:

> /CSCOpx/objects/jt/bin/snmpwalk -v2c -c

.1.3.6.1.2.1.1.2

One thing you could try is removing your LMS server from ACS integration and see if you can then manage the device.

Please send the sysObjectID of the device.

You can retrieve this from the LMS server by running the command:

Solaris server:

$ /opt/CSCOpx/objects/jt/bin/snmpwalk -v2c -c

.1.3.6.1.2.1.1.2

Windows server:

> /CSCOpx/objects/jt/bin/snmpwalk -v2c -c

.1.3.6.1.2.1.1.2

To address the ACS question:

Network  Device Groups (NDGs) are collection of AAA clients such as servers and  network devices. You should add the group of servers and network devices  only under a NDG. You can use the existing NDGs or you can create a new  NDG for this purpose. If you want to use an existing NDG, this step is  optional.

--- Add CiscoWorks Server and Network Devices as AAA Clients

* You should configure the following as AAA Clients in ACS Server: *

    ** CiscoWorks Server

You  should manually add the DCR Master server as an AAA client in ACS,  before you change the mode to ACS. When you use CiscoWorks Assistant  Server Setup workflow, the workflow converts the AAA mode of other  servers in the multi-server setup to ACS mode.

    ** Devices managed by CiscoWorks Server

You  should add the devices managed by CiscoWorks in ACS after you have  configured the CiscoWorks Server as a AAA client. If you do not  configure the devices as AAA clients in ACS, the devices will not be  visible in CiscoWorks Server after the integration. If you use  CiscoWorks Assistant Server Setup workflow to change the AAA mode to  ACS, the missing devices are added to the NDG you specify.

One thing you could try is removing your LMS server from ACS integration and see if you can then manage the device.

Here is the link to Changing ACS Setup

Thanks

Hi Nqoldwat,

first thanks for the help,

I'm attaching the SNMPWLK output,

and here are some workaround that I did:

  • I disable the connection between the ACS and CW and yes it help I can see the device.
  • when I enable the connection again its back to the same error messages
  • I checked with the security team the configuration of the device in the ACS and it's the same like every device
  • Finley I restarted the device and the issue are the same we get the same error problem

please advice

OK so the device is a catalyst37xxStack (.1.3.6.1.4.1.9.1.516)

According to the Supported Device Table the minimum software requirements are 12.2(25)SEC[RME] & 12.2(20)SE3[CM].  However Remote  Staging for this device is supported using external FTP server from RME  4.2 onwards. You must download and install the external FTP support  patch available at: http://cisco.com/cgi-bin/tablebuild.pl/cw2000-rme

  • rme4.2.0-sol-CSCsy338441.0.zip (on Solaris)
  • rme4.2.0-win-CSCsy338441.0.zip (on Windows)

But you state that you can manage the device when not integrated with ACS.  It does appear that the issue may reside on the ACS side of the house.  Here are the instructions for integration.  If followed exactly the process wiil be a success.

Before You Begin ACS Integration

Before you integrate the CiscoWorks Server with ACS, ensure that you:

1. Set up a System Identity User in CiscoWorks Server

    You can either use the Common Services or the CiscoWorks Assistant Server Setup workflow to configure a System Identity User.

2. Assign all the local user privileges to System Identity User in CiscoWorks Server

    You should add the System Identity User as a local user and assign all the privileges in CiscoWorks Server.

See the Setting up Local Users section in User Guide for CiscoWorks Common Services 3.2 to configure System Identity User configured as a local user and assign all privileges in CiscoWorks Server.  If System Identity User is not configured with all local user privileges, authorization fails when you try perform certain tasks in CiscoWorks Server.

Setting Up ACS Server

You should perform the tasks in ACS before you change the AAA mode of CiscoWorks Server to ACS.

1. Configure ACS Administrators in ACS Server

You should configure the ACS administrators with all privileges in ACS. The ACS administrator account in ACS is required to:

* Access the ACS server from any remote machine.

* Enter the login details during the AAA mode setup in Common Services.

Only then does authentication occur from the ACS Server.  Also, if you do not configure the ACS administrative user with all the privileges, the application registration with ACS will fail.

2. Create a Network Device Group

Network Device Groups (NDGs) are collection of AAA clients such as servers and network devices.

You should add the group of servers and network devices only under a NDG. You can use the existing NDGs or you can create a new NDG for this purpose.

If you want to use an existing NDG, this step is optional.

3. Add CiscoWorks Server and Network Devices as AAA Clients

You should configure the following as AAA Clients in ACS Server:

* CiscoWorks Server

You should manually add the DCR Master server as an AAA client in ACS, before you change the mode to ACS.

When you use CiscoWorks Assistant Server Setup workflow, the workflow converts the AAA mode of other servers in the multi-server setup to ACS mode.

* Devices managed by CiscoWorks Server

You should add the devices managed by CiscoWorks in ACS after you have configured the CiscoWorks Server as a AAA client.

If you do not configure the devices as AAA clients in ACS, the devices will not be visible in CiscoWorks Server after the integration.

If you use CiscoWorks Assistant Server Setup workflow to change the AAA mode to ACS, the missing devices are added to the NDG you specify.

4. Configure the CiscoWorks Administrative Users in ACS

You should add CiscoWorks System Identity User and other CiscoWorks administrators in ACS. Otherwise if you log in as a user configured only in Common Services, authentication will not happen.

You can create a user group in ACS and add all users to that user group.

See the following documents on Cisco.com for details how to perform each of the above tasks:

* User Guide for Cisco Secure Access Control Server 3.x and 4.x - http://www.cisco.com/en/US/products/sw/secursw/ps2086/products_user_guide_list.html

* User Guide for CiscoWorks Common Services 3.2 - http://www.cisco.com/en/US/products/sw/cscowork/ps3996/products_user_guide_list.html

*  CiscoWorks LMS Integration with Cisco Secure ACS whitepaper - http://www.cisco.com/en/US/products/sw/cscowork/ps2425/prod_white_papers_list.html

Changing the AAA Mode to ACS Using the Server Setup Workflow

To change the mode to ACS:

Step 1 Select CiscoWorks Assistant > Workflows > Server Setup > Change ACS Setup.

CiscoWorks Assistant checks whether there are pending devices in DFM and RME. If CiscoWorks Assistant finds any pending devices, the Pending Device Count table is displayed with the following details:

* Server—Server name.

* Application—The application that contains pending devices. The values will be DFM or RME.

* Pending Count—Number of pending devices.

* Details—The reason why CiscoWorks Assistant could not fetch the pending device count. This column will be blank if the pending devices count is found.

Along with the table, a Notification pop up window appears with the following message:

Pending devices exist or could not check for pending devices in some LMS applications

Step 2 Click OK.

Step 3 Click Next.

A confirmation pop up appears with the following message:

LMS server(s) ACS configuration will not be proper if there are pending devices in the LMS applications. Make sure there are no pending devices and click OK to continue.

To get further details on pending devices in the applications, go to:

RME > Devices > Device Management > Pending Devices

* Device Fault Manager > Device Management > Device Summary

See RME and Device Fault Manager User Guides for more information on pending devices.

Step 4 Click OK.

The Change ACS Setup page appears.

Step 5 Select the Change Mode to ACS check box and click Next to go the Configure ACS Mode page.

Note: Ensure that the local server is an AAA client to ACS server.

Step 6 Click OK on the Notification pop-up window to continue with the ACS Mode change.

Step 7 Enter the required information in the ACS Mode Setup table to change the login mode to ACS.

If the DCR Master (local server) is already in ACS mode, the fields other than the passwords and secret keys will be pre-populated.

Step 8 Select Register all installed applications with ACS, if you are registering the applications for the first time.

In case an application is already registered with ACS, the current registration will overwrite the previous registration.

When you select the Register all installed applications with ACS check box, you are prompted to confirm whether you want to continue with the settings.

See Common Services Online Help for details.

Step 9 Select the HTTP or HTTPS radio button under Current ACS Administrative Access Protocol.

Step 10 Click Next to complete the mode change.

The Configure ACS Mode Progress page is displayed. You can view the ACS mode configuration status in this page.

Note: Restart Daemon Manager after you configure ACS Mode for the changes to take effect.

Assigning Roles to Users and User Groups In ACS

After authentication, your authorization is based on the privileges that have been assigned to you. A privilege is a task or an operation defined within the application. The set of privileges assigned to you, defines your role.

You can either:

Assign predefined roles to CiscoWorks Users in ACS Or Create custom roles and assign them to CiscoWorks Users in ACS.

You ensure that the CiscoWorks user or the user group has been assigned the proper privileges in ACS mode. You can assign a desired role to the user or user group, or assign roles on an NDG basis.

See the following topics in User Guide for CiscoWorks Common Services 3.2 for more information:

* Roles in ACS

* Assigning Roles to Users and User Groups in ACS

Impact of Installing CiscoWorks Applications in ACS Mode

We recommend that you integrate CiscoWorks server and Cisco Secure ACS after installing all of the LAN Management Solution applications.

If you install any application on the CiscoWorks Server when AAA mode is set to ACS, you might be prompted with a message to re-register the application with ACS.

For example, if you have integrated CiscoWorks server and Cisco Secure ACS before installing any application, you are prompted with this message at the time of installation of the selected application:

CiscoWorks Server is in ACS mode

The application that you are installing requires new tasks to be registered with ACS. If you have already registered this application with ACS from another server, you do not need to register it again. However if you re-register the application, you will lose any custom roles that you had created earlier for this application in ACS.

Enter (Y)es to Register, (N)o to continue without registering,

(Q)uit: [N]

* If you enter Y, the application gets registered with ACS server.

* If you enter N, the application does not get registered with ACS server.

After installation, you can register RME 4.2 with ACS server, using the AcsRegCli.pl script:

/opt/CSCOpx/bin/perl /opt/CSCOpx/bin/AcsRegCli.pl -register rme

When you re-register, the custom roles you have created may be lost.

* If you have installed your application after configuring the CiscoWorks Login Module to ACS mode, the application users are not granted any permission.

However, the application is registered to the Cisco Secure ACS. On the Cisco Secure ACS server, you must assign the appropriate permissions to the application.

* Multiple instances of same application using same Cisco Secure ACS will share settings. Any changes will affect all instances of that application.

* If application is configured with Cisco Secure ACS and then the application is reinstalled, the application will inherit the old settings.

Verifying LMS Applications and the Cisco Secure ACS Configuration

After performing the above mentioned tasks on Cisco Secure ACS server, login to CiscoWorks with the username as defined in the Cisco Secure ACS.

Based on your privilege on the Cisco Secure ACS, you can perform only certain tasks on the CiscoWorks Server.

For example, if your privilege is of Help Desk, you can only view the Device Summary.

You can view only certain devices in the CiscoWorks Server. This depends on the Network Device setting for the User/Group on the Cisco Secure ACS.

Hi Nqoldwat,

its the weekend so I can try it next week (you know indoor politics ),

but i took a wireshark output from the LMS server, I'd love more pair of eyes on the output

and hopelly to hear some insihgit

Those are the IP address:

LMS server - 172.22.70.56

device ip - 10.121.15.117

thanks in advance

Hi Ngoldwat,

did you find or saw something the sniffer output?

please advice

Hi,

I see MANY checksum errors between 172.22.70.56 & ungrateful.

171    11:36:03.003688    ungrateful.cisco.com    172.22.70.56    TCP    [TCP ACKed lost segment] 55625 > ms-wbt-server [ACK] Seq=224 Ack=9139 Win=64240 Len=0

(filter ip.src == 172.22.70.56)

Can you SSH to the device from the LMS server?

Hi,

Yes I can SSH the device from the LMS server, I even shout ports to be sure,

thanks

I am not sure why you can view the device when not integrated with ACS but you may want to look at this post:

https://supportforums.cisco.com/thread/2025768

Thanks

Hi Ngoldwat,

I solve the problem.

-the when I added a new device to the LMS i didn't fill the DOMAIN Company (and its was on our old domain),

when I try to ping the device from the LMS server I got a different IP address, then I start to query why it gives me the IP D.G.

I deleted the device and add it again and this time I gave him the new domain and everything worked perfectly,

I just wanted to say thanks for you replays and assistance.

have a nice day