|
Table Of Contents
Catalyst 6500 Series and Cisco 7600 Series Network Analysis Module
Catalyst 6500 Series and Cisco 7600 Series Network Analysis Module Overview
Software and Hardware System Requirements
Selecting a VLAN for Management (For Cisco IOS Only)
Configuring the NAM Management Network Parameters
Obtaining Technical Assistance
Obtaining Additional Publications and Information
Quick Start Guide
Catalyst 6500 Series and Cisco 7600 Series Network Analysis Module
1 Catalyst 6500 Series and Cisco 7600 Series Network Analysis Module Overview
The Catalyst 6500 Series and Cisco 7600 Series Network Analysis Module (model numbers WS-SVC-NAM-1 and WS-SVC-NAM-2) is a network module that can be installed in Catalyst 6500 Series switches and Cisco 7600 Series routers, that monitors and analyzes network traffic. The NAM Traffic Analyzer is software embedded in the NAM that gives you browser-based access to the monitoring features of the NAM. You use this software to troubleshoot and monitor network availability and health.
In this document you will find:
•Package contents, including links for accessing online documentation.
•Hardware and software requirements.
•Installation and configuration procedures for getting the NAM and Traffic Analyzer running.
•Pointers to additional documentation that provides detailed procedures for installing and using the product.
•Information about ordering documentation and contacting Cisco Systems for additional assistance.
Package Contents
•Catalyst 6500 Series and Cisco 7600 Series NAM.
•Installation and Configuration Note for the Catalyst 6500 Series and Cisco 7600 Series Network Analysis Module Release 3.3.
•Release Notes for the Network Analysis Module Software Release 3.3.
•Copyright Notices for the Network Analysis Module Release 3.3.
2 Software and Hardware System Requirements
This section provides NAM Traffic Analyzer software and hardware requirements:
• Table 1 describes the software requirements for installing and using the NAM Traffic Analyzer.
• Table 2 describes the hardware requirements for installing and using the NAM Traffic Analyzer.
• Table 3 describes the browser requirements for all platforms.
Table 1 Software Requirements
Module NAM Application Image Catalyst OS Software Cisco IOS SoftwareWS-SVC-NAM-1
WS-SVC-NAM-22.2, 3.1, and 3.3.
•Release 7.3(1) or later with Supervisor Engine 1A or 2.
•Release 8.2(1) or later with a WS-SUP720.
•Release 12.1(13)E1 or later with a Supervisor Engine 2 with an MSFC2.
•Release 12.1(19E)1 or later with a Supervisor Engine 1A with an MSFC2.
•Release 12.2(14)SX1 or later with a WS-SUP720.
1 If you are running a 12.1(13)E-based release, we recommend a later 13E release, for example 12.1(13)E11 over 12.1(13)E3.
Table 2 Hardware Requirements
Module Catalyst OS Software Cisco IOS SoftwareWS-SVC-NAM-1
WS-SVC-NAM-2•Supervisor Engine 1A or 2
•WS-SUP720
•Supervisor Engine 1A or 2 with an MSFC2
•WS-SUP720
Table 3 Browser Requirements
Browser Version Platform Java Plug-In Support1Internet Explorer (recommended)
5.5 and 6.0.
Windows 2000.
•1.3.1_03
•1.4.1_02
Netscape Navigator
7.0 and 7.1.
Windows 2000 and Solaris.
•1.4.1_02 (Windows 2000)
•1.4.0_01 (Solaris)
1 Although Traffic Analyzer does not require a Java plug-in, a plug-in might be required to use Java Virtual Machine (JVM). The plug-in versions listed have been tested for browsers that require a plug-in for JVM.
3 Installing the NAM
For information on physically installing the NAM into the switch, see the Installation and Configuration Note for the Catalyst 6500 Series and Cisco 7600 Series Network Analysis Module Release 3.3.
4 Setting Up the NAM
To set up the NAM, follow these steps:
1. Selecting a VLAN for Management (For Cisco IOS Only)
2. Configuring the NAM Management Network Parameters
Selecting a VLAN for Management (For Cisco IOS Only)
Note Devices running Catalyst OS do not need to configure a VLAN as the NAM management port. The port is automatically synchronized to the VLAN assigned to interface sc0 on the Supervisor engine.
To select a VLAN for management, enter the configuration mode for the NAM and enter
the following:Switch(config)# analysis module slot_number management-port access-vlan vlan_number This example shows how to select VLAN 5 for management.
Switch
#configure terminalEnter configuration commands, one per line. End with CNTL/Z.
Switch(config)#analysis module 4 management-port access-vlan 5
Switch
(config)#exit
Switch
#Configuring the NAM Management Network Parameters
Step 1 Access the NAM CLI by establishing a console session with the NAM.
a. For devices running Cisco IOS enter:
root@localhost# session slot module_number processor 1
b. For devices running Catalyst OS enter:
root@localhost# session module_number
Step 2 At the login prompt, enter root to log in to the root account.
a. If you have not changed the password from the factory-set default, enter root as the root password.
b. If you are still at the factory set default, enter password root to change the root password.
Step 3 Configure the NAM IP address and subnet mask.
root@localhost# ip address
ip-address subnet-maskStep 4 Configure the NAM system default gateway address.
root@localhost# ip gateway
default-gatewayStep 5 Set the NAM system domain name.
root@localhost# ip domain
domain-nameStep 6 Set the NAM system host name.
root@localhost# ip host
nameStep 7 Set one or more NAM system name servers.
root@localhost# ip nameserver ip-address
Note Step 7 is optional but highly recommended. Unexpected delays can occur if a
name server is not set.Step 8 Check the connectivity to the device by pinging an external host or address.
root@localhost# ping host|ip-address
Note Step 8 is optional.
Step 9 Verify that the device is properly configured.
root@localhost# show ip
Step 10 If you want to use an external SNMP management application to access the NAM, configure the SNMP MIB system variables. These steps are optional.
a. Configure the SNMP syslocation MIB variable.
root@localhost# snmp location
location-string
b. Set the SNMP sysContact MIB variable.
root@localhost# snmp contact
contact-stringc. Set the SNMP sysName MIB variable.
root@localhost# snmp name
name-stringd. Set the SNMP agent community string parameter password for read-write access.
root@localhost# snmp community
community-string rwe. Set the SNMP agent community string parameter password for read-only access.
root@localhost# snmp community
community-string ro
Note You can clear the SNMP community string using the snmp delete community community-string command.
f. Verify the SNMP access controls and settings.
root@localhost# show snmp
Step 11 Enable the NAM Traffic Analyzer application.
root@localhost#
ip http server enable
Step 12 Enter a web username and password.
Step 13 To access Traffic Analyzer, open a web browser and enter the NAM IP address as the URL.
Step 14 Log in with the NAM username and password that you entered in Step 13.
Step 15 When you want to end the NAM console session and return to the Cisco IOS CLI, enter exit.
This example shows how to configure a NAM running Catalyst OS.
namlab-6k#
namlab-6k#session 9
Trying NAM-9
Connected to NAM-9
Escape character is '^]'.
Cisco Network Analysis Module (WS-SVC-NAM-2)
login: root
Password:
Last login: wed Feb 18 17:04:40 from joe
Terminal type: vt100
Cisco Network Analysis Module (WS-SVC-NAM-2) Console, 3.3(0.9)
Copyright (c) 1999-2004 by cisco Systems, Inc.
WARNING! Default password has not been changed!
root@localhost.cisco.com# password root
Changing password for user root
New UNIX password:
Retype new UNIX password:
passwd: all authentication tokens updated successfully
root@localhost.cisco.com# ip address 172.20.104.103 255.255.255.192
root@localhost.cisco.com# ip gateway 172.20.104.65
root@localhost.cisco.com# ip domain cisco.com
root@localhost.cisco.com# ip host lab-nam
root@lab-nam.cisco.com# ip nameserver 171.69.2.133
root@lab-nam.cisco.com# ping 171.69.2.133
PING 171.69.2.133 (171.69.2.133) from 172.20.104.103 : 56(84) bytes of data.
64 bytes from 171.69.2.133: icmp_seq=0 ttl=247 time=515 usec
64 bytes from 171.69.2.133: icmp_seq=1 ttl=247 time=609 usec
root@lab-nam.cisco.com# show ip
IP address: 172.20.104.103
Subnet mask: 255.255.255.192
IP Broadcast: 172.20.104.127
DNS Name: lab-nam.cisco.com
Default Gateway: 172.20.104.65
Nameserver(s): 171.69.2.133
HTTP server: Disabled
HTTP secure server: Disabled
HTTP port: 80
HTTP secure port: 443
TACACS+ configured: No
Telnet: Enabled
SSH: Disabled
root@lab-nam.cisco.com# ip http server enable
Enabling HTTP server...
No web users are configured.
Please enter a web administrator user name [admin]:
New password:
Confirm password:
User admin added.
Successfully enabled HTTP server.
root@lab-nam.cisco.com# snmp location bldn NAM lab
root@lab-nam.cisco.com# snmp contact sysadmin
root@lab-nam.cisco.com# snmp community public ro
root@lab-nam.cisco.com# snmp community private rw
root@lab-nam.cisco.com# show snmp
SNMP Agent: lab-nam.cisco.com 172.20.104.103
SNMPv1: Enabled
SNMPv2C: Enabled
SNMPv3: Disabled
community private write
community public read
sysDescr Cisco Network Analysis Module (WS-SVC-NAM-2), Version 3.3(0.9)
Copyright (c) 1999-2004 by cisco Systems, Inc.
sysObjectID enterprises.9.5.1.3.1.1.2.914
sysContact sysadmin
sysName NAM
sysLocation bldn NAM lab
root@lab-nam.cisco.com#
5 Where to Go Next
After you install the module and perform the necessary post-installation tasks, you are ready to use Traffic Analyzer. For more information, see the following documentation:
•User Guide for the Network Analysis Module Traffic Analyzer Release 3.3
You can access this document:
•Directly from the Traffic Analyzer online help. When the Traffic Analyzer application launches ( Step 13 of the "Configuring the NAM Management Network Parameters" section), click the Help text in the upper right-hand corner of the application. The online help will open in a new window.
•In HTML and PDF on Cisco.com:
a. Log into Cisco.com.
b. Select Products & Services > Network Management CiscoWorks > Cisco Network Analysis Module Software > Technical Documentation.
c. Select the appropriate document type from the list, then the document written for this release.
•Network Analysis Module Command Reference Release 3.3
You can access this document in HTML and PDF on Cisco.com:
1. Log into Cisco.com.
2. Select Products & Services >Network Management CiscoWorks > Cisco Network Analysis Module Software > Technical Documentation.
3. Select the appropriate document type from the list, then the document written for this release.
6 Related Documentation
Note Although every effort has been made to validate the accuracy of the information in the printed and electronic documentation, you should also review the documentation on Cisco.com for any updates.
For information about installing, troubleshooting, and using the product, see the sources of information in Table 4:
7 Obtaining Documentation
Cisco documentation and additional literature are available on Cisco.com. Cisco also provides several ways to obtain technical assistance and other technical resources. These sections explain how to obtain technical information from Cisco Systems.
Cisco.com
You can access the most current Cisco documentation on the World Wide Web at this URL:
http://www.cisco.com/univercd/home/home.htm
You can access the Cisco website at this URL:
International Cisco websites can be accessed from this URL:
http://www.cisco.com/public/countries_languages.shtml
Ordering Documentation
You can find instructions for ordering documentation at this URL:
http://www.cisco.com/univercd/cc/td/doc/es_inpck/pdi.htm
You can order Cisco documentation in these ways:
•Registered Cisco.com users (Cisco direct customers) can order Cisco product documentation from the Ordering tool:
http://www.cisco.com/en/US/partner/ordering/index.shtml
•Nonregistered Cisco.com users can order documentation through a local account representative by calling Cisco Systems Corporate Headquarters (California, USA) at 408 526-7208 or, elsewhere in North America, by calling 800 553-NETS (6387).
8 Documentation Feedback
You can submit e-mail comments about technical documentation to bug-doc@cisco.com.
You can submit comments by using the response card (if present) behind the front cover of your document or by writing to the following address:
Cisco Systems
Attn: Customer Document Ordering
170 West Tasman Drive
San Jose, CA 95134-9883We appreciate your comments.
9 Obtaining Technical Assistance
For all customers, partners, resellers, and distributors who hold valid Cisco service contracts, the Cisco Technical Assistance Center (TAC) provides 24-hour-a-day, award-winning technical support services, online and over the phone. Cisco.com features the Cisco TAC website as an online starting point for technical assistance. If you do not hold a valid Cisco service contract, please contact your reseller.
Cisco TAC Website
The Cisco TAC website provides online documents and tools for troubleshooting and resolving technical issues with Cisco products and technologies. The Cisco TAC website is available 24 hours a day, 365 days a year. The Cisco TAC website is located at this URL:
Accessing all the tools on the Cisco TAC website requires a Cisco.com user ID and password. If you have a valid service contract but do not have a login ID or password, register at this URL:
http://tools.cisco.com/RPF/register/register.do
Opening a TAC Case
Using the online TAC Case Open Tool is the fastest way to open P3 and P4 cases. (P3 and P4 cases are those in which your network is minimally impaired or for which you require product information.) After you describe your situation, the TAC Case Open Tool automatically recommends resources for an immediate solution. If your issue is not resolved using the recommended resources, your case will be assigned to a Cisco TAC engineer. The online TAC Case Open Tool is located at this URL:
http://www.cisco.com/tac/caseopen
For P1 or P2 cases (P1 and P2 cases are those in which your production network is down or severely degraded) or if you do not have Internet access, contact Cisco TAC by telephone. Cisco TAC engineers are assigned immediately to P1 and P2 cases to help keep your business operations running smoothly.
To open a case by telephone, use one of the following numbers:
Asia-Pacific: +61 2 8446 7411 (Australia: 1 800 805 227)
EMEA: +32 2 704 55 55
USA: 1 800 553-2447For a complete listing of Cisco TAC contacts, go to this URL:
http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml
TAC Case Priority Definitions
To ensure that all cases are reported in a standard format, Cisco has established case priority definitions.
Priority 1 (P1)—Your network is "down" or there is a critical impact to your business operations. You and Cisco will commit all necessary resources around the clock to resolve the situation.
Priority 2 (P2)—Operation of an existing network is severely degraded, or significant aspects of your business operation are negatively affected by inadequate performance of Cisco products. You and Cisco will commit full-time resources during normal business hours to resolve the situation.
Priority 3 (P3)—Operational performance of your network is impaired, but most business operations remain functional. You and Cisco will commit resources during normal business hours to restore service to satisfactory levels.
Priority 4 (P4)—You require information or assistance with Cisco product capabilities, installation, or configuration. There is little or no effect on your business operations.
10 Obtaining Additional Publications and Information
Information about Cisco products, technologies, and network solutions is available from various online and printed sources.
•Cisco Marketplace provides a variety of Cisco books, reference guides, and logo merchandise. Go to this URL to visit the company store:
http://www.cisco.com/go/marketplace/
•The Cisco Product Catalog describes the networking products offered by Cisco Systems, as well as ordering and customer support services. Access the Cisco Product Catalog at this URL:
http://cisco.com/univercd/cc/td/doc/pcat/
•Cisco Press publishes a wide range of general networking, training and certification titles. Both new and experienced users will benefit from these publications. For current Cisco Press titles and other information, go to Cisco Press online at this URL:
•Packet magazine is the Cisco quarterly publication that provides the latest networking trends, technology breakthroughs, and Cisco products and solutions to help industry professionals get the most from their networking investment. Included are networking deployment and troubleshooting tips, configuration examples, customer case studies, tutorials and training, certification information, and links to numerous in-depth online resources. You can access Packet magazine at this URL:
•iQ Magazine is the Cisco bimonthly publication that delivers the latest information about Internet business strategies for executives. You can access iQ Magazine at this URL:
http://www.cisco.com/go/iqmagazine
•Internet Protocol Journal is a quarterly journal published by Cisco Systems for engineering professionals involved in designing, developing, and operating public and private internets and intranets. You can access the Internet Protocol Journal at this URL:
•Training—Cisco offers world-class networking training. Current offerings in network training are listed at this URL:
Posted: Tue Oct 3 10:42:32 PDT 2006
All contents are Copyright © 1992--2006 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.