Cisco CRS-1 Series Carrier Routing System Craft Works Interface
Quick Start Guide
Cisco IOS-XR Software Release 2.0
1Introduction
2About the CWI
3Getting Started
4Setting Up the Router and CWI Client
5Getting Started with the CWI
6CWI Overview
7CWI Desktop Window
8Configuration Desktop Window
9Obtaining Documentation
10 Documentation Feedback
11 Obtaining Technical Assistance
12 Obtaining Additional Publications and Information
Page 2
1 Introduction
This document introduces the Craft Works Interface (CWI) that supports Cisco IOS-XR Software Release 2.0. The following
sections are provided:
• About the CWI, page 2
• Getting Started, page 3
• Setting Up the Router and CWI Client, page 6
• Getting Started with the CWI, page 11
• CWI Overview, page 18
• CWI Desktop Window, page 18
• Configuration Desktop Window, page 20
• Obtaining Documentation, page 22
• Documentation Feedback, page 23
• Obtaining Technical Assistance, page 23
• Obtaining Additional Publications and Information, page 24
Related Documentation
Refer to the following list for related documents that may be useful:
• Cisco CRS-1 Series Carrier Routing System Getting Started Guide
• Cisco
• Cisco CRS-1 Series Carrier Routing System Craft Works Interface Configuration Applications Reference Guide
• Cisco CRS-1 Series Carrier Routing System Craft Works Interface Configuration Guide
CRS-1 Series Carrier Routing System Craft Works Interface User Interface Guide
Intended Audience
This document is intended for experienced service provider administrators, Cisco telecommunication management engineers,
and third-party field service technicians that have completed the required Cisco router training sessions.
2 About the CWI
The CWI is a client-side application used to configure and manage routers. The management and configuration features include
fault, configuration, security, and inventory, with an emphasis on speed and efficiency.
The CWI provides a context-sensitive graphical representation of the objects in a router, simplifying the process of configuring
and managing the router. The CWI allows you to log in to multiple routers and perform the following management tasks:
• View, filter, export, and search real-time inventory and interface object attribute information.
• Display a dynamic graphical representations of routers.
• Telnet/Secure Shell (SSH) to the router for command-line interaction.
• Troubleshoot management connectivity problems.
2
Page 3
The CWI provides three ways to configure and manage a router:
• Using a Telnet or SSH session launched from the CWI, which allows you to configure and manage the router using
command-line interface (CLI) commands.
• Using the Configuration Editor or Replace Configuration Editor, which allows you to view and edit the running
configuration in CLI format. The configuration editors provide common text editing functionality as well as traditional CLI
features. See the “Configuration Editor” section on page 22 and the “Replace Configuration Editor” section on page 22.
• Using the graphical configuration applications. See the “Configuration Desktop Window” section on page 20.
Support is provided to manage a two-stage commit functionality, which includes locking and rollback control.
3 Getting Started
This section provides information you need to know before you can start setting up a router and CWI client. The following
information is provided:
• Network Considerations, page 3
• Prerequisites, page 4
Network Considerations
The following network information must be taken into consideration before starting the minimum router and CWI client
configuration.
Basic Configuration
The basic configuration is not secure. See the “Setting Up the Required Management Services Without a Secure Connection”
section on page 8 for procedures.
Secure Socket Layer Encryption Configuration
The secure configuration has Secure Socket Layer (SSL) encryption. If you use the SSL protocol on your network, use the SSL
configuration. See the “Setting Up the Required Management Services with a Secure Connection” section on page 8 for
procedures.
IP Security
IP security (IPSec) does not require any special configuration for CWI on the router or client. See the “Setting Up the Required
Management Services Without a Secure Connection” section on page 8 for procedures.
Firewall
If you have a firewall in your network, you can use the basic or SSL encryption configurations. See the “Setting Up the Required
Management Services with a Secure Connection” section on page 8 and “Setting Up the Required Management Services Without
a Secure Connection” section on page 8 for procedures.
The ports listed in Table 1 must be opened when configuring the firewall. Refer to the firewall documentation for information
on opening the ports.
Table 1Firewall Ports
ComponentPortDirection
HTTP/HTTPS80/443Inbound
IIOP/IIOPSSL10001/10002Inbound
3
Page 4
Table 1Firewall Ports (continued)
ComponentPortDirection
Notifications49901 to 49950Outbound
Telnet/SSH23/22Inbound
Virtual Private Network
When setting the minimum router configuration you must use the client Virtual Private Network (VPN) IP address and Domain
Name Server (DNS) name instead of the client IP address and DNS name when configuring the IP hostname for the CWI client.
This mapping is required for the client to receive notifications from the router. See Step 3 in the “Setting the Minimum Router
Configuration” section on page 7.
If you have a VPN, you can use the basic or SSL encryption configurations. See the “Setting Up the Required Management
Services with a Secure Connection” section on page 8 and “Setting Up the Required Management Services Without a Secure
Connection” section on page 8 for procedures.
Dual-Homed
Dual-homed devices are used to bridge two networks. You can run an instance of CWI on the dual-homed device so that you
can access the secondary network. You will require terminal services or X-client software to run the CWI graphical application
from the client PC. A dual-homed device contains a client-side interface (IP address) and router-side interface (IP address). The
client-side is the primary interface, and the router-side is the secondary interface. (See Figure 1.)
Figure 1Dual-Homed Device Configuration
S
E
C
O
N
D
A
R
Y
Router
111615
Client PC
P
R
I
M
A
R
Y
Dual-homed device
When setting the minimum router configuration you must use the dual-homed device router-side (secondary) IP address and
DNS name when configuring the IP hostname for the CWI client. This mapping is required for the client to view the notifications
from the router received by the dual-home instance of CWI. See Step 3 in the “Setting the Minimum Router Configuration”
section on page 7.
If you have a dual-homed device in your network, you can use the standard or SSL encryption configurations. See the “Setting
Up the Required Management Services with a Secure Connection” section on page 8 and “Setting Up the Required Management
Services Without a Secure Connection” section on page 8 for procedures.
Prerequisites
Prerequisites ensure that the CWI client and router are correctly set up to allow them to communicate. Meeting all prerequisites
before starting any of the procedures in this guide is recommended to ensure successful communication between the CWI client
and router.
The following prerequisites are provided:
• CWI Client System Prerequisites, page 5
• Router Prerequisites, page 6
• CWI Client Prerequisites, page 6
4
Page 5
NoteThe managed router must be configured to send notifications to a specified client. These notifications include real-time
inventory updates (for example online insertion and removal [OIR]), alarms, and change of configuration events. See
the “Setting the Minimum Router Configuration” section on page 7 for information on configuring the router to send
notifications to a specified client.
CWI Client System Prerequisites
The CWI client hardware requirements ensure that the CWI client has the proper verified system requirements for the chosen
platform.
The following system requirements for a CWI client are provided in the following hardware platform tables:
• Windows-based PC (See Table 2.)
• UNIX (See Table 3.)
• Linux (See Table 4.)
Table 2Windows-Based PC Minimum System Requirements
Requirement TypeMinimum Requirements
System hardwareIBM PC-compatible 500 MHz PentiumIII minimum, 1.20 GHz Pentium IV recommended.
System softwareWindows NT, Windows 98, Windows 2000, or Windows XP.
Memory (RAM)256 MB minimum, 512 MB recommended.
Available drive spaceCWI=5MB, JRE=48MB.
Additional softwareOne of these browsers:
• Microsoft Internet Explorer 5.0 or higher.
• Netscape Navigator 4.77 or higher.
• Netscape Navigator 7.0 or higher.
Java Runtime environment (JRE) version 1.4.2.
Monitor display settingsMinimum recommended screen resolution=1024 by 768 pixels.
Table 3UNIX Minimum System Requirements
Requirement TypeMinimum Requirements
System hardwareSolaris 550 MHz minimum, 1.2GHz recommended.
Operating System Solaris 7, 8, 9 (each with a full set of required Solaris patches).
Memory (RAM)256 MB minimum, 512 MB recommended.
Available drive spaceCWI=5MB, JRE=48MB.
Additional softwareOne of these browsers:
• Netscape Navigator 4.77 or higher.
• Netscape Navigator 7.0 or higher.
JRE version 1.4.2.
Refer to the Sun website for latest minimum system requirements for the JRE on Solaris.
Monitor display settingsMinimum recommended screen resolution=1024 by 768 pixels.
5
Page 6
Table 4Linux-Based PC Minimum System Requirements
Requirement TypeMinimum Requirements
System hardwareIBM PC-compatible 500 MHz PentiumIII minimum, 1.20 GHz Pentium IV recommended.
Operating System Red Hat Linux release 7.1 (Seawolf) or any Linux operating system on which Java
Development Kit (JDK) 1.4.2 runs.
Memory (RAM)256 MB minimum, 512 MB recommended.
Available drive spaceCWI=5MB, JRE=48MB.
Additional softwareOne of these browsers:
• Netscape Navigator 4.77 or higher.
• Netscape Navigator 7.0 or higher.
JRE version 1.4.2.
Refer to the Sun website for latest minimum system requirements for the JRE on Linux.
Monitor display settingsMinimum recommended screen resolution=1024 by 768 pixels.
Router Prerequisites
The router prerequisites ensure that the router is correctly set up.
The following router prerequisites must be met before logging in to a router using the CWI:
• Ensure that the base image and Manageability pie have been installed and booted up on the router that you will be
connecting to using the CWI client. Optionally, install and boot up the Crypto pie to enable SSH and SSL functionality, and
the MPLS pie to enable a Multiprotocol Label Switching (MPLS) configuration. Refer to the Cisco CRS-1 Series Carrier Routing System Getting Started Guide for information on booting up the base image.
• Ensure that connectivity is established between the router management Ethernet interface and the CWI client. Refer to the
Cisco CRS-1 Series Carrier Routing System Getting Started Guide for information on connecting an Ethernet interface from
the CWI client to the router.
• At least one username and password must be configured on the router. A valid authentication, authorization, and
accounting (AAA) username and password for accessing the router must be configured. Refer to the Cisco CRS-1 Series Carrier Routing System Getting Started Guide for information on configuring usernames and passwords on the router.
CWI Client Prerequisites
Ensure that the CWI client is correctly set up to communicate with the router. No special configuration is required on the CWI
client.
4 Setting Up the Router and CWI Client
This section provides the procedures that must be completed, in sequence, before you can start using the CWI. The procedures
include setting the minimum router configuration that will allow the router to communicate with the CWI client, configuring
the required Management Services, and configuring the CWI client.
The following two procedures are provided:
• Setting the Minimum Router Configuration, page 7
• Setting Up the Required Management Services, page 7
Refer to the Cisco CRS-1 Series Carrier Routing System Getting Started Guide for information on the capabilities of the router,
installing IOS-XR software packages on the router, and booting up the router.
6
Page 7
Setting the Minimum Router Configuration
The minimum router configuration must be set before configuring the CWI client and required Management Services.
The “Router Information Requirements” section on page 7 provides a list of information you require to complete the procedures
in this section.
Router Information Requirements
Contact your system administrator to obtain the following information required to configure the router for use with the CWI:
• Router hostname.
• CWI client DNS name.
• CWI client IP address if the client DNS name is not registered in a DNS server accessible by the router.
NoteBefore starting the procedures in this section, you must determine if the router will be running under Secure Socket
Layer (SSL).
To set the minimum router configuration, perform the following steps:
Step 1Establish a Telnet/SSH session with the router.
Step 2Enter configuration mode.
RP/0/RP0/CPU0:router# configure terminal
Step 3Configure the IP host DNS name to IP address mapping for the CWI client.
NoteIf you are using a VPN or a dual-homed device in your network, the client IP address and DNS name are not
used when configuring the IP hostname for the CWI client. For a VPN, use the VPN IP address and DNS name.
For a network with a dual-homed device, use the dual-homed device router-side (secondary) IP address and
DNS name. See the “Network Considerations” section on page 3 for information on VPN and dual-homes
devices in a network.
When setting up the required Management Services, you have the option of communicating between the CWI client and required
Management Services using SSL (secure connection) or no SSL (nonsecure encryption).
The following two sections provide procedures for setting up the required Management Services with or without a secure
connection:
• Setting Up the Required Management Services Without a Secure Connection, page 8
• Setting Up the Required Management Services with a Secure Connection, page 8
The “Setting Up the CWI Client” section on page 10 provides information on setting up the CWI client after the required
Management Services are set up. The “Troubleshooting CWI Client Connectivity” section on page 10 provides information on
resolving connectivity problems.
7
Page 8
Setting Up the Required Management Services Without a Secure Connection
This section provides the procedures required to set up the required Management Services without SSL.
NoteThe Telnet server must be enabled before you can manage a router using certain CWI features. These features include
the Telnet application, setting character displays in the Rack View application, and viewing committed configuration
changes using the Configuration Change dialog box. Refer to Chapter 4, “Bring Up a New Cisco CRS-1 Series Router,”
in the Cisco CRS-1 Series Carrier Routing System Getting Started Guide for information on enabling the Telnet server.
NoteIf you are connecting through a firewall in your network, the ports listed in Table 1 must be open before setting up the
required Management Services. Refer to your firewall documentation for information on opening the ports. See the
“Network Considerations” section on page 3 for information on firewalls in a network.
To start the required Management Services on the router, perform the following steps:
Step 1Establish a Telnet/SSH session with the router.
Step 2Enter configuration mode.
RP/0/RP0/CPU0:router# configure terminal
Step 3Enable the HTTP server on the router.
RP/0/RP0/CPU0:router(config)# http server
Step 4Enable the XML agent on the router.
RP/0/RP0/CPU0:router(config)# xml agent corba
Step 5Exit configuration mode.
RP/0/RP0/CPU0:router(config)# commit
Setting Up the Required Management Services with a Secure Connection
This section provides the procedures required to set up the Management Services with SSL encryption. When setting up the
required Management Services and the CWI client with a secure connection, the certification authority (CA) and router
certificates must be set up before enabling the HTTP server and CORBA agent.
The following procedures are provided:
• Setting Up the Certificates, page 9
• Enabling the Secure HTTP Server and CORBA Agent, page 10
NoteThe SSH server must be enabled before you can manage a router using certain CWI features. These features include the
SSH application, setting character displays in the Rack View application, and viewing committed configuration changes
using the Configuration Change dialog box. Refer to Chapter 4, “Bring Up a New Cisco CRS-1 Series Router,” in the
Cisco CRS-1 Series Carrier Routing System Getting Started Guide for information on enabling the SSH server.
NoteIf you are connecting through a firewall in your network, the ports listed in Table 1 must be open before setting up the
required Management Services. Refer to your firewall documentation for information on opening the ports. See the
“Network Considerations” section on page 3 for information on firewalls in a network.
8
Page 9
NoteYou must have the Crypto pie installed before attempting to complete the steps in this section. See the “Router
Prerequisites” section on page 6.
Setting Up the Certificates
NoteThe CA and router certificates have to be set up only once on a router. If the certificates have been set up, proceed to
the “Enabling the Secure HTTP Server and CORBA Agent” section on page 10.
To set up the certificates, perform the following steps:
Step 1Establish a Telnet/SSH session with the router.
Step 2Generate a Rivest, Shamir, and Adelman (RSA) key pair. Accept all prompted defaults.
RP/0/RP0/CPU0:router(config)# crypto ca trustpointca-name
RP/0/RP0/CPU0:router(config-trustp)# enrollment urlca-URL
RP/0/RP0/CPU0:router(config-trustp)# rsakeypairkeypair-label (This command must be completed if a
keypair label is specified in Step 2.)
RP/0/RP0/CPU0:router(config-trustp)# exit
RP/0/RP0/CPU0:router(config)# commit
Step 6Authenticate the CA by getting the certificate for the CA.
RP/0/RP0/CPU0:router# crypto ca authenticationca-name
Step 7Obtain a router certificate from the CA.
RP/0/RP0/CPU0:router# crypto ca enrollca-name
Step 8Verify that the router was granted a certificate. This command displays information about the router certificate and the
CA certificate.
RP/0/RP0/CPU0:router# show crypto ca certificate
9
Page 10
Enabling the Secure HTTP Server and CORBA Agent
To enable the secure HTTP server and CORBA agent, perform the following steps:
Step 1Establish a Telnet/SSH session with the router.
Step 2Enter configuration mode.
RP/0/RP0/CPU0:router# configure terminal
Step 3Enable the HTTPS server on the router.
RP/0/RP0/CPU0:router(config)# http server ssl
Step 4Enable the XML agent with SSL.
RP/0/RP0/CPU0:router(config)# xml agent corba ssl
Step 5Exit configuration mode.
RP/0/RP0/CPU0:router(config)# commit
Setting Up the CWI Client
Verify that you can connect to the router by logging in to the router. See the “Starting the CWI” section on page 11 for
procedures. If you are unable to log in to the router, see the “Troubleshooting CWI Client Connectivity” section on page 10.
Troubleshooting CWI Client Connectivity
This section provides information on troubleshooting connectivity problems when attempting to log in to a router using the
CWI.
If you are unable to connect to the router HTTP server using the browser, follow these steps in sequence, exiting the test steps
when a failure is encountered.
Step 1Ping the IP address of the router management Ethernet interface from the client PC/workstation.
If this step fails, the problem can be an incorrect IP address, incorrect management Ethernet interface configuration, or
a network connectivity problem.
Step 2(Optional) Ping the DNS name or IP address of the router.
If this step fails, the problem is an incorrect hostname to IP address mapping. See Step 3 in the “Setting the Minimum
Router Configuration” section on page 7.
Step 3Check that the HTTP Server is running on the router using the following command:
RP/0/RP0/CPU0:router# show process emweb
If this step fails, start the HTTP server. See Step 3 in the “Setting Up the Required Management Services Without a
Secure Connection” section on page 8 or Step 3 in the “Setting Up the Required Management Services with a Secure
Connection” section on page 8.
If you are unable to log into the router from the CWI login screen run the Troubleshooter application at the prompt. Refer to
the Cisco CRS-1 Series Carrier Routing System Craft Works Interface User Interface Guide for information on using the
Troubleshooter application.
10
Page 11
5 Getting Started with the CWI
This section describes the procedures for establishing a connection between the CWI and a router. The procedures are described
in the following sections:
• CWI Login Information Requirements, page 11
• Starting the CWI, page 11
• Logging In to Multiple Logical Routers, page 16
• Logging Out of a Logical Router, page 17
• Closing the CWI, page 18
When starting the CWI and logging in to a router, you always log in to a single router. After you have logged in to a single router,
you can log in to and manage multiple routers, but you must log in to each one separately. Each router appears in the CWI
Desktop Inventory Tree. See the “Inventory Tree” section on page 20.
CWI Login Information Requirements
Contact your system administrator to obtain the following information required to complete the procedures in this section:
• The hostnames (DNS names) or IP addresses of any routers you want to log in to.
• Valid username and password for each router you want to log in to using the CWI. The username and password for each
router is your AAA username and password for that router. Therefore, each router may have a different username and
password.
NoteThe Telnet/SSH server must be enabled before you can manage a router using certain CWI features. These features
include the Telnet/SSH application, the Troubleshooter application, setting character displays in the Rack View
application, and viewing committed configuration changes using the Configuration Change dialog box. Refer to
Chapter 4, “Bring Up a New Cisco CRS-1 Series Router”, in the Cisco CRS-1 Series Carrier Routing System Getting Started Guide for information on enabling the Telnet/SSH server.
NoteThe managed router must be configured to send notifications to a specified client. These notifications include real-time
inventory updates (for example online insertion and removal [OIR]), alarms, and change of configuration events. See
the “Setting the Minimum Router Configuration” section on page 7 for information on configuring the router to send
notifications to a specified client.
Starting the CWI
The following two sections provide procedures for starting the CWI and logging in to a router:
• Starting the CWI When SSL Is not Enabled, page 11
• Starting the CWI When SSL Is Enabled, page 13
Starting the CWI When SSL Is not Enabled
Use this procedure to start the CWI and log in to a router when SSL is not enabled on the required Management Services. See
the “Setting Up the Required Management Services Without a Secure Connection” section on page 8.
To start the CWI when SSL is not enabled, perform the following steps.
Step 1Start a supported web browser. See the “CWI Client System Prerequisites” section on page 5 for information on web
browsers.
The web browser window appears.
11
Page 12
Step 2In the Address field located near the top of the web browser window, enter the DNS name or IP address of the router
to be accessed.
You must enter the DNS name or IP address in Address field using the following format:
Your AAA username and password must be provided for the Craft Works Interface Launcher to start. See the “Router
Prerequisites” section on page 6 for information on the AAA username and password.
a. Type your AAA username and password in the User Name and Password fields.
b. Click Yes.
Step 7If this is the first time the CWI client has started the CWI, the Java Plug-in must be installed and the CWI Cisco security
certificate must be accepted.
a. If the Java Plug-in installation is completed, a dialog box appears asking you to trust the security certificate distributed
by Cisco Systems, Inc. This dialog box will differ depending on the client platform.
b. The security certificate must be accepted to run CWI. You have the following options:
–
Click Yes to trust and accept the security certificate for this router session only. If this option is chosen, the
certificate is accepted and the login process continues. Proceed to Step 9. If you choose Yes, the security
certificate must be accepted next time you log in to the router.
–
Click No to deny the security certificate. If this option is chosen, the login process is canceled.
–
Click Always to automatically trust and accept the security certificate in this section and all subsequent CWI
sessions. If this option is chosen, the certificate is accepted and the login process continues. Proceed to Step 8.
If you choose Always, the security certificate does not have to be accepted again when logging in to a router
from the CWI client.
–
Click More Details to view the security certificate. A dialog box appears with detailed certificate information.
The certificate information includes the version, serial number, insurer, and start and end date validity of the
certificate.
The Craft Works Interface Launcher appears.
Step 8If this is the first time you have started the CWI or if you have installed a new version of the CWI, the CWI components
will start downloading. Otherwise, a cached version of the CWI components are used, reducing the CWI start time.
After the CWI component download is complete, the Start CWI, Delete Cache, and About buttons become available.
Step 9Log in to the router when the CWI - Login dialog box appears. (See Figure 2.)
NoteA valid AAA username and password for accessing the router must be configured. See the “Router
Prerequisites” section on page 6.
a. Enter a username in the User Name field. See the “CWI Login Information Requirements” section on page 11 for
information on obtaining your username.
b. Enter a password in the Password field. See the “CWI Login Information Requirements” section on page 11 for
information on obtaining your password.
c. (Optional) In the Node Name list, click the drop-down arrow and choose a node name (DNS name or IP address of the
router).
12
Page 13
d. Click Login.
Figure 2CWI - Login Dialog Box
Step 10 Observe the dynamic display that shows each initialization step and indicates whether each step is successful.
After the CWI initialization is complete, the CWI Desktop window appears. See the “CWI Overview” section on
page 18 for information on the CWI Desktop window.
NoteThe CWI is automatically locked when there is no activity in the CWI session for 15 minutes. To unlock the
CWI you must provide the username and password used when logging in to the router. Refer to the
CRS-1 Series Carrier Routing System Craft Works Interface User Interface Guide for CWI unlocking
Cisco
procedures.
If any of the minimum requirements of the initialization steps fail, a CWI dialog box appears allowing you to Abort,
Troubleshoot, or Continue the initialization process. Proceed to Step 11.
Step 11 Complete the following steps to troubleshoot the initialization process.
a. To stop the initialization process, click Abort.
b. To troubleshoot the process, click Troubleshoot. The Troubleshooter application is started, and a Troubleshoot New LR
Launch problems dialog box appears. The Troubleshooter application allows you to run fault isolation tests on the
client/server communication path between the CWI and the router management agent. The Troubleshooter application
provides a window that describes the reason for the failure, possible cause, and recommended repair action. An
automatic repair option is provided in many instances. Refer to the CiscoWorks Interface User Interface Guide for information on using the Troubleshooter feature.
c. To continue the initialization, process click Continue.
CRS-1 Series Carrier Routing System Craft
Starting the CWI When SSL Is Enabled
Use this procedure to start the CWI and log in to a router when SSL is enabled on the required Management Services. See the
“Setting Up the Required Management Services with a Secure Connection” section on page 8 for information on enabling SSL.
NoteAll steps associated with accepting a certificate are not required after the first time you have started the CWI client and
logged in to a router if you choose the certificate option Always. See the “Starting the CWI When SSL Is not Enabled”
section on page 11 for procedures to start the CWI and log in to a router for a subsequent log in.
To start the CWI when SSL is enabled, perform the following steps.
Step 1Start a supported web browser. See the “CWI Client System Prerequisites” section on page 5 for information on web
browsers.
The web browser window appears.
Step 2In the Address field located near the top of the web browser window, enter the DNS name or IP address of the router
to be accessed.
13
Page 14
You must enter the DNS name or IP address in Address field using the following format:
https://router-dns-name or https://ip-address
Step 3Press Enter.
Step 4The router SSL certificate must be accepted. You have the following options:
• Click Yes to trust and accept the SSL certificate for this router session only. If this option is chosen, the certificate
is accepted and the login process continues. Proceed to Step 5. If you choose Yes, the SSL certificate must be accepted
next time you log in to the router.
• Click No to deny the SSL certificate. If this option is chosen, the login process is canceled.
• Click Always to automatically trust and accept the SSL certificate in this session and all subsequent CWI sessions.
If this option is chosen, the certificate is accepted and the login process continues. Proceed to Step 5. If you choose
Always, the SSL certificate does not have to be accepted again when logging in to a router from the CWI client.
• Click More Details to view the SSL certificate. A dialog box appears with detailed certificate information. The
certificate information includes the version, serial number, insurer, and start and end date validity of the certificate.
Your AAA username and password must be provided for the Craft Works Interface Launcher to start. See the “Router
Prerequisites” section on page 6 for information on the AAA username and password.
a. Type your AAA username and password in the User Name and Password fields.
b. Click Yes.
Step 8If this is the first time the CWI client has started the CWI, the Java Plug-in must be installed and the CWI Cisco security
certificate must be accepted.
a. If the Java Plug-in installation is completed, a dialog box appears asking you to trust the security certificate distributed
by Cisco Systems, Inc.
b. The security certificate must be accepted to run CWI. You have the following options:
–
Click Yes to trust and accept the security certificate for this router session only. If this option is chosen, the
certificate is accepted and the login process continues. Proceed to Step 9. If you choose Yes, the security
certificate must be accepted next time you log in to the router.
–
Click No to deny the security certificate. If this option is chosen, the login process is canceled.
–
Click Always to automatically trust and accept the security certificate in this section and all subsequent CWI
sessions. If this option is chosen, the certificate is accepted and the login process continues. Proceed to Step 9.
If you choose Always, the security certificate does not have to be accepted again when logging in to a router
from the CWI client.
–
Click More Details to view the security certificate. A dialog box appears with detailed certificate information.
The certificate information includes the version, serial number, insurer, and start and end date validity of the
certificate.
Step 9The router SSL certificate must be accepted. You have the following options:
• Click Yes to trust and accept the SSL certificate for this router session only. If this option is chosen, the certificate
is accepted and the login process continues. Proceed to Step 10. If you choose Yes, the SSL certificate must be
accepted next time you log in to the router.
• Click No to deny the SSL certificate. If this option is chosen, the login process is canceled.
14
Page 15
• Click Always to automatically trust and accept the SSL certificate in this session and all subsequent CWI sessions.
If this option is chosen, the certificate is accepted and the login process continues. Proceed to Step 10. If you choose
Always, the SSL certificate does not have to be accepted again when logging in to a router from the CWI client.
• Click More Details to view the SSL certificate. A dialog box appears with detailed certificate information. The
certificate information includes the version, serial number, insurer, and start and end date validity of the certificate.
The Craft Works Interface Launcher appears.
Step 10 If this is the first time you have started the CWI or if you have installed a new version of the CWI, the CWI components
will start downloading. Otherwise, a cached version of the CWI components are used, reducing the CWI start time.
After the CWI component download is complete, the Start CWI, Delete Cache, and About buttons become available.
Step 11 Log in to the router when the CWI - Login dialog box appears. (See Figure 3.)
NoteA valid AAA username and password for accessing the router must be configured. See the “Router
Prerequisites” section on page 6.
a. Enter a username in the User Name field. See the “CWI Login Information Requirements” section on page 11 for
information on obtaining your username.
b. Enter a password in the Password field. See the “CWI Login Information Requirements” section on page 11 for
information on obtaining your password.
c. (Optional) In the Node Name list, click the drop-down arrow and choose a node name (DNS name or IP address of the
router).
d. Click Login.
Figure 3CWI - Login Dialog Box
Step 12 If you did not choose Always in Step 9, you must accept the SSL certificate. You have the following options:
• Click Yes to trust and accept the SSL certificate for this router session only. If this option is chosen, the certificate
is accepted and the login process continues. Proceed to Step 13. If you choose Yes, the SSL certificate must be
accepted next time you log in to the router.
• Click No to deny the SSL certificate. If this option is chosen, the login process is canceled.
• Click Always to automatically trust and accept the SSL certificate in this session and all subsequent CWI sessions.
If this option is chosen, the certificate is accepted and the login process continues. Proceed to Step 13. If you choose
Always, the SSL certificate does not have to be accepted again when logging in to a router from the CWI client.
• Click More Details to view the SSL certificate. A dialog box appears with detailed certificate information. The
certificate information includes the version, serial number, insurer, and start and end date validity of the certificate.
The Initializing CWI dialog box appears.
Step 13 Observe the dynamic display that shows each initialization step and indicates whether each step is successful.
Once the CWI initialization is complete, the CWI Desktop window appears. See the “CWI Overview” section on
page 18 for information on the CWI Desktop window.
15
Page 16
NoteThe CWI is automatically locked when there is no activity in the CWI session for 15 minutes. To unlock the
CWI you must provide the username and password used when logging in to the router. Refer to the
Cisco CRS-1 Series Carrier Routing System Craft Works Interface User Interface Guide for CWI unlocking
procedures.
If any of the minimum requirements of the initialization steps fail, a CWI dialog box appears allowing you to Abort,
Troubleshoot, or Continue the initialization process. Proceed to Step 14.
Step 14 Complete the following steps to troubleshoot the initialization process.
a. To stop the initialization process, click Abort.
b. To troubleshoot the process, click Troubleshoot. The Troubleshooter application is started, and a Troubleshoot New LR
Launch problems dialog box appears. The Troubleshooter application allows you to run fault isolation tests on the
client/server communication path between the CWI and the router management agent. The Troubleshooter application
provides a window that describes the reason for the failure, possible cause, and recommended repair action. An
automatic repair option is provided in many instances. Refer to the CiscoCraft Works Interface User Interface Guide for information on using the Troubleshooter feature.
c. To continue the initialization process, click Continue.
CRS-1 Series Carrier Routing System
Logging In to Multiple Logical Routers
The CWI can manage multiple routers. You can log in to multiple routers when the CWI Desktop is open and currently logged
in to at least one router.
To log in to a router from the CWI Desktop, perform the following steps:
Step 1From the File menu, choose Login.
The CWI - Login dialog box appears. (See Figure 4.)
Figure 4CWI - Login Dialog Box
Step 2In the User Name field, enter a valid username. See the “CWI Login Information Requirements” section on page 11 for
information on obtaining your username.
Step 3In the Password field, enter a valid password. See the “CWI Login Information Requirements” section on page 11 for
information on obtaining your password.
NoteA valid AAA username and password for accessing the router must be configured. See the “Router
Prerequisites” section on page 6.
Step 4In the Node Name field, enter a valid node name (DNS name or IP address of the router) or click the drop-down arrow
and choose a valid node name.
Step 5Click Login.
16
Page 17
Step 6If this is the first time the router has started from the CWI client and the required Management Services are running
SSL, a certificate dialog box appears. The Cisco security certificate must be accepted to log in to the router. You have
the following options:
a. Click Yes to trust and accept the security certificate for this router session only. If this option is chosen, the certificate is
accepted and the login process continues. If you choose Yes, the security certificate must be accepted next time you
log in to the router.
b. Click No to deny the security certificate. If this option is chosen, the login process is canceled.
c. Click Always to automatically trust and accept the security certificate in this section and all subsequent sessions with
this specific router from the CWI client. If this option is chosen, the certificate is accepted and the login process
continues. If you choose Always, the security certificate does not have to be accepted again when logging in to a
router from the CWI client.
d. Click More Details to view the security certificate. A dialog box appears with detailed certificate information. The
certificate information includes the version, serial number, insurer, and start and end date validity of the certificate.
The Initializing CWI dialog box appears.
After the router initialization is successfully completed, a new router appears in the Inventory Tree in the CWI Desktop.
See the “Inventory Tree” section on page 20 for information on the Inventory Tree.
Logging Out of a Logical Router
You can log out of a router when there is more than one router open in the CWI Desktop.
To log out of a router, perform the following steps:
Step 1Choose a router in the Inventory Tree.
Step 2From the File menu, choose Logout.
A Logout dialog box appears. (See Figure 5.)
Figure 5Logout Dialog Box
Step 3From the NE Name list, choose a router.
Step 4Click OK.
A second Logout dialog box appears to confirm that you want to log out of the router. (See Figure 6.)
Figure 6Logout Dialog Box
Step 5Click Yes .
All applications opened from the selected router are closed, the session with the router is ended, and the router
disappears from the Inventory Tree. See the “Inventory Tree” section on page 20 for information on the Inventory Tree.
17
Page 18
Closing the CWI
To close the CWI, perform the following steps:
Step 1From the File menu, choose Exit or click Close on the CWI Desktop title bar.
A Craft Works Interface dialog box appears.
Step 2Click Yes to exit the application.
The CWI Desktop window closes. The Configuration Desktop is also closed (if it was open when the close command
was executed).
6 CWI Overview
The CWI is an application used to manage Cisco routers. CWI provides the following features:
• A user-friendly context-sensitive interface that is used for fault, configuration, inventory, and security management of a
router.
• A combination of both graphical and text-based interfaces that allow the user to select the best interface for the task at hand.
• A powerful CWI feature set used to simplify managing the router scale and complexity.
• Access to the powerful manageability features of the router.
The CWI provides three ways to configure and manage a router:
• Using a Telnet/SSH session launched from the CWI, which allows you to configure and manage the router using CLI
commands.
• Using the Configuration Editor or Replace Configuration Editor, which allows you to view and edit the running
configuration in CLI format. These editors provide common text editing functionality as well as traditional CLI features
such as help and command-completion. See the “Configuration Editor” section on page 22 and the “Replace Configuration
Editor” section on page 22.
• Using the graphical configuration applications. See the “Configuration Desktop Window” section on page 20.
7 CWI Desktop Window
The CWI Desktop is the main point of access to all CWI applications and tools, allowing you to configure, monitor, and manage
routers. (See Figure 7.)
Common Elements in the CWI Desktop
The CWI Desktop is designed with common elements that provide an easy to use and consistent user interface.
The following features are common among the CWI applications:
• Printing, exporting, and searching data.
• Sorting and moving columns.
• Filtering records.
• Setting preferences.
• Cascading applications.
• Minimizing and maximizing applications.
• Maximizing applications.
• Choosing applications in the Application pane.
Refer to the Cisco
elements and procedures for common activities in the CWI Desktop.
18
CRS-1 Series Carrier Routing System Craft Works Interface User Interface Guide for details on common
Page 19
Figure 7CWI Desktop
The CWI Desktop allows you to communicate with the router using the following applications:
• Alarm Viewer—Provides an interface between the CWI and the alarm management functions of the router controller,
allowing you to dynamically view alarm records with powerful filtering capabilities. The Alarm Viewer also provides a
launch point to view correlated alarms.
• Inventory Viewer—Displays the attribute values of selected objects.
• Rack View—Displays a graphical representation of the physical equipment including racks, cards, slots, power supplies,
and fan trays. The router can be viewed from the front or the back. The Rack View displays active alarms on the associated
object and provides context-sensitive launch points for other CWI applications in the same way as the Inventory Tree. The
card character displays are user configurable and are displayed on the card faceplate.
• Interface Quick Viewer—Provides a view of interface attributes for selected cards.
• Configuration Desktop—Provides an interface tailored to managing configuration applications.
• Telnet/SSH—Provides the capability to issue CLI commands and view session information within the CWI. Telnet/SSH
includes additional CWI features for creating command lists and executing commands from the command list, saving and
loading command lists from a file, and running in batch mode. Additionally, console text can be displayed in a separate
window. The SSH application allows you to connect to the router with a secure connection.
• Troubleshooter—Provides fault isolation and repair of connectivity problems between the CWI and router.
19
Page 20
Menu Bar
The CWI Desktop menu bar provides a list of options available on the basis of the selected object and active application. The
options include administrative, editing, and viewing tasks, starting applications, and arranging windows.
Toolbar
The CWI Desktop toolbar contains icons, referred to as tools, that provide direct access to context-sensitive functions. Clicking
a tool selects a task.
Inventory Tree
The Inventory Tree displays all components of each router that the CWI can access and is the primary interface to these
components. The Inventory Tree dynamically shows current alarms and events, connectivity status, and physical and logical tree
views. The Inventory Tree provides context-sensitive launching of applications by selecting an object, a group of objects, or an
entire router in the Inventory Tree and then choosing an available application.
CWI Status Bar
The CWI status bar contains three icons that show the status of the CWI including communication security and NE connectivity
and allows you to open the Alarm Dashboard. The left side of the status bar may contain a progress message.
Dashboard
The Dashboard provides a summary of the alarm status information for all routers in the CWI Desktop. Color coding is used
to indicate active alarm counts by severity. A resettable running count of new alarm arrivals is provided.
CWI Application Pane
The CWI Application pane is the area of the CWI Desktop that contains the active CWI applications used to manage the router.
Multiple applications can be open concurrently in the CWI Application pane.
8 Configuration Desktop Window
The Configuration Desktop is the main point of access to all configuration applications. (See Figure 8.) These applications allow
you to configure and manage routers within your network.
The Configuration Desktop is opened for one router chosen in the CWI Desktop. If there are multiple routers in the
CWI Desktop, you can open one Configuration Desktop for each router.
There are four ways to configure a router using the CWI:
• Telnet/SSH application from the CWI Desktop.
• Configuration Editor from the Configuration Desktop.
• Replace Configuration Editor from the Configuration Desktop.
• Graphical user interface (GUI) applications from the Configuration Desktop.
The Configuration Applications Tree uses icons for each configuration application to dynamically display the state of each
application. The icon states include the unchanged, not permitted, incompatible version, uncommitted, and disabled.
The Configuration Desktop allows you to view the configuration changes made using the configuration applications or the
Configuration Editor using the Show Uncommitted Config tool. The tool is launched by right-clicking the Configuration
Applications icon in the Configuration Applications Tree. The uncommitted configuration (also known as the target
configuration) is displayed in a window in CLI format.
20
Page 21
A Launch Context Pane shows the components available to be configured (the launch point from the CWI Desktop).
The Configuration Desktop toolbar contains tools representing commonly used tasks in the Configuration Desktop. The toolbar
provides quick access to common tasks used in all the configuration applications, allows you to open the Configuration Editor
and Replace Configuration Editor, and control the committing of a target configuration to the running configuration.
A two-stage running configuration commit functionality, which includes locking, abort, commit, and rollback control, is
provided in the Configuration Desktop.
Refer to the Cisco
the Configuration Desktop.
Figure 8Configuration Desktop
CRS-1 Series Carrier Routing System Craft Works Interface User Interface Guide for detailed information on
Common Elements in the Configuration Desktop
The graphical configuration applications launched from the Configuration Desktop include a common feature set. These
features include bulk configuration and validation. The bulk configuration features provide “templating without templates.”
These features include the capability to take an existing configured object and utilize user selected attributes as a template for
configuring one or more additional objects. Other common features include:
• Cloning the selected attributes of a record to create new records containing the attributes of the original record. In addition,
you can apply an algorithm that generates values of selected key fields.
• Copying and pasting one or more selected attributes from one record to one or more records.
• Editing a single attribute across multiple rows in a table with a single operation.
21
Page 22
• Client-side field validation.
• Client- and server-side error checking.
• Resequencing records.
The Configuration Desktop provides the following GUI applications:
• Administration Configuration: AAA, Alarm Administration, and User Administration.
• Applications Configuration: IEP and MPLS-TE.
• Interfaces Configuration: Common, Ethernet, and POS.
• Controllers Configuration: SONET.
• Policy Configuration: Access Control Lists, Packet Filter, QoS, and Routing Policy.
• Protocols Configuration: BGP, ISIS, LDP, OSPF, and RVSP.
You can concurrently access multiple applications within the Configuration Desktop.
Configuration Editor
The Configuration Editor application is available in the Configuration Desktop and displays the target configuration in CLI
format.
The Configuration Editor provides general text editor functions such as copy, paste, redo, and undo, and provides syntax
checking and CLI functions such as command completion and CLI help.
Replace Configuration Editor
The Replace Configuration Editor application is available in the Configuration Desktop and allows you to replace the running
configuration on the router with the contents of the Replace Configuration Editor window.
The Replace Configuration Editor provides general text editor functions such as copy, paste, redo, and undo, and provides
syntax checking and CLI functions such as command completion and CLI help.
9 Obtaining Documentation
Cisco documentation and additional literature are available on Cisco.com. Cisco also provides several ways to obtain technical
assistance and other technical resources. These sections explain how to obtain technical information from Cisco Systems.
Cisco.com
You can access the most current Cisco documentation at this URL:
http://www.cisco.com/univercd/home/home.htm
You can access the Cisco website at this URL:
http://www.cisco.com
You can access international Cisco websites at this URL:
You can send comments about technical documentation to bug-doc@cisco.com.
You can submit comments by using the response card (if present) behind the front cover of your document or by writing to the
following address:
Cisco Systems
Attn: Customer Document Ordering
170 West Tasman Drive
San Jose, CA 95134-9883
We appreciate your comments.
11 Obtaining Technical Assistance
For all customers, partners, resellers, and distributors who hold valid Cisco service contracts, Cisco Technical Support provides
24-hour-a-day, award-winning technical assistance. The Cisco Technical Support Website on Cisco.com features extensive
online support resources. In addition, Cisco Technical Assistance Center (TAC) engineers provide telephone support. If you do
not hold a valid Cisco service contract, contact your reseller.
Cisco Technical Support Website
The Cisco Technical Support Website provides online documents and tools for troubleshooting and resolving technical issues
with Cisco products and technologies. The website is available 24 hours a day, 365 days a year at this URL:
http://www.cisco.com/techsupport
Access to all tools on the Cisco Technical Support Website requires a Cisco.com user ID and password. If you have a valid service
contract but do not have a user ID or password, you can register at this URL:
http://tools.cisco.com/RPF/register/register.do
Submitting a Service Request
Using the online TAC Service Request Tool is the fastest way to open S3 and S4 service requests. (S3 and S4 service requests are
those in which your network is minimally impaired or for which you require product information.) After you describe your
situation, the TAC Service Request Tool automatically provides recommended solutions. If your issue is not resolved using the
recommended resources, your service request will be assigned to a Cisco TAC engineer. The TAC Service Request Tool is located
at this URL:
http://www.cisco.com/techsupport/servicerequest
For S1 or S2 service requests or if you do not have Internet access, contact the Cisco TAC by telephone. (S1 or S2 service requests
are those in which your production network is down or severely degraded.) Cisco TAC engineers are assigned immediately to
S1 and S2 service requests to help keep your business operations running smoothly.
To open a service request by telephone, use one of the following numbers:
For a complete list of Cisco TAC contacts, go to this URL:
http://www.cisco.com/techsupport/contacts
23
Page 24
Definitions of Service Request Severity
To ensure that all service requests are reported in a standard format, Cisco has established severity definitions.
Severity 1 (S1)—Your network is “down,” or there is a critical impact to your business operations. You and Cisco will commit
all necessary resources around the clock to resolve the situation.
Severity 2 (S2)—Operation of an existing network is severely degraded, or significant aspects of your business operation are
negatively affected by inadequate performance of Cisco products. You and Cisco will commit full-time resources during normal
business hours to resolve the situation.
Severity 3 (S3)—Operational performance of your network is impaired, but most business operations remain functional. You
and Cisco will commit resources during normal business hours to restore service to satisfactory levels.
Severity 4 (S4)—You require information or assistance with Cisco product capabilities, installation, or configuration. There is
little or no effect on your business operations.
12 Obtaining Additional Publications and Information
Information about Cisco products, technologies, and network solutions is available from various online and printed sources.
• Cisco Marketplace provides a variety of Cisco books, reference guides, and logo merchandise. Visit Cisco Marketplace, the
company store, at this URL:
http://www.cisco.com/go/marketplace/
• The Cisco Product Catalog describes the networking products offered by Cisco Systems, as well as ordering and customer
support services. Access the Cisco Product Catalog at this URL:
http://cisco.com/univercd/cc/td/doc/pcat/
• Cisco Press publishes a wide range of general networking, training and certification titles. Both new and experienced users
will benefit from these publications. For current Cisco Press titles and other information, go to Cisco Press at this URL:
http://www.ciscopress.com
• Packet magazine is the Cisco Systems technical user magazine for maximizing Internet and networking investments. Each
quarter, Packet delivers coverage of the latest industry trends, technology breakthroughs, and Cisco products and solutions,
as well as network deployment and troubleshooting tips, configuration examples, customer case studies, certification and
training information, and links to scores of in-depth online resources. You can access Packet magazine at this URL:
http://www.cisco.com/packet
• iQ Magazine is the quarterly publication from Cisco Systems designed to help growing companies learn how they can use
technology to increase revenue, streamline their business, and expand services. The publication identifies the challenges
facing these companies and the technologies to help solve them, using real-world case studies and business strategies to help
readers make sound technology investment decisions. You can access iQ Magazine at this URL:
http://www.cisco.com/go/iqmagazine
• Internet Protocol Journal is a quarterly journal published by Cisco Systems for engineering professionals involved in
designing, developing, and operating public and private internets and intranets. You can access the Internet Protocol Journal
at this URL:
http://www.cisco.com/ipj
• World-class networking training is available from Cisco. You can view current offerings at this URL:
http://www.cisco.com/en/US/learning/index.html
24
Page 25
25
Page 26
Corporate Headquarters
r,
,
t
e
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 526-4100
European Headquarters
Cisco Systems International BV
Haarlerbergpark
Haarlerbergweg 13-19
1101 CH Amsterdam
The Netherlands
www-europe.cisco.com
Tel: 31 0 20 357 1000
Fax: 31 0 20 357 1100
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
www.cisco.com
Tel: 408 526-7660
Fax: 408 527-0883
Asia Pacific Headquarters
Cisco Systems, Inc.
168 Robinson Road
#28-01 Capital Tower
Singapore 068912
www.cisco.com
Tel: +65 6317 7777
Fax: +65 6317 7799
Cisco Systems has more than 200 offices in the following countries. Addresses, phone numbers, and fax numbers are listed on the
Cisco Web site at www.cisco.com/go/offices
Argentina • Australia • Austria • Belgium • Brazil • Bulgaria • Canada • Chile • China PRC • Colombia • Costa Rica • Croatia • Cyprus • Czech Republic • Denmark
Dubai, UAE • Finland • France • Germany • Greece • Hong Kong SAR • Hungary • India • Indonesia • Ireland • Israel • Italy • Japan • Korea • Luxembourg • Malaysia
Mexico • The Netherlands • New Zealand • Norway • Peru • Philippines • Poland • Portugal • Puerto Rico • Romania • Russia • Saudi Arabia • Scotland • Singapore
Slovakia • Slovenia • South Africa • Spain • Sweden • Switzerland • Taiwan • Thailand • Turkey • Ukraine • United Kingdom • United States • Venezuela • Vietnam
Zimbabwe
CCVP, the Cisco Logo, and the Cisco Square Bridge logo are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn is a service mark of Cisco Systems, Inc.; and Access Registra
Aironet, BPX, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo
Cisco Unity, Enterprise/Solver, EtherChannel, EtherFast, EtherSwitch, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, IP/TV, iQ Expertise, the iQ logo, iQ Ne
Readiness Scorecard, iQuick Study, LightStream, Linksys, MeetingPlace, MGX, Networking Academy, Network Registrar, Packet, PIX, ProConnect, RateMUX, ScriptShare, SlideCast, SMARTnet, StackWise, Th
Fastest Way to Increase Your Internet Quotient, and TransPath are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company.
(0704R)
Printed in the USA on recycled paper containing 10% postconsumer waste.
OL-6512-01
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.