Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 526-4100
Text Part Number: OL-9351-01
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL
STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT
WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT
SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE
OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH
ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT
LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
CCSP, CCVP, the Cisco Square Bridge logo, Follow Me Browsing, and StackWise are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn, and
iQuick Study are service marks of Cisco Systems, Inc.; and Access Registrar, Aironet, BPX, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, Cisco, the Cisco Certified
Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Enterprise/Solver, EtherChannel, EtherFast,
EtherSwitch, Fast Step, FormShare, GigaDrive, GigaStack, HomeLink, Internet Quotient, IOS, IP/TV, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, LightStream,
Linksys, MeetingPlace, MGX, the Networkers logo, Networking Academy, Network Registrar, Pac ke t , PIX, Post-Routing, Pre-Routing, ProConnect, RateMUX, ScriptShare,
SlideCast, SMARTnet, The Fastest Way to Increase Your Internet Quotient, and TransPath are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States
and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a partnership relationship
between Cisco and any other company. (0601R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the
document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.
Cisco Technical Support & Documentation Websitexii
Submitting a Service Requestxii
Definitions of Service Request Severityxii
CONTENTS
CHAPTER
Obtaining Additional Publications and Informationxiii
1Using Cisco Unified Service Monitor1-1
Getting Started with Service Monitor1-1
Starting Service Monitor1-2
Setting Up Service Monitor1-3
Copying Image and Configuration Files to the TFTP Server1-4
Managing Cisco 1040s1-5
Understanding the Cisco 1040 Sensor Details Page1-6
Viewing Details for a Specific Cisco 10401-7
Registering Cisco 1040s to Service Monitors1-8
Understanding Automatic Registration and Configuration Files1-8
Configuring Service Monitors and Cisco 1040s when Multiple TFTP Servers Are in Use1-9
Adding a Cisco 1040 (Manual Registration)1-9
Editing the Configuration for a Specific Cisco 10401-11
Editing the Default Configuration (Automatic Registration)1-12
Understanding Cisco 1040 Failover to a Secondary or Tertiary Service Monitor1-13
Resetting a Cisco 10401-13
Setting the Time on Cisco 1040s1-14
OL-9351-01
User Guide for Cisco Unified Service Monitor
iii
Contents
Updating Image Files on Cisco 1040s1-14
Moving a Cisco 10401-15
Deleting a Cisco 10401-15
Using the Cisco 1040 Web Interface1-15
Viewing the Configuration File on the TFTP Server1-16
Archiving Cisco 1040 Call Metrics1-16
Generating a Cisco 1040 Unreachable Trap1-17
CHAPTER
2Data Management and System Administration2-1
Managing Service Monitor Data2-1
Backing Up and Restoring the Service Monitor Database2-1
Starting a Database Backup2-2
Restoring the Database2-2
Changing the Password for the Service Monitor Database2-3
Managing Log Files2-3
Understanding Service Monitor Syslog Handling2-3
Maintaining the History Log File2-4
Managing Log Files and Enabling and Disabling Debugging2-4
Configuring Users (ACS and Non-ACS)2-5
Configuring Users Using Non-ACS Mode (CiscoWorks Local Login Module)2-5
Configuring Users Using ACS Mode2-6
Using Service Monitor in ACS Mode2-6
Modifying Roles and Privileges in Cisco Secure ACS2-7
Starting and Stopping Service Monitor Processes2-8
Using SNMP to Monitor Service Monitor2-8
Configuring Your System for SNMP Queries2-8
Determining the Status of Windows SNMP Service2-9
Installing and Uninstalling Windows SNMP Service2-9
Enabling and Disabling Windows SNMP Service2-9
Configuring Security for SNMP Queries2-10
Viewing the System Application MIB Log File2-10
iv
Changing the Hostname on the Service Monitor Server2-10
Changing the Hostname, Rebooting the Server, and Regenerating the Certificate2-10
Reconfiguring Service Monitor after a Hostname Change2-12
Changing the IP Address on the Service Monitor Server2-13
User Guide for Cisco Unified Service Monitor
OL-9351-01
Contents
APPENDIX
APPENDIX
APPENDIX
AMIBs Used and SNMP Traps GeneratedA-1
BLicensingB-1
Licensing OverviewB-1
Verifying Service Monitor License StatusB-1
Licensing ScenariosB-2
Licensing ProcessB-3
Obtaining a PAKB-3
Obtaining a License FileB-3
Registering a License FileB-3
Licensing RemindersB-4
Evaluation Version: Before ExpiryB-4
License Size ExceededB-4
CService Monitor Support for SNMP MIBsC-1
System Application MIB ImplementationC-1
System Application Resource MIB TablesC-1
Installed PackagesC-2
Installed ElementsC-2
Package Status InformationC-3
Element Status InformationC-4
Status of Packages When They Ran PreviouslyC-5
Status of Elements When They Ran PreviouslyC-5
Scalar VariablesC-6
Process MapC-7
Sample MIB Walk for System Application MIBC-8
APPENDIX
I
NDEX
OL-9351-01
DConfiguring Service Monitor with Cisco Secure ACSD-1
Before You Begin: Integration NotesD-1
Configuring Service Monitor on Cisco Secure ACSD-3
Verifying the Service Monitor and Cisco Secure ACS ConfigurationD-3
User Guide for Cisco Unified Service Monitor
v
Contents
vi
User Guide for Cisco Unified Service Monitor
OL-9351-01
Audience
Preface
This manual describes Cisco Unified Service Monitor (Service Monitor) and provides instructions for
using and administering it.
The audience for this document includes:
• IP communications and IP telephony management personnel.
Conventions
This document uses the following conventions:
• Administrative personnel monitoring the overall service levels of their organization.
• Network engineering personnel who evaluate and design IP network infrastructures.
ItemConvention
Commands and keywordsboldface font
Variables for which you supply valuesitalic font
Displayed session and system information
Information you enter
Variables you enter
Menu items and button namesboldface font
Selecting a menu item in paragraphsOption> Network Preferences
Selecting a menu item in tablesOption > Network Preferences
screen font
boldface screen font
italic screen font
OL-9351-01
NoteMeans reader take note. Notes contain helpful suggestions or references to material not covered in the
publication.
User Guide for Cisco Unified Service Monitor
vii
Product Documentation
CautionMeans reader be careful. In this situation, you might do something that could result in equipment
damage or loss of data.
Product Documentation
NoteWe sometimes update the printed and electronic documentation after original publication. Therefore,
you should also review the documentation on Cisco.com for any updates.
Table 1 describes the product documentation that is available.
Table 1Product Documentation
Document TitleAvailable Formats
Release Notes for Cisco Unified
Service Monitor Release 1.1
Quick Start Guide for Cisco
Unified Service Monitor 1.1
User Guide for Cisco Unified
Service Monitor
Context-sensitive online help
• Printed document that was included with the product.
• Printed document available by order (part number DOC-7817182=)
1. See “Obtaining Documentation”.
Obtaining Documentation
1
1
Obtaining Documentation
Cisco documentation and additional literature are available on Cisco.com. Cisco also provides several
ways to obtain technical assistance and other technical resources. These sections explain how to obtain
technical information from Cisco Systems.
Cisco.com
You can access the most current Cisco documentation at this URL:
http://www.cisco.com/techsupport
You can access the Cisco website at this URL:
http://www.cisco.com
You can access international Cisco websites at this URL:
The Product Documentation DVD is a comprehensive library of technical product documentation on a
portable medium. The DVD enables you to access multiple versions of installation, configuration, and
command guides for Cisco hardware and software products. With the DVD, you have access to the same
HTML documentation that is found on the Cisco website without being connected to the Internet.
Certain products also have .PDF versions of the documentation available.
The Product Documentation DVD is available as a single unit or as a subscription. Registered Cisco.com
users (Cisco direct customers) can order a Product Documentation DVD (product number
DOC-DOCDVD= or DOC-DOCDVD=SUB) from Cisco Marketplace at this URL:
http://www.cisco.com/go/marketplace/
Ordering Documentation
Registered Cisco.com users may order Cisco documentation at the Product Documentation Store in the
Cisco Marketplace at this URL:
http://www.cisco.com/go/marketplace/
Preface
Nonregistered Cisco.com users can order technical documentation from 8:00 a.m. to 5:00 p.m.
(0800 to 1700) PDT by calling 1 866 463-3487 in the United States and Canada, or elsewhere by
calling 011 408 519-5055. You can also order documentation by e-mail at
tech-doc-store-mkpl@external.cisco.com or by fax at 1 408 519-5001 in the United States and Canada,
or elsewhere at 011 408 519-5001.
Documentation Feedback
You can rate and provide feedback about Cisco technical documents by completing the online feedback
form that appears with the technical documents on Cisco.com.
You can submit comments about Cisco documentation by using the response card (if present) behind the
front cover of your document or by writing to the following address:
Cisco Systems
Attn: Customer Document Ordering
170 West Tasman Drive
San Jose, CA 95134-9883
We appreciate your comments.
Cisco Product Security Overview
Cisco provides a free online Security Vulnerability Policy portal at this URL:
From this site, you will find information about how to:
• Report security vulnerabilities in Cisco products.
• Obtain assistance with security incidents that involve Cisco products.
• Register to receive security information from Cisco.
User Guide for Cisco Unified Service Monitor
x
OL-9351-01
Preface
A current list of security advisories, security notices, and security responses for Cisco products is
available at this URL:
http://www.cisco.com/go/psirt
To see security advisories, security notices, and security responses as they are updated in real time, you
can subscribe to the Product Security Incident Response Team Really Simple Syndication (PSIRT RSS)
feed. Information about how to subscribe to the PSIRT RSS feed is found at this URL:
Cisco is committed to delivering secure products. We test our products internally before we release them,
and we strive to correct all vulnerabilities quickly. If you think that you have identified a vulnerability
in a Cisco product, contact PSIRT:
• For Emergencies only— security-alert@cisco.com
An emergency is either a condition in which a system is under active attack or a condition for which
a severe and urgent security vulnerability should be reported. All other conditions are considered
nonemergencies.
• For Nonemergencies— psirt@cisco.com
In an emergency, you can also reach PSIRT by telephone:
Obtaining Technical Assistance
• 1 877 228-7302
• 1 408 525-6532
TipWe encourage you to use Pretty Good Privacy (PGP) or a compatible product (for example, GnuPG) to
encrypt any sensitive information that you send to Cisco. PSIRT can work with information that has been
encrypted with PGP versions 2.x through 9.x.
Never use a revoked or an expired encryption key. The correct public key to use in your correspondence
with PSIRT is the one linked in the Contact Summary section of the Security Vulnerability Policy page
at this URL:
The link on this page has the current PGP key ID in use.
If you do not have or use PGP, contact PSIRT at the aforementioned e-mail addresses or phone numbers
before sending any sensitive material to find other means of encrypting the data.
Obtaining Technical Assistance
Cisco Technical Support provides 24-hour-a-day award-winning technical assistance. The Cisco
Technical Support & Documentation website on Cisco.com features extensive online support resources.
In addition, if you have a valid Cisco service contract, Cisco Technical Assistance Center (TAC)
engineers provide telephone support. If you do not have a valid Cisco service contract, contact your
reseller.
OL-9351-01
User Guide for Cisco Unified Service Monitor
xi
Obtaining Technical Assistance
Cisco Technical Support & Documentation Website
The Cisco Technical Support & Documentation website provides online documents and tools for
troubleshooting and resolving technical issues with Cisco products and technologies. The website is
available 24 hours a day, at this URL:
http://www.cisco.com/techsupport
Access to all tools on the Cisco Technical Support & Documentation website requires a Cisco.com user
ID and password. If you have a valid service contract but do not have a user ID or password, you can
register at this URL:
http://tools.cisco.com/RPF/register/register.do
NoteUse the Cisco Product Identification (CPI) tool to locate your product serial number before submitting
a web or phone request for service. You can access the CPI tool from the Cisco Technical Support &
Documentation website by clicking the Tools & Resources link under Documentation & Tools.Choose
Cisco Product Identification Tool from the Alphabetical Index drop-down list, or click the Cisco
Product Identification Tool link under Alerts & RMAs. The CPI tool offers three search options: by
product ID or model name; by tree view; or for certain products, by copying and pasting show command
output. Search results show an illustration of your product with the serial number label location
highlighted. Locate the serial number label on your product and record the information before placing a
service call.
Preface
Submitting a Service Request
Using the online TAC Service Request Tool is the fastest way to open S3 and S4 service requests. (S3
and S4 service requests are those in which your network is minimally impaired or for which you require
product information.) After you describe your situation, the TAC Service Request Tool provides
recommended solutions. If your issue is not resolved using the recommended resources, your service
request is assigned to a Cisco engineer. The TAC Service Request Tool is located at this URL:
http://www.cisco.com/techsupport/servicerequest
For S1 or S2 service requests, or if you do not have Internet access, contact the Cisco TAC by telephone.
(S1 or S2 service requests are those in which your production network is down or severely degraded.)
Cisco engineers are assigned immediately to S1 and S2 service requests to help keep your business
operations running smoothly.
To open a service request by telephone, use one of the following numbers:
For a complete list of Cisco TAC contacts, go to this URL:
http://www.cisco.com/techsupport/contacts
Definitions of Service Request Severity
xii
To ensure that all service requests are reported in a standard format, Cisco has established severity
definitions.
User Guide for Cisco Unified Service Monitor
OL-9351-01
Preface
Obtaining Additional Publications and Information
Severity 1 (S1)—An existing network is down, or there is a critical impact to your business operations.
You and Cisco will commit all necessary resources around the clock to resolve the situation.
Severity 2 (S2)—Operation of an existing network is severely degraded, or significant aspects of your
business operations are negatively affected by inadequate performance of Cisco products. You and Cisco
will commit full-time resources during normal business hours to resolve the situation.
Severity 3 (S3)—Operational performance of the network is impaired, while most business operations
remain functional. You and Cisco will commit resources during normal business hours to restore service
to satisfactory levels.
Severity 4 (S4)—You require information or assistance with Cisco product capabilities, installation, or
configuration. There is little or no effect on your business operations.
Obtaining Additional Publications and Information
Information about Cisco products, technologies, and network solutions is available from various online
and printed sources.
• The Cisco Product Quick Reference Guide is a handy, compact reference tool that includes brief
product overviews, key features, sample part numbers, and abbreviated technical specifications for
many Cisco products that are sold through channel partners. It is updated twice a year and includes
the latest Cisco offerings. To order and find out more about the Cisco Product Quick Reference
Guide, go to this URL:
http://www.cisco.com/go/guide
• Cisco Marketplace provides a variety of Cisco books, reference guides, documentation, and logo
merchandise. Visit Cisco Marketplace, the company store, at this URL:
http://www.cisco.com/go/marketplace/
• Cisco Press publishes a wide range of general networking, training and certification titles. Both new
and experienced users will benefit from these publications. For current Cisco Press titles and other
information, go to Cisco Press at this URL:
http://www.ciscopress.com
• Pack et magazine is the Cisco Systems technical user magazine for maximizing Internet and
networking investments. Each quarter, Packet delivers coverage of the latest industry trends,
technology breakthroughs, and Cisco products and solutions, as well as network deployment and
troubleshooting tips, configuration examples, customer case studies, certification and training
information, and links to scores of in-depth online resources. You can access Packet magazine at
this URL:
http://www.cisco.com/packet
• iQ Magazine is the quarterly publication from Cisco Systems designed to help growing companies
learn how they can use technology to increase revenue, streamline their business, and expand
services. The publication identifies the challenges facing these companies and the technologies to
help solve them, using real-world case studies and business strategies to help readers make sound
technology investment decisions. You can access iQ Magazine at this URL:
http://www.cisco.com/go/iqmagazine
or view the digital edition at this URL:
http://ciscoiq.texterity.com/ciscoiq/sample/
OL-9351-01
User Guide for Cisco Unified Service Monitor
xiii
Obtaining Additional Publications and Information
• Internet Protocol Journal is a quarterly journal published by Cisco Systems for engineering
professionals involved in designing, developing, and operating public and private internets and
intranets. You can access the Internet Protocol Journal at this URL:
http://www.cisco.com/ipj
• Networking products offered by Cisco Systems, as well as customer support services, can be
obtained at this URL:
http://www.cisco.com/en/US/products/index.html
• Networking Professionals Connection is an interactive website for networking professionals to share
questions, suggestions, and information about networking products and technologies with Cisco
experts and other networking professionals. Join a discussion at this URL:
http://www.cisco.com/discuss/networking
• World-class networking training is available from Cisco. You can view current offerings at
this URL:
http://www.cisco.com/en/US/learning/index.html
Preface
xiv
User Guide for Cisco Unified Service Monitor
OL-9351-01
Using Cisco Unified Service Monitor
The following topics are included:
• Getting Started with Service Monitor, page 1-1
• Managing Cisco 1040s, page 1-5
• Archiving Cisco 1040 Call Metrics, page 1-16
• Generating a Cisco 1040 Unreachable Trap, page 1-17
Getting Started with Service Monitor
Cisco Unified Service Monitor (Service Monitor), a member of the Cisco Unified Communications
Management Suite, analyzes data that it receives from Cisco 1040 Sensors (Cisco 1040s) installed in
your voice network. Each licensed instance of Service Monitor acts as a primary Service Monitor for
multiple Cisco 1040s. A Service Monitor can also be configured to act as a secondary and tertiary
Service Monitor for Cisco 1040s that are managed by other licensed instances of Service Monitor. When
a Service Monitor becomes unavailable, Cisco 1040s fail over to secondary or tertiary Service Monitors
temporarily until the primary Service Monitor becomes available again.
CHA P TER
1
OL-9351-01
Service Monitor examines the data it receives from Cisco 1040s, comparing Mean Opinion Scores
(MOS)—computed by Cisco 1040s for each RTP stream—against a user-specified threshold value.
When MOS drops below the threshold, Service Monitor generates SNMP traps and sends them to up to
four trap receivers. Optionally, Service Monitor stores the call metrics it receives from Cisco 1040s to disk
files.
To further analyze, display, and act on Service Monitor data, you can use Cisco Unified Operation
Manager (Operations Manager), by configuring it as a trap receiver for Service Monitor. Operations
Manager can generate events for Service Monitor traps, display the events on the Service Quality Alerts
dashboard, and store event history for up to 31 days. For more information, see User Guide for Cisco
Unified Operations Manager.
Figure 1-1 shows Service Monitor and Cisco 1040s installed with Operations Manager.
User Guide for Cisco Unified Service Monitor
1-1
Getting Started with Service Monitor
Figure 1-1Service Monitor Deployment
Chapter 1 Using Cisco Unified Service Monitor
1
IP
IP
Cisco 1040
23
Cisco Unified
Service Monitor
Cisco Unified
Operations Manager
141960
1Cisco 1040 monitors actual voice calls.3Operations Manager presents alert
information.
2Service Monitor evaluates MOS values and
— —
sends SNMP traps when a threshold is
violated. Service Monitor also sends an
SNMP trap when a Cisco 1040 is
unreachable.
For more information, see the following topics:
• Generating a Cisco 1040 Unreachable Trap, page 1-17
• MIBs Used and SNMP Traps Generated, page A-1
Starting Service Monitor
Step 1Enter http:\\server_name:1741 into your browser, where server_name is the DNS name or the IP address
of the server where Service Monitor is installed. A login page is displayed.
Step 2Enter admin for the User ID.
Step 3Enter the password that you entered for the admin user during installation and press Enter. The
CiscoWorks home page appears.
Step 4From the Cisco Unified Service Monitor pane, select Service Monitor > Service Monitor Operations.
A new window opens, displaying the Service Monitor home page.
1-2
User Guide for Cisco Unified Service Monitor
OL-9351-01
Chapter 1 Using Cisco Unified Service Monitor
Setting Up Service Monitor
Step 1From the Service Monitor home page, select Setup. The Setup page appears.
Step 2Update data described in the following table.
GUI ElementDescription/Action
Auto Registration radio
buttons
Getting Started with Service Monitor
Select one of the following:
• Enable—As a Cisco 1040 joins the network, it automatically
registers with a Service Monitor using information provided in
the default configuration file. See Understanding Automatic
Registration and Configuration Files, page 1-8 and Editing the
Default Configuration (Automatic Registration), page 1-12.
• Disable—As a Cisco 1040 joins the network, it registers with a
Service Monitor only when you have created a configuration file
specifically for that Cisco 1040. See Adding a Cisco 1040
(Manual Registration), page 1-9.
Default value is Disable.
NoteIf the number of Cisco 1040s registered to Service Monitor
equals the number allowed by the license, Service Monitor
does not allow additional Cisco 1040s to register. See
Licensing Overview, page B-1.
Call Metrics Archiving radio
buttons
Select one of the following:
• Enable—After analysis, Service Monitor saves data from
Cisco 1040s to disk files.
• Disable—After analysis, Service Monitor discards data.
Default value is Disable.
NoteCall metrics are archived to the directory specified when you
installed Service Monitor.
Image File Directory fieldDirectory on the Service Monitor server where binary image files and
configuration files for the Cisco 1040 are stored. Grayed out because
you cannot edit it.
NoteThis directory was specified during the installation of Service
Monitor.
MOS Threshold fieldEnter the value below which you want Service Monitor to send an
SNMP trap. Default value is 3.5. Minimum value is 1.0; maximum
value is 5.0.
Starting Cisco 1040 Sensor ID
list and field
Accept the default initial letter in the list and enter a 3-digit number
in the field. A Cisco 1040 Sensor ID consists of a letter and a 3-digit
number, for example: A100.
Service Monitor assigns this ID to the first Cisco 1040 to register with
it and increments from this ID to assign Cisco 1040 Sensor IDs
subsequently.
TFTP Server and Port fieldsEnter an IP address—or a DNS name—and a port number.
OL-9351-01
User Guide for Cisco Unified Service Monitor
1-3
Getting Started with Service Monitor
GUI ElementDescription/Action
Trap Forwarding Parameters
SNMP Community StringEnter the SNMP community string for the trap receivers. Default is
Trap Receiver n and Port fields
(where n is a number from
1to4)
Step 3Click OK.
Chapter 1 Using Cisco Unified Service Monitor
public.
Enter up to 4 trap receivers:
• Trap Receiver n—Enter the IP address or DNS name of a server.
To use Operations Manager to act on and display data from
Service Monitor—for example to use the Service Quality Alerts
dashboard—specify the system with Operations Manager as a
trap receiver.
• Port—Enter the port number on which the receiver listens for
SNMP traps. The default is 162; however, a different port might
be used for this purpose on this server.
Service Monitor generates SNMP traps and forwards them to these
receivers.
Copying Image and Configuration Files to the TFTP Server
When you install Service Monitor, you supply the name of the image file directory that Service Monitor
uses to store files for Cisco 1040s. Service Monitor installation creates the directory and stores the
binary image and default configuration files for Cisco 1040s in it.
To enable you to enforce security procedures that you might have in place at your site, Service Monitor
does not copy files to your TFTP server. You must manually copy binary image and configuration files
for Cisco 1040s to the TFTP server as follows:
• Cisco 1040 binary image file—The filename format is
SvcMon<vendor code><Cisco 1040 type><major version>_<minor version><bugfix version>.img.
For example:
SvcMonAA2_24.img
• Cisco 1040 configuration files—Copy configuration files after you update them as shown in the
following table.
File to copy from the image file directory to
Copy configuration files after you…
Edit the default configuration file. (If you enable
automatic registration, you must also edit the default
configuration file.)
Add a Cisco 1040 (manual registration).QOVmacaddress.CNF—Configuration
Edit the configuration file for a Cisco 1040.
the TFTP server
QOVDefault.CNF
file for the Cisco 1040 with that MAC
address.
1-4
User Guide for Cisco Unified Service Monitor
OL-9351-01
Chapter 1 Using Cisco Unified Service Monitor
The image file directory path and TFTP server IP address are displayed on the Setup page; see Setting
Up Service Monitor, page 1-3.
Note• If you have configured multiple instances of Service Monitor to use the same TFTP server, and
automatic registration is enabled, all Cisco 1040s register to the same primary Service Monitor.
Update the configuration file for each Cisco 1040 that should register to another Service Monitor;
see Editing the Configuration for a Specific Cisco 1040, page 1-11.
• If you have configured multiple instances of Service Monitor to use multiple TFTP servers, see
Configuring Service Monitors and Cisco 1040s when Multiple TFTP Servers Are in Use, page 1-9.
Managing Cisco 1040s
NoteYou must configure DHCP and DNS correctly for Cisco 1040s to work properly. For more information,
see Quick Start Guide for Cisco 1040 Sensor.
Managing Cisco 1040s
The following information is available for managing Cisco 1040s:
• Understanding the Cisco 1040 Sensor Details Page, page 1-6
• Registering Cisco 1040s to Service Monitors, page 1-8
• Resetting a Cisco 1040, page 1-13
• Setting the Time on Cisco 1040s, page 1-14
• Updating Image Files on Cisco 1040s, page 1-14
• Moving a Cisco 1040, page 1-15
• Deleting a Cisco 1040, page 1-15
• Using the Cisco 1040 Web Interface, page 1-15
OL-9351-01
User Guide for Cisco Unified Service Monitor
1-5
Managing Cisco 1040s
Understanding the Cisco 1040 Sensor Details Page
Step 1From the Service Monitor home page, select Cisco 1040 Sensor Management. The Cisco 1040 Sensor
Details page displays information listed in the following table.
GUI ElementDescription/Action
Exports data from the Cisco 1040 Sensor Details page to a CSV or PDF
file. See Exporting Data to a CSV or PDF File, page 1-6.
Opens a printer-friendly version of the data in another window; for
printing from a browser window.
Check box columnSelect Cisco 1040s that you want to delete or reset, or on which you
want to set the time.
ID columnClick the ID to launch an HTML page on the Cisco 1040. (See Using the
Cisco 1040 Web Interface, page 1-15.)
Status columnDisplays one of the following:
• Not Registered—Not registered to any Service Monitor.
• Registered—Registered to the primary Service Monitor.
Chapter 1 Using Cisco Unified Service Monitor
• Failover—Registered to a secondary or tertiary Service Monitor.
• Unreachable—Not responding.
Address columnDisplays MAC and IP addresses for Cisco 1040.
Service Monitor columnsDisplays both of the following:
• Assigned—IP address or hostame of the primary Service Monitor
defined for the Cisco 1040.
• Active—IP address or hostame of the Service Monitor to which the
Cisco 1040 is currently sending data. (Different from the assigned
Service Monitor only when the Cisco 1040 has failed over to a
secondary or tertiary Service Monitor.)
Last Reset Time columnThe last date and time the Cisco 1040 was rebooted.
Edit columnClick (Edit) link to edit the Cisco 1040 configuration. See Editing the
Configuration for a Specific Cisco 1040, page 1-11.
View columnClick the (View) link to view details of the Cisco 1040 configuration.
NoteThe Cisco 1040 Sensor Details page displays only those Cisco 1040s that are registered to the Service
Monitor up to the number specified by the license, with 50 Cisco 1040s as the uppermost limit. For more
information, see Licensing Overview, page B-1.
1-6
Exporting Data to a CSV or PDF File
After you click the export icon, a dialog box appears.
User Guide for Cisco Unified Service Monitor
OL-9351-01
Chapter 1 Using Cisco Unified Service Monitor
Step 1Select one radio button: CSV (comma-separated values file) or PDF.
Step 2Browse to the location where you want to store the file and click OK.
Viewing Details for a Specific Cisco 1040
The Cisco 1040 Sensor Detail dialog box opens, displaying the Cisco 1040 Sensor Information table
described here.
FieldDescription/Action
Managing Cisco 1040s
Exports data from the Cisco Information table to a CSV or
PDF file. See Exporting Data to a CSV or PDF File, page 1-6.
Opens a printer-friendly version of the data in another window;
for printing from a browser window.
Opens context-sensitive online help.
ID linkCisco 1040 Sensor ID—Click to open a web interface on the
Cisco 1040. See Using the Cisco 1040 Web Interface, page
1-15.
Status Displays one of the following:
• Not Registered—Not registered to any Service Monitor.
• Registered—Registered to the primary Service Monitor.
• Failover—Registered to a secondary or tertiary Service
Monitor.
• Unreachable—Not responding.
MAC AddressCisco 1040 MAC address.
IP AddressCisco 1040 IP address.
Primary Service MonitorIP address or DNS name for the primary Service Monitor.
Secondary Service MonitorIP address or DNS name for the secondary Service Monitor;
blank if not set. (See Editing the Configuration for a Specific
Cisco 1040, page 1-11.)
Tertiary Service MonitorIP address or DNS name for the tertiary Service Monitor;
blank if not set. (See Editing the Configuration for a Specific
Cisco 1040, page 1-11.)
OL-9351-01
User Guide for Cisco Unified Service Monitor
1-7
Managing Cisco 1040s
FieldDescription/Action
Image File NameName of the image file installed on the Cisco 1040.
NoteIf there is a more recent image file available on the
Last Reset TimeDate and time that the Cisco 1040 was last reset. (See
Resetting a Cisco 1040, page 1-13
DescriptionUser-entered description for the Cisco 1040. (See Editing the
Configuration for a Specific Cisco 1040, page 1-11.)
Registering Cisco 1040s to Service Monitors
After it is connected to a switch, a Cisco 1040 uses DHCP to obtain the IP address of the TFTP server.
The Cisco 1040 checks the TFTP server for a configuration file, using the first of the following files that
it finds:
Chapter 1 Using Cisco Unified Service Monitor
TFTP server, you must edit the configuration file for
the Cisco 1040, specifying the filename for the more
recent image, you must copy the updated configuration
file to the TFTP server, and you must reset the
Cisco 1040. (See Editing the Configuration for a
Specific Cisco 1040, page 1-11.)
• QOVmacaddress.CNF—Where MAC address is the MAC address of the Cisco 1040.
NoteThis configuration file is created by the automatic registration process and by adding a
Cisco 1040 manually. You must copy this configuration file to the TFTP server. For more
information, see Adding a Cisco 1040 (Manual Registration), page 1-9 and Copying Image
and Configuration Files to the TFTP Server, page 1-4.
• QOVDefault.CNF—Default configuration file; used when automatic registration is enabled on the
Service Monitor (see Setting Up Service Monitor, page 1-3.)
NoteThe default configuration file is installed on the server with Service Monitor. To enable a
Cisco 1040 to use this file, you must enable automatic registration, edit the default
configuration file (see Editing the Default Configuration (Automatic Registration), page
1-12), and copy it to the TFTP server (see Copying Image and Configuration Files to the
TFTP Server, page 1-4.)
NoteService Monitor continues to allow Cisco 1040s to register until the number of registered Cisco 1040s
reaches the number specified by the license. For more information, see Licensing Overview, page B-1.
Understanding Automatic Registration and Configuration Files
1-8
When automatic registration is enabled, a newly connected Cisco 1040 registers to a Service Monitor
using the default configuration file, QOVDefault.CNF. After a Cisco 1040 registers to a Service Monitor,
a configuration file QOV<MAC address>.CNF is created in the image file directory. You must copy this
User Guide for Cisco Unified Service Monitor
OL-9351-01
Chapter 1 Using Cisco Unified Service Monitor
Managing Cisco 1040s
configuration file to the TFTP server. See Copying Image and Configuration Files to the TFTP Server,
page 1-4. Thereafter, every time that you reset the Cisco 1040, it uses QOV<MAC address>.CNF to
register to a Service Monitor.
There can be only one default configuration file on the TFTP server. The default configuration file
specifies the primary Service Monitor. Therefore, each Cisco 1040 that uses the same TFTP server
registers to the same Service Monitor.
NoteWhen multiple Service Monitors share the same TFTP server, after automatic registration completes,
you must edit the configuration file for any Cisco 1040 that you want to register to primary, secondary,
and tertiary Service Monitors different from those listed in the default configuration file. See Editing the
Configuration for a Specific Cisco 1040, page 1-11.
Configuring Service Monitors and Cisco 1040s when Multiple TFTP Servers Are in Use
If you have multiple licensed instances of Service Monitor, you can configure them to use one TFTP
server or multiple TFTP servers. When you use multiple TFTP servers, ensure that each TFTP server
holds a current copy of the configuration file for each Cisco 1040. All QOV<macaddress>.CNF files on
each TFTP server should be fully replicated to the other TFTP servers using any file replication
mechanism.
Following this recommendation ensures that, when a Cisco 1040 fails over to a Service Monitor using a
different TFTP server, the Cisco 1040 locates and loads the specific configuration file that was created
for it. Access to the correct configuration file from any TFTP server enables the Cisco 1040 to retain its
ID while registering with a failover Service Monitor that uses a different TFTP server.
NoteCopying a configuration file to a TFTP server does not cause a Cisco 1040 to load that configuration file.
A Cisco 1040 loads a configuration file from a TFTP server only during failover or reset. (See
Understanding Cisco 1040 Failover to a Secondary or Tertiary Service Monitor, page 1-13 and Resetting
a Cisco 1040, page 1-13).
Adding a Cisco 1040 (Manual Registration)
NoteIf automatic registration is enabled, you can still add a Cisco 1040 to Service Monitor manually before
you connect the Cisco 1040 if you want to do so.
Step 1From the Service Monitor home page, select Cisco 1040 Sensor Management.
Step 2Click Add. The Add a Cisco 1040 Sensor dialog box appears.
NoteThe number of Cisco 1040s that you can add to Service Monitor depends on the limit specified
by your license. If you already have reached the limit, an error message is displayed and you
cannot proceed. You might be able to upgrade your license to support additional Cisco 1040s.
For more information, see Licensing Overview, page B-1.
Step 3Enter data listed in the following table.
OL-9351-01
User Guide for Cisco Unified Service Monitor
1-9
Managing Cisco 1040s
Chapter 1 Using Cisco Unified Service Monitor
GUI ElementDescription/Action
Cisco 1040 Sensor IDAccept the default initial letter and enter a 3-digit number. A Cisco 1040
Sensor ID consists of a letter and a 3-digit number, for example: A100.
NoteIf you enter an existing Cisco 1040 Sensor ID, Service Monitor
displays an error message; in this case, you should enter a
different 3-digit number.
Image FilenameEnter the binary image filename. The filename format is
SvcMng<vendor code><Cisco 1040 type><major version>_<minor
version><bugfix version>.img. For example:
SvcMonAA2_24.img
For more information, see Copying Image and Configuration Files to the
TFTP Server, page 1-4 and Updating Image Files on Cisco 1040s, page
1-14.
MAC AddressEnter the MAC address for the Cisco 1040 that you are adding.
Primary Service MonitorEnter an IP address or DNS name of a host where Service Monitor is
installed. The Cisco 1040 sends data to this Service Monitor unless it
becomes unreachable.
Secondary Service Monitor (Optional.) Enter an IP address or DNS name of a host where another
instance of Service Monitor is installed. The Cisco 1040 sends data to
this Service Monitor only if the primary Service Monitor becomes
unreachable.
Tertiary Service Monitor(Optional.) Enter an IP address or DNS name of a host where another
instance of Service Monitor is installed. The Cisco 1040 sends data to
this Service Monitor only if the primary and secondary Service Monitors
become unreachable.
DescriptionEnter up to 80 characters.
1-10
Step 4Click OK. The configuration file is saved on the server where Service Monitor is installed. The
configuration file is named QOV<MAC address>.CNF, where <MAC address> is the MAC address for
the Cisco 1040. (To view the MAC address, see Using the Cisco 1040 Web Interface, page 1-15.)
Step 5Copy the configuration file from the image file directory on the server where Service Monitor is installed
to the TFTP server. When you plug the Cisco 1040 in and when you reset it, it will load this configuration
file.
NoteThe image file directory path and the TFTP server address are displayed on the Setup page;
Setting Up Service Monitor, page 1-3.)
If you are using more than one TFTP server, see Configuring Service Monitors and Cisco 1040s when
Multiple TFTP Servers Are in Use, page 1-9.
User Guide for Cisco Unified Service Monitor
OL-9351-01
Chapter 1 Using Cisco Unified Service Monitor
Editing the Configuration for a Specific Cisco 1040
NoteDo not edit a Cisco 1040 configuration file using a text editor. Edit a Cisco 1040 configuration file using
this procedure only.
This procedure updates the configuration file for a Cisco 1040. After you edit the configuration file, you
must copy it to the TFTP server and reset the Cisco 1040.
Step 1From the Service Monitor home page, select Cisco 1040 Sensor Management. (See Understanding the
Cisco 1040 Sensor Details Page, page 1-6.)
Step 2Click the (Edit) link for the Cisco 1040 that you want to modify.
Step 3Update any of the following fields.
GUI ElementDescription/Action
Cisco 1040 Sensor IDIf you want to change the ID, accept the default initial letter and enter a
3-digit number. A Cisco 1040 Sensor ID consists of a letter and a 3-digit
number, for example: A100.
NoteIf you enter an existing Cisco 1040 Sensor ID, Service Monitor
displays an error message.
Image FilenameEnter the binary image filename. The filename format is
SvcMon<vendor code><Cisco 1040 type><major version>_<minor
version><bugfix version>.img. For example:
SvcMonAA2_24.img
Managing Cisco 1040s
Where:
• A is the vendor code for this Cisco 1040 (for internal use)
• A is the Cisco 1040 type (for internal use)
• 2 is the major release number
• 1 is the minor release number
• 6 is the bugfix number
For more information, see Copying Image and Configuration Files to the
TFTP Server, page 1-4 and Updating Image Files on Cisco 1040s, page
1-14.
Primary Service MonitorEnter an IP address or DNS name of a host where Service Monitor is
installed. The Cisco 1040 sends data to this Service Monitor unless it
becomes unreachable.
Secondary Service Monitor (Optional.) Enter an IP address or DNS name of a host where Service
Monitor is installed. The Cisco 1040 sends data to this Service Monitor
only if the primary Service Monitor becomes unreachable.
Tertiary Service Monitor(Optional.) Enter an IP address or DNS name of a host where Service
Monitor is installed. The Cisco 1040 sends data to this Service Monitor
only if the primary and secondary Service Monitors become
unreachable.
DescriptionEnter up to 80 characters.
OL-9351-01
User Guide for Cisco Unified Service Monitor
1-11
Managing Cisco 1040s
Step 4Click OK.
Step 5Copy the configuration file from the image file directory on the server where Service Monitor is installed
to the TFTP server. When you plug the Cisco 1040 in and when you reset it, it will load this configuration
file.
NoteThe image file directory path and the TFTP server address are displayed on the Setup page;
Setting Up Service Monitor, page 1-3.)
If you have multiple instances of Service Monitor and they are configured to use different TFTP servers,
see Configuring Service Monitors and Cisco 1040s when Multiple TFTP Servers Are in Use, page 1-9.
Step 6Reset the Cisco 1040; see Resetting a Cisco 1040, page 1-13.
Editing the Default Configuration (Automatic Registration)
If you edit the default configuration file, Cisco 1040s can use the information that you specify to
automatically register with a Service Monitor. Edit the default configuration file to specify the primary,
secondary, and tertiary Service Monitors and the image filename for Cisco 1040s. After you edit the file,
you must copy it to the TFTP server specified for the Service Monitor.
Chapter 1 Using Cisco Unified Service Monitor
NoteDo not edit the default configuration file using a text editor. Edit the default configuration file using this
procedure only.
Step 1From the Service Monitor home page, select Default Configuration. The Cisco 1040 Default
Configuration page appears.
Step 2Enter information in the following fields:
• Primary Service Monitor—Enter an IP address or DNS name of a host where Service Monitor is
installed.
• Secondary Service Monitor—(Optional.) Enter an IP address or DNS name of a host where another
instance of Service Monitor is installed.
• Tertiary Service Monitor—(Optional.) Enter an IP address or DNS name of a host where another
instance of Service Monitor is installed.
• Image Filename—Enter the binary image filename. The filename format is
SvcMon<vendor code><Cisco 1040 type><major version>_<minor version><bugfix version>.img.
For example:
SvcMonAA2_24.img
Step 3Click OK. Service Monitor saves your changes.
Step 4Copy the default configuration file, QOVDefault.CNF, from the image file directory on the server where
Service Monitor is installed to the TFTP server.
1-12
User Guide for Cisco Unified Service Monitor
OL-9351-01
Chapter 1 Using Cisco Unified Service Monitor
NoteThe image file directory path and the TFTP server address are displayed on the Setup page;
Setting Up Service Monitor, page 1-3.)
Understanding Cisco 1040 Failover to a Secondary or Tertiary Service Monitor
This topic explains how a Cisco 1040 determines that a primary Service Monitor is unreachable and how
the Cisco 1040 fails over to a secondary or tertiary Service Monitor.
A Cisco 1040 sends keepalive messages to the Service Monitor to which it is registered and receives
acknowledgements from the Service Monitor. After sending three keepalives without receiving any
acknowledgement, a Cisco 1040 starts a failover process to a secondary—or tertiary—Service Monitor:
1. The Cisco 1040 sends a keepalive to the secondary Service Monitor that is listed in its configuration
file and, upon acknowledgement, registers with that Service Monitor.
NoteThe Cisco 1040 retains the same ID. If you are using more than one TFTP server, see
Configuring Service Monitors and Cisco 1040s when Multiple TFTP Servers Are in Use,
page 1-9.
Managing Cisco 1040s
2. The secondary Service Monitor obtains the latest configuration file for this Cisco 1040 from the
TFTP server, registering the Cisco 1040 as a failover Cisco 1040.
3. The Cisco 1040 starts sending syslog messages to the secondary Service Monitor while continuing
to send keepalives to the primary Service Monitor to determine whether it is back up. The secondary
Service Monitor processes the syslog messages from the failed over Cisco 1040.
4. When the primary Service Monitor is back up, the Cisco 1040 unregisters from the secondary
Service Monitor and registers to the primary Service Monitor again.
Resetting a Cisco 1040
Use this procedure to boot a Cisco 1040. After a Cisco 1040 boots, it first uses DHCP to obtain the IP
address of the TFTP server. From the TFTP server, Cisco 1040 obtains a configuration file. If the
configuration file specifies a binary image file that is different from the currently installed image,
Cisco 1040 also obtains the binary image file from the TFTP server.
Step 1From the Service Monitor home page, select Cisco 1040 Sensor Management. (See Understanding the
Cisco 1040 Sensor Details Page, page 1-6.)
Step 2Select check boxes for the Cisco 1040s that you want to reset.
Step 3Click Reset Cisco 1040.
OL-9351-01
User Guide for Cisco Unified Service Monitor
1-13
Managing Cisco 1040s
Setting the Time on Cisco 1040s
NoteMake sure that Windows Time service is properly configured and running on the server where Service
Monitor is installed.
This procedure takes the current time from the server where Service Monitor is installed and uses it to
set the time on each Cisco 1040 that you select.
Step 1From the Service Monitor home page, select Cisco 1040 Sensor Management. (See Understanding the
Cisco 1040 Sensor Details Page, page 1-6.)
Step 2Select check boxes for the Cisco 1040s for which you want to set the time.
NoteIf Failover is displayed in the Status column for any Cisco 1040, deselect it; you cannot set the
time on it now.
Step 3Click Set Time.
Chapter 1 Using Cisco Unified Service Monitor
NoteTo set the time on a Cisco 1040 that has failed over to a secondary or tertiary Service Monitor, do one
of the following:
• Wait until the status is Registered; this indicates that the Cisco 1040 is once again managed by the
primary Service Monitor; you can set the time.
• Edit the configuration for the Cisco 1040, setting the primary Service Monitor to the active Service
Monitor; see Editing the Configuration for a Specific Cisco 1040, page 1-11. Then set the time on
the Cisco 1040.
Updating Image Files on Cisco 1040s
Step 1When a new image file becomes available, download it from the Cisco software download site:
a. Point your browser to http://www.cisco.com.
b. Select Technical Support & Documentation > Downloads.
c. Click the link for Cisco Unified Service Monitor to see and download available images.
Step 2Copy the image file to both of the following:
• The image file directory specified when you installed Service Monitor—Copy the image file here to
retain a local copy as a backup. For the image file directory path, see Setting Up Service Monitor,
page 1-3.)
• The TFTP server—Copy the file here to provide access to it for Cisco 1040s that are configured to
use the image. For the TFTP server address, see Setting Up Service Monitor, page 1-3.
1-14
User Guide for Cisco Unified Service Monitor
OL-9351-01
Chapter 1 Using Cisco Unified Service Monitor
NoteThe image filename format is
SvcMon<vendor code><Cisco 1040 type><major version>_<minor version><bugfix
version>.img. For example, SvcMonAA2_24.img.
Step 3Modify the configuration for each Cisco 1040, entering the new image filename; see Editing the
Configuration for a Specific Cisco 1040, page 1-11.
Moving a Cisco 1040
Step 1(Optional.) Perform this step if you want to configure the Cisco 1040 to point to a new primary Service
Monitor. Edit the configuration file for the Cisco 1040 and copy it to the TFTP server. (See Editing the
Configuration for a Specific Cisco 1040, page 1-11.)
Step 2Unplug Cisco 1040.
Step 3Plug Cisco 1040 in at new location. The Cisco 1040 downloads its configuration file from the TFTP
server.
Managing Cisco 1040s
NoteThe Cisco 1040 retains its ID after the move.
Deleting a Cisco 1040
Step 1Delete the configuration file for the Cisco 1040 (QOVmacaddress.CNF) from the TFTP server.
Step 2From the Service Monitor home page, select Cisco 1040 Sensor Management. (See Understanding the
Cisco 1040 Sensor Details Page, page 1-6.)
Step 3Select check boxes for the Cisco 1040s that you want to delete.
Step 4Click Delete.
Using the Cisco 1040 Web Interface
To use the web interface to view the contents of the configuration file for this Cisco 1040 on the TFTP
server, see Viewing the Configuration File on the TFTP Server, page 1-16.
You can open a web interface to view the information stored on a Cisco 1040 in one of the following
ways:
• Click (View) on the Cisco 1040 Sensor Details page. See Understanding the Cisco 1040 Sensor
Details Page, page 1-6.
• Enter http://<IP address> in your browser where IP address is the address of your Cisco 1040.
The Cisco 1040 web interface displays a Device Information window with the following information:
OL-9351-01
• ID—Cisco 1040 Sensor ID.
User Guide for Cisco Unified Service Monitor
1-15
Archiving Cisco 1040 Call Metrics
• MAC Address—Cisco 1040 MAC address.
• Time stamp—Current time on the Cisco 1040.
• Status—Status of the Cisco 1040; one of the following:
–
operational—Cisco 1040 is receiving RTP streams, analyzing data, and sending data to Service
Monitor.
–
not communicating with receiver—The Service Monitor is unreachable.
• Current Service Monitor—Name of the Service Monitor to which the Cisco 1040 is sending data;
this could be the primary, secondary, or tertiary Service Monitor.
• TFTP IP Address—TFTP server from which the Cisco 1040 downloads its binary image file and
configuration file.
• Software Version—Name of the binary image file installed on the Cisco 1040. See Updating Image
Files on Cisco 1040s, page 1-14.
• Last Updated—Last time that the configuration for the Cisco 1040 was updated on Service
Monitor. See Editing the Configuration for a Specific Cisco 1040, page 1-11.
Viewing the Configuration File on the TFTP Server
Chapter 1 Using Cisco Unified Service Monitor
Step 1From your browser, enter http://<IP address or DNS name>/Communication where IP address is the
address of your Cisco 1040 and DNS name is the DNS name for the Cisco 1040. For example:
http://Cisco-1040-sj/Communication
Step 2The Communication Log File window displays the following information from the configuration file on
the TFTP server for this Cisco 1040:
• Receiver—IP address or DNS name of each Service Monitor—primary, secondary, and
tertiary—defined in the configuration file, separated by semicolons.
• ID—ID of the Cisco 1040 that uses this configuration file.
• Image—Name of the binary image file that the Cisco 1040 should download and run from the TFTP
server.
• Last Updated—The last time that this configuration file was updated on the Service Monitor system.
Archiving Cisco 1040 Call Metrics
To enable or disable call metrics archiving, see Setting Up Service Monitor, page 1-3. By default, Service
Monitor does not save the data it receives from Cisco 1040s. However, if you have enabled call metrics
archiving, Service Monitor saves the data in a directory on the server. The directory is specified during
Service Monitor installation.
Service Monitor creates a new data file in this directory daily at midnight. The data filename is
QoV_YYYYMMDD.csv where YYYY is the 4-digit year, MM is the two-digit month and DD is the
two-digit day. For example, QOV_20061101.csv is a data file for November 1, 2006. Service Monitor
also backs up data files that exceed a size limit and deletes older data files; for more information, see
Managing Service Monitor Data, page 2-1.
1-16
User Guide for Cisco Unified Service Monitor
OL-9351-01
Chapter 1 Using Cisco Unified Service Monitor
You can use the data for further analysis or you can turn archiving off. (Service Monitor does not send
the archived data to other applications.) Tab l e 1-1 lists the format for call metrics data files.
Table 1-1Service Monitor Archived Call Metrics Data Format
DescriptionValue
Cisco 1040 Sensor IDA Cisco 1040 Sensor ID consists of a letter and a 3-digit
Time stampDate and time
Flag indicating actual or sampled data0: Actual
Source device IP address IPv4 address, for example:
Destination device IP addressIPv4 address, for example:
Codec of call data record2: G711Alaw 64k
Generating a Cisco 1040 Unreachable Trap
number, for example: A100
1: Sampled
172.020.119.043
172.020.119.025
6: G722 64k
9: G7231
10: G728
11: G729
Calculated MOS score2-digit number with an implied decimal point between the
first and second digit
Primary cause of call degradationJ: Jitter
P: Packet Loss
Actual packet loss in the previous minute <numeric value>
Actual jitter, in milliseconds, in the
<numeric value>
previous minute
NoteCall metrics data files remain on disk for 30 days. Service Monitor deletes them thereafter. If you would
like to save these files, you must back them up using whatever method your normally use to back up your
disk. For more information, see Managing Service Monitor Data, page 2-1.
Generating a Cisco 1040 Unreachable Trap
When a Service Monitor stops receiving keepalives from a Cisco 1040 that is registered to it, the Service
Monitor generates a Cisco 1040 Unreachable SNMP trap. The Service Monitor sends this trap to up to
four recipients. For more information, see Setting Up Service Monitor, page 1-3 and MIBs Used and
SNMP Traps Generated, page A-1.
OL-9351-01
NoteIf you configure Operations Manager to receive traps from Service Monitor, the Cisco 1040 Unreachable
trap is displayed on the Alerts and Events monitoring dashboard under the unidentified trap device type.
User Guide for Cisco Unified Service Monitor
1-17
Generating a Cisco 1040 Unreachable Trap
Chapter 1 Using Cisco Unified Service Monitor
1-18
User Guide for Cisco Unified Service Monitor
OL-9351-01
Data Management and System Administration
This section contains the following topics:
• Managing Service Monitor Data, page 2-1
• Managing Log Files, page 2-3
• Configuring Users (ACS and Non-ACS), page 2-5
• Starting and Stopping Service Monitor Processes, page 2-8
• Using SNMP to Monitor Service Monitor, page 2-8
• Changing the Hostname on the Service Monitor Server, page 2-10
• Changing the IP Address on the Service Monitor Server, page 2-13
Managing Service Monitor Data
CHA P TER
2
Cisco Unified Service Monitor (Service Monitor) receives and processes call metrics data from the
Cisco 1040s that are registered to it. Optionally, Service Monitor archives call metrics data to files in the
directory specified for that purpose at the time of installation. To enable and disable archiving, see
Setting Up Service Monitor, page 1-3.
When archiving is enabled, by default, Service Monitor does the following:
• Creates a new data file daily at midnight.
• Creates a new data file whenever the current data file size exceeds 3 MB. When a file reaches this
limit, Service Monitor does the following:
–
Backs it up—Appends .n to the filetype; for example, .csv.1, .csv2, and so on up to the limit of
50 per day.
–
Creates a new data file—Retains the original filetype: (.csv).
• Retains the data files for 30 days before deleting them. If you want to retain the data files for a longer
period, you can back up the Service Monitor data files using the same method you use to back up
your file system. (Common Services backs up the Service Monitor database only and does not
include Service Monitor data files.)
Backing Up and Restoring the Service Monitor Database
The Service Monitor database stores information about Cisco 1040 configuration.
OL-9351-01
User Guide for Cisco Unified Service Monitor
2-1
Managing Service Monitor Data
Starting a Database Backup
Use this procedure to perform an immediate backup or a scheduled backup of the Service Monitor
database.
Step 1Click the CiscoWorks link in the upper righthand corner of the Service Monitor home page. A new
window opens.
Step 2In the Common Services pane, select Server > Admin > Backup, click Help, and follow the
instructions.
Restoring the Database
To restore the database, you must use the command-line interface (instructions are available in online
help) and you need to know the backup directory structure.
Step 1Click the CiscoWorks link in the upper righthand corner of the Service Monitor home page. A new
window opens.
Chapter 2 Data Management and System Administration
Step 2In the Common Services pane, select Server > Admin > Backup, click Help, and click the Help link to
the Restoring Data topic.
NoteWhen you restore the database, Logging settings return to the default value. As a result, error messages
only are written to the log files. If you need additional information written to your log files to debug a
problem, reset your logging settings. See Managing Log Files and Enabling and Disabling Debugging,
page 2-4.
The backup directory structure for the Service Monitor database includes the suite name, which is qovr:
For Service Monitor, the following file is listed directly under
generationNumber/suite:
qovr.db
Changing the Password for the Service Monitor Database
A command line script is available to change database passwords, including the password for the Service
Monitor database, qovr.db. Instructions are available in online help.
Step 1Click the CiscoWorks link in the upper righthand corner of the Service Monitor home page. A new
window opens.
Managing Log Files
Step 2Click Help. The help window opens.
Step 3Select the Index tab, scroll down to the entries for D, and select database passwordchanges.
Managing Log Files
This section includes the following topics:
• Understanding Service Monitor Syslog Handling, page 2-3
• Maintaining the History Log File, page 2-4
• Managing Log Files and Enabling and Disabling Debugging, page 2-4
Understanding Service Monitor Syslog Handling
Service Monitor receives and processes syslog messages from Cisco 1040s. After processing syslog
messages, Service Monitor writes them to the syslog file, syslog.log, in NMSROOT\qovr.
CautionService Monitor does not use the CWCS syslog service; do not try to start this service, and do not run
crmlog.exe. Doing so will cause Service Monitor to function incorrectly.
OL-9351-01
User Guide for Cisco Unified Service Monitor
2-3
Chapter 2 Data Management and System Administration
Managing Log Files
Maintaining the History Log File
The history log file, ServiceMonitorHistory.log, contains records of Cisco 1040 events such as Cisco
1040 reset, configuration update, and errors. The history log file accumulates records and grows in size.
If the file becomes too large, you should rename it to enable Service Monitor to start a fresh history log
file.
NoteService Monitor does not back up the history log file. If you want to back it up, use the same method
you use to back up your file system.
Managing Log Files and Enabling and Disabling Debugging
This information is provided for troubleshooting purposes. Service Monitor log files (see Table 2-2) are
located in the NMSROOT\log\qovr directory.
NoteNMSROOT is the folder where Service Monitor is installed on the server. If you selected the default
directory during installation, it is C:\Program Files\CSCOpx.
Use this procedure to increase or decrease the type—and quantity—of messages written to log files.
Step 1From the Service Monitor home page, select Logging. The Logging: Level Configuration page appears.
NoteYou cannot disable logging. Service Monitor always writes error and fatal messages to
application log files.
Step 2For each Service Monitor functional module, the Error check box is always selected; you cannot deselect
it. For a list of modules and related log files, see Ta b le 2 -2.
To set all modules to Error, which is the default logging level:
a. Click the Default button. A confirmation page is displayed.
b. Click OK.
To change the logging level for individual modules:
a. For each module that you want to change, select one (or deselect all) of the following logging levels:
• Warning—Log error messages and warning messages
• Informational—Log error, warning, and informational messages
• Debug—Log error, warning, informational, and debug message
NoteDeselecting all check boxes for a module returns it to Error, the default logging level.
2-4
b. Review your changes. To cancel your changes, click the Cancel button. Otherwise, click the Apply
button. Clicking the Apply button starts immediately resetting the changed logging levels for the
Service Monitor functional modules.
User Guide for Cisco Unified Service Monitor
OL-9351-01
Chapter 2 Data Management and System Administration
Table 2-2 lists Service Monitor log files by function or module. If you request assistance, the Technical
Assistance Center (TAC) might ask you to send them some of these log files.
Table 2-2Service Monitor Log Files by Module
Function/ModuleLog Files
Data HandlerDataHandler.log
Skinny ServerSkinnyServer.log
User InterfaceQovrUI.log
Configuring Users (ACS and Non-ACS)
DataHandler_stdout.log
DataHandler_sterr.log
dhError.log
LicenseCheck.log
ServiceMonitorHistory.log
tftpmanager.log
trapgen.log
Configuring Users (ACS and Non-ACS)
What Service Monitor users can see and do is determined by their user role. There are two different
mechanisms or modes for authenticating users:
• Non-ACS—You select a supported login module to provide authentication and authorization. By
default, Common Services uses the CiscoWorks Local login module to assign roles, along with
privileges associated with those roles, as described in the Permission Report. (You can generate a
Permission Report by clicking the CiscoWorks link in the upper righthand corner of the Service
Monitor home page and selecting Common Services >Server > Reports > Permission Report >
Generate Report.) For more information, refer to Configuring Users Using Non-ACS Mode
(CiscoWorks Local Login Module), page 2-5.
• ACS—In ACS mode, authentication and authorization is provided by Cisco Secure Access Control
Server (ACS). Cisco Secure ACS specifies the privileges associated with roles; however, Cisco
Secure ACS also enables you to perform device-based filtering, so that users only see authorized
devices. To use ACS mode, Cisco Secure ACS must be installed on your network and Service
Monitor must be registered with Cisco Secure ACS. For more information, refer to Configuring
Users Using ACS Mode, page 2-6.
If Operations Manager uses ACS mode for authentication and authorization and Service Monitor is
running on the same system, Service Monitor must also use ACS mode; otherwise, Service Monitor users
will not have any permissions.
Configuring Users Using Non-ACS Mode (CiscoWorks Local Login Module)
OL-9351-01
To add a user and specify their user role using CiscoWorks Local login module, select Administration >
Add Users. After the Common Services Local User Setup window opens, click the Help button for
information on the configuration steps.
Use the Permission Report to understand how each user role relates to tasks in Service Monitor.
User Guide for Cisco Unified Service Monitor
2-5
Configuring Users (ACS and Non-ACS)
Step 1Click the CiscoWorks link in the upper righthand corner of the Service Monitor home page. A new
window opens.
Step 2Select Common Services > Server > Reports > Permission Report > Generate Report.
Step 3Scroll down until you find Cisco Unified Service Monitor.
Configuring Users Using ACS Mode
To use ACS mode for authentication and authorization, Cisco Secure ACS must be installed on your
network and Service Monitor must be registered with Cisco Secure ACS.
Step 1Verify the AAA mode:
a. Click the CiscoWorks link in the upper righthand corner of the Service Monitor home page. A new
window appears.
b. Select Server > Security > AAA Mode Setup and check which Type radio button is selected: ACS
or Non-ACS.
Step 2Verify whether Service Monitor is registered with Cisco Secure ACS (if ACS is selected) by logging in
to Cisco Secure ACS.
Chapter 2 Data Management and System Administration
Step 3To modify ACS roles, refer to the Cisco Secure ACS online help (on the Cisco Secure ACS server) for
information on modifying roles.
NoteIf you modify Service Monitor roles using Cisco Secure ACS, your changes will be propagated
to all other instances of Service Monitor that are registered with the same Cisco Secure ACS
server.
Using Service Monitor in ACS Mode
Before performing any tasks that are mentioned here, you must ensure that you have successfully
completed configuring Cisco Secure ACS with Service Monitor. If you have installed Service Monitor
after configuring the CiscoWorks Login Module to the ACS mode, then Service Monitor users are not
granted any permissions. However, the Service Monitor application is registered to Cisco Secure ACS.
NoteThe System Identity Setup user, defined when you installed Service Monitor, must be added to the Cisco
Secure ACS, and this user must have Network Administrator privilege. For more information, click the
CiscoWorks link in the upper righthand corner of the Service Monitor home page and select Common Services > Server > Security > Multi-Server Trust Management > System Identity Setup.
2-6
CiscoWorks login modules enable you to add new users using a source of authentication other than the
native mechanism (that is, the CiscoWorks Local login module). You can use the Cisco Secure ACS
server for this purpose.
User Guide for Cisco Unified Service Monitor
OL-9351-01
Chapter 2 Data Management and System Administration
By default, the CiscoWorks Local login module authentication scheme has five roles in the ACS mode.
They are listed here from least privileged to most privileged:
Help DeskUser with this role has the privileges to access network status information
ApproverUser with this role does not have any privileges. (Service Monitor does not
Network OperatorUser with this role has the privilege to perform all tasks that involve
Network AdministratorUser with this role has the privilege to change the network. User can also
System AdministratorUser with this role has the privilege to perform all system administration
Configuring Users (ACS and Non-ACS)
from the persisted data. User does not have the privilege to contact any
device or schedule a job that will reach the network.
Example: View details for Cisco 1040, setup, and default configuration.
(Cannot perform modifications.)
assign any tasks to this user role.)
collecting data from the network. User does not have write access on the
network.
Example: Set up Service Monitor, add, modify, delete Cisco 1040s.
perform Network Operator tasks.
Example: Same as Network Operator.
tasks. See the Permission Report. (Click the CiscoWorks link in the upper
righthand corner of the Service Monitor home page and select Common Services > Server > Reports > Permission Report > Generate Report).
Example: Enable and disable debugging; set logging level.
Cisco Secure ACS allows you to modify the privileges to these roles. You can also create custom roles
and privileges that help you customize Service Monitor to best suit your business workflow and needs.
To modify the default privileges, see Cisco Secure ACS online help. (On Cisco Secure ACS, click Online Documentation > Shared Profile Components > Command Authorization Sets.)
Modifying Roles and Privileges in Cisco Secure ACS
If another instance of Service Monitor is registered with the same Cisco Secure ACS, your instance of
Service Monitor will inherit those role settings. Furthermore, any changes you make to Service Monitor
roles will be propagated to other instances of Service Monitor through Cisco Secure ACS. If you reinstall
Service Monitor, your Cisco Secure ACS settings will automatically be applied upon Service Monitor
restart.
Step 1Select Shared Profile Components > Cisco Unified Service Monitor and click the Service Monitor
roles that you want to modify.
Step 2Select or deselect any of the Service Monitor tasks that suit your business workflow and needs.
Step 3Click Submit.
OL-9351-01
User Guide for Cisco Unified Service Monitor
2-7
Chapter 2 Data Management and System Administration
Starting and Stopping Service Monitor Processes
Starting and Stopping Service Monitor Processes
To start and stop Service Monitor processes, select the CiscoWorks link from the upper righthand corner
of the Service Monitor home page, select Common Services > Server > Admin > Processes, and click Help for instructions. Tab le 2-3 provides a complete list of Service Monitor-related processes.
Table 2-3Service Monitor-Related Processes
NameDescriptionDependency
QOVRService Monitor server.QOVRDbMonitor
QOVRDbMonitorService Monitor database
monitor.
QOVRDbEngineService Monitor database.—
QOVRMultiProcLoggerService Monitor process
logging.
QOVRDbEngine
—
Using SNMP to Monitor Service Monitor
Service Monitor supports the system application MIB. This support enables you to monitor Service
Monitor using a third-party SNMP management tool, so that you can:
• Consistently monitor multiple platforms—One platform on which Service Monitor resides and one
or more on which applications in the Cisco Unified Management Suite reside.
• Assess the application health using the system application MIB, which provides the following
information:
–
Applications that Service Monitor installed.
–
Processes associated with applications and current process status.
–
Processes that ran previously and application exit state.
For MIB implementation details and sample MIB walk, see Appendix C, “Service Monitor Support for
SNMP MIBs.”
NoteYou cannot uninstall the MIB support; however, you can stop Windows SNMP service and set the startup
type to either Manual or Disabled. See Enabling and Disabling Windows SNMP Service, page 2-9.
Configuring Your System for SNMP Queries
To enable SNMP queries, SNMP service must be installed and enabled.
2-8
Step 1Verify that SNMP service is installed and enabled on the server where Service Monitor is installed. See
Determining the Status of Windows SNMP Service, page 2-9.
Step 2If you determined that SNMP service was not installed, install Windows SNMP Service; see Installing
and Uninstalling Windows SNMP Service, page 2-9.
User Guide for Cisco Unified Service Monitor
OL-9351-01
Chapter 2 Data Management and System Administration
Determining the Status of Windows SNMP Service
Windows SNMP service is a Windows component that you can add or remove when you want to. To
enable SNMP queries against the MIB that Service Monitor supports, SNMP service must be installed
and enabled. You can verify the status of Windows SNMP service as follows.
Step 1Open the Windows administrative tool Services window.
Step 2Verify the following:
• SNMP Service is displayed on the Windows administrative tool Services window; if so, Windows
SNMP service is installed.
NoteTo install Windows SNMP service, see Installing and Uninstalling Windows SNMP Service,
page 2-9.
• SNMP Service startup type is Automatic or Manual; if so, Windows SNMP service is enabled.
Using SNMP to Monitor Service Monitor
NoteTo enable Windows SNMP service, see Enabling and Disabling Windows SNMP Service,
page 2-9.
Installing and Uninstalling Windows SNMP Service
Windows online help provides instructions for adding and removing Windows components, such as
Windows SNMP service. To locate the instructions, try selecting the Index tab in Windows online help
and entering a keyword or phrase, such as installing SNMP service.
To uninstall Windows SNMP service, follow instructions in Windows help for removing Windows
components.
Enabling and Disabling Windows SNMP Service
You can enable or disable Windows SNMP service using the Windows administrative tool Services. For
instructions to open the Services window, see Windows online help.
Step 1Locate SNMP Service in the Services window. The status and startup type are displayed.
NoteIf SNMP Service is not displayed, Windows SNMP service is not installed; see Installing and
Uninstalling Windows SNMP Service, page 2-9.
OL-9351-01
Step 2Right-click SNMP Service and select Properties. The SNMP Service Properties window opens:
• To disable SNMP service, set Startup Type to Disable and click OK.
• To enable SNMP service, set Startup Type to Automatic or Manual and click OK.
User Guide for Cisco Unified Service Monitor
2-9
Changing the Hostname on the Service Monitor Server
NoteTo start SNMP service after you enable it, right-click SNMP Service and select Start.
Configuring Security for SNMP Queries
To improve security, the SNMP set operation is not allowed on any object ID (OID). You should also
modify the credentials for SNMP service to not use a default or well-known community string.
NoteYou do not need to restart SNMP service to modify credentials for it.
You can modify SNMP service credentials using the Windows administrative tool Services.
Step 1Locate SNMP Service in the Services window
Step 2Right-click SNMP Service and select Properties. The SNMP Service Properties window opens.
Chapter 2 Data Management and System Administration
Step 3Select the Security tab.
Step 4Edit the accepted community names and click OK.
.
Viewing the System Application MIB Log File
The system application MIB log file, SysAppl.log, is located on the server where Service Monitor is
installed in NMSROOT\log.
NoteNMSROOT is the directory where Service Monitor is installed on your system. If you selected the
default directory during installation, it is C:\Program Files\CSCOpx.
Changing the Hostname on the Service Monitor Server
To change the hostname for the Service Monitor server, you must update several files, reboot the server,
and regenerate the self-signed security certificate. Afterward, you must update the configuration on
Service Monitor.
Changing the Hostname, Rebooting the Server, and Regenerating the Certificate
NoteYou will reboot the server twice during this procedure. You will also stop the daemon manager to
perform some steps.
User Guide for Cisco Unified Service Monitor
2-10
OL-9351-01
Chapter 2 Data Management and System Administration
Step 1Change the hostname on the server as follows:
a. Stop the daemon manager by entering the following command:
net stop crmdmgtd
b. Change the hostname at My Computer > Properties > Computer Name > Change.
c. Prevent the daemon manager service from restarting after reboot. From Control panel, or from Start,
open Services and change the startup mode to Manual for the CW2000 Daemon Manager service.
d. Reboot the server.
Step 2Change the hostname in the md.properties file (NMSROOT\lib\classpath\md.properties).
NoteNMSROOT is the directory where you installed Service Monitor. If you selected the default, it
is C:\Program Files\CSCOpx.
Step 3Change the hostname in the following registry entries:
• HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet.
Changing the Hostname on the Service Monitor Server
-q update PIDM_app_device_map SET app_hostname=`NewhostName' where
app_hostname=`OldhostName'
where:
• dbpassword is the Common Services database password.
• NMSROOT is the directory where you installed Service Monitor.
• NewhostName is the new hostname.
• OldhostName is the old hostname.
Chapter 2 Data Management and System Administration
Step 10From the Control panel, or from Start, open Services and change the startup mode to Automatic for the
CW2000 Daemon Manager service.
Step 11Reboot the server.
Step 12Replace the old hostname with the new hostname in the self-signed security certificate and regenerate it:
a. Select Common Services > Server > Security > Certificate Setup.
b. For more information, click Help.
Step 13Reconfigure Service Monitor. See Reconfiguring Service Monitor after a Hostname Change, page 2-12.
Reconfiguring Service Monitor after a Hostname Change
You must complete this procedure after you complete the procedure Changing the Hostname, Rebooting
the Server, and Regenerating the Certificate, page 2-10.
Step 1Change the IP address or hostname in each of the following configuration files:
• The default configuration file—See Editing the Default Configuration (Automatic Registration),
page 1-12.
• The specific configuration file for each Cisco 1040 managed by the Service Monitor—See Editing
the Configuration for a Specific Cisco 1040, page 1-11.
Step 2Copy the updated configuration files from the Service Monitor server to the TFTP server. See Copying
Image and Configuration Files to the TFTP Server, page 1-4.
2-12
User Guide for Cisco Unified Service Monitor
OL-9351-01
Chapter 2 Data Management and System Administration
Changing the IP Address on the Service Monitor Server
Step 3Reset the Cisco 1040s. See Resetting a Cisco 1040, page 1-13.
Step 4If Service Monitor is configured to send traps to Operations Manager:
• If Operations Manager is installed on the same server as Service Monitor, set up Service Monitor to
send traps to the new hostname or IP address. See Setting Up Service Monitor, page 1-3.
• If Operations Manager is installed on another server, on Operations Manager, delete the Service
Monitor and add it again. For more information, see Operations Manager online help.
Changing the IP Address on the Service Monitor Server
Step 1Stop the daemon manager by entering the following command:
net stop crmdmgtd
Step 2Delete the gatekeeper.ior file from this directory:
NMSROOT\www\classpath
NoteNMSROOT is the folder where Service Monitor is installed on the server. If you selected the
default directory during installation, it is C:\Program Files\CSCOpx.
Step 3Change the IP address of the Service Monitor server.
Step 4Allow 15 minutes to elapse from the time you completed step 1, then restart the daemon manager by
entering the following command:
net start crmdmgtd
Step 5Reconfigure Service Monitor. See Reconfiguring Service Monitor after a Hostname Change, page 2-12.
OL-9351-01
User Guide for Cisco Unified Service Monitor
2-13
Changing the IP Address on the Service Monitor Server
Chapter 2 Data Management and System Administration
2-14
User Guide for Cisco Unified Service Monitor
OL-9351-01
APPENDIX
A
MIBs Used and SNMP Traps Generated
MIBS Used
Service Monitor uses the CISCO-SYSLOG-MIB to generate SNMP traps.
SNMP Traps Generated
Cisco Unified Service Monitor (Service Monitor) generates the following traps:
• MOS violation
• Cisco 1040 unreachable
Trap details are provided as name-value pairs in clogHistMsgText field of the clogMessageGenerated
notification. Tab le A- 1 lists details of the MOS violation SNMP trap.
Table A-1MOS Violation Trap Details
TAGDescriptionValue
TTTrap type1
01Cisco 1040 ID<letter><3-digit numeric value less than 1000>
02Timestamp<YYYYMMDDhhmm>
03Threshold value2-digit number with an implied decimal point
between the first and second digits
AFlag indicating actual or sampled data0: Actual
OL-9351-01
1: Sampled
BSource device IP address IPv4 address, for example:
F0.F0.F0.58
CRecipient device IP addressIPv4 address, for example:
F0.F0.F0.58
DCodec of call data record2: G711Alaw 64k
6: G722 64k
9: G7231
10: G728
11: G729
ECalculated MOS score2-digit number with an implied decimal point
between the first and second digit
User Guide for Cisco Unified Service Monitor
A-1
Appendix A MIBs Used and SNMP Traps Generated
Table A-1MOS Violation Trap Details (continued)
TAGDescriptionValue
FPrimary cause of call degradationJ: Jitter
P: Packet Loss
GActual packet loss in the previous minute <numeric value>
HActual jitter in msec in the previous
minute
Table A-2 lists details of the Cisco 1040 unreachable SNMP trap.
Table A-2Cisco 1040 Unreachable Trap Details
TAGDescriptionValue
TTTrap type2
01Cisco 1040 ID<letter><3-digit numeric value less than 1000>
02Timestamp<YYYYMMDDhhmm>
<numeric value>
A-2
User Guide for Cisco Unified Service Monitor
OL-9351-01
Licensing
This appendix provides licensing information for Cisco Unified Service Monitor (Service Monitor). It
contains the following sections:
• Licensing Overview, page B-1
• Licensing Reminders, page B-4
Licensing Overview
Licensing ensures that you possess a licensed copy of Service Monitor and enables you to increase the
number—up to 50—of Cisco 1040s that Service Monitor supports. To determine whether Service
Monitor is licensed, see Verifying Service Monitor License Status, page B-1. If you do not have a license
or you want to ugprade your license, see Licensing Scenarios, page B-2.
APPENDIX
B
Verifying Service Monitor License Status
Use this procedure to determine the status of the Service Monitor license and the number of Cisco 1040s
that Service Monitor supports.
Step 1Select the CiscoWorks link in the upper righthand corner of the Service Monitor home page. A new
window opens.
Step 2Select Common Services > Server > Admin > Licensing. The Licensing Information page appears,
displaying the information in the following table.
OL-9351-01
User Guide for Cisco Unified Service Monitor
B-1
Licensing Overview
Appendix B Licensing
ColumnDescription
Name Abbreviated product name—For Service Monitor, this is SM.
Version Product version—A.b.c, where A is the major version number, b is
the minor version number, and c is the service pack number. For
example, SM 1.1.0 indicates version 1.1 without service packs.
Size Limit—Number of Cisco 1040s that Service Monitor supports.
NoteService Monitor supports a maximum of 50 Cisco 1040s.
Status One of the following:
• Purchased—You have a registered, licensed product.
• Evaluation—This license will expire on the expiration date;
Service Monitor will stop running.
Expiration DateDate on which Service Monitor stops running. Applies to evaluation
licenses.
Licensing Scenarios
Table B-1 describes what to do in different scenarios if you do not have a licensed, registered copy of
Service Monitor or if you want to increase device support.
NoteWhen you purchase Service Monitor software, it comes with a PAK that enables support for up to
10 Cisco 1040 Sensors. You can purchase additional upgrade licenses in increments of 10 to support up
to 50 Cisco 1040 Sensors on a single Service Monitor server.
Table B-1How to Obtain and Register a License
ScenarioWhat to do
Service Monitor
included with Operations Manager
Service Monitor
standalone installation
Service Monitor
installed standalone with an evaluation
license
Service Monitor
support for additional Cisco 1040s
Moving Service Monitor to another
server
See Licensing Process, page B-3.
See Quick Start Guide for Cisco Unified Service Monitor 1.1.
Obtain a PAK and license file for the installed version of
Service Monitor to upgrade an evaluation license to a
purchased license. See Licensing Process, page B-3.
See Licensing Process, page B-3.
NoteEach time you register a license for additional device
support, you license size increases correspondingly.
Call Cisco Technical Assistance Center (TAC) for assistance.
B-2
User Guide for Cisco Unified Service Monitor
OL-9351-01
Appendix B Licensing
Licensing Process
For information on when it is appropriate to use this process, see Licensing Scenarios, page B-2. To
license Service Monitor, do the following:
1. Obtain a Product Authorization Key (PAK)—You need a PAK, along with the MAC address of the
server where you will install Service Monitor, to obtain a license file. See Obtaining a PAK, page
B-3.
2. Obtain a license file—You need a license file to register your product or upgrade on the server where
Service Monitor is installed. See Obtaining a License File, page B-3.
3. Copy the license file to the server where Service Monitor is installed and register the license file.
See Registering a License File, page B-3.
Obtaining a PAK
Obtain a PAK for…By
Service Monitor
included with Operations
Manager
Service Monitor
installed standalone
Service Monitor
support for additional
Cisco 1040s
Licensing Overview
Purchasing Service Monitor software.
Locating it on the software claim certificate that is shipped with the
Service Monitor product CD.
Purchasing one or more licenses to add support to Service Monitor
for additional Cisco 1040s up to a maximum of 50.
NoteLicenses for additional device support are sold in
increments of 10. See the Cisco ordering tool for
information.
Obtaining a License File
Step 1Enter the PAK and the MAC address of the system where Service Monitor is installed at the following
URL
http://www.cisco.com/go/license.
The license file will be e-mailed to you.
After you obtain a license file, register the license on the server where Service Monitor is installed.
Registering a License File
Step 1Copy the license file to the Service Monitor server with read permission for casuser.
NoteService Monitor uses casuser to perform tasks that require Administrator privilege.
OL-9351-01
User Guide for Cisco Unified Service Monitor
B-3
Licensing Reminders
NoteIf you copy a folder that contains the license file to the Service Monitor server, be sure to provide
read permission for casuser on the folder as well as on the license file.
Step 2Enter the license file location:
a. Click the CiscoWorks link from the upper righthand corner of the Service Monitor home page.
b. Select Common Services > Server > Admin > Licensing. For more information, click Help.
NoteIf you registered a license for additional device support, the size displayed on the Licensing Information
page increases. See Verifying Service Monitor License Status, page B-1.
Licensing Reminders
Appendix B Licensing
Service Monitor provides reminders in the following circumstances:
• Evaluation Version: Before Expiry, page B-4
• License Size Exceeded, page B-4
Evaluation Version: Before Expiry
If you have installed the evaluation version of Service Monitor, you must obtain the license file from
Cisco.com before expiry of the default evaluation license. For details, see Licensing Process, page B-3.
When you start Service Monitor, a licensing reminder is displayed. Before expiry of the evaluation
license, you will see the following prompt for 1 day:
Go to Cisco.com and purchase Service Monitor
This message is displayed as an alert after you log in and try to access Service Monitor. If you fail to
upgrade your evaluation license within 1 day, access to Service Monitor functionality will be prohibited.
License Size Exceeded
Service Monitor supports only the number of Cisco 1040s specified by your license. (See Ve ri fy in g
Service Monitor License Status, page B-1.) After the number of Cisco 1040s registered to Service
Monitor matches the number specified by your license:
• If you try to add a Cisco 1040 manually, an error message is displayed and you cannot proceed.
• If automatic registration is enabled and a Cisco 1040 tries to register with Service Monitor, Service
Monitor does not allow the registration and writes error messages to the LicenseCheck.log file
located in NMSROOT\log\qovr; examples of the error messages follow:
07-Feb-2006|12:52:08.351|ERROR|LicenseCheck|Thread-3|Checking for License...
07-Feb-2006|12:52:08.507|ERROR|LicenseCheck|Thread-3|License Passed. Max count is:10
07-Feb-2006|12:55:08.570|ERROR|LicenseCheck|Thread-3|The number of sensors added to system
are:13
07-Feb-2006|12:55:08.570|ERROR|LicenseCheck|Thread-3|The maximum licensed sensor count
B-4
User Guide for Cisco Unified Service Monitor
OL-9351-01
Appendix B Licensing
Licensing Reminders
is:10
07-Feb-2006|12:55:08.570|ERROR|LicenseCheck|Thread-3|Purchase incremental License to
support more Cisco 1040 sensors
07-Feb-2006|12:55:08.570|ERROR|LicenseCheck|Thread-3|Auto registration disabled until
space available
07-Feb-2006|12:55:08.617|ERROR|LicenseCheck|Thread-3|Due to lack of sufficient license
will drop sensor:MacAddress:001120FFCF5E
Id:A111
IPAddress:172.20.4.72
PrimaryReceiver:171.69.69.179
SecondaryReceiver:null
ImageFileName:null
LastResetTime:1139345651898
Status:Registered
Description:null
07-Feb-2006|12:55:08.648|ERROR|LicenseCheck|Thread-3|Due to lack of sufficient license
will drop sensor:MacAddress:001120FFCF5C
Id:A112
IPAddress:172.20.4.66
PrimaryReceiver:171.69.69.179
SecondaryReceiver:null
ImageFileName:null
LastResetTime:1139345654757
Status:Registered
Description:null
07-Feb-2006|12:55:08.679|ERROR|LicenseCheck|Thread-3|Due to lack of sufficient license
will drop sensor:MacAddress:001120FFCF64
Id:A113
IPAddress:172.20.4.73
PrimaryReceiver:171.69.69.179
SecondaryReceiver:null
ImageFileName:null
LastResetTime:1139345659867
Status:Registered
Description:null
OL-9351-01
User Guide for Cisco Unified Service Monitor
B-5
Licensing Reminders
Appendix B Licensing
B-6
User Guide for Cisco Unified Service Monitor
OL-9351-01
Service Monitor Support for SNMP MIBs
Service Monitor implements the system application MIB using SNMP v2 and supplies an an SNMP
subagent. You can use simple SNMP queries to monitor the health of applications in the Cisco Unified
Communications Management suite that supports the MIBs.
For information about configuring your system to use SNMP to manage Service Monitor and other Cisco
Unified applications, see Using SNMP to Monitor Service Monitor, page 2-8.
System Application MIB Implementation
The system application MIB, defined in RFC 2287, provides applications installed, processes running
for an application, and past run information. You can use the information in the system application MIB
to determine the overall health of Service Monitor and drill down to the actual processes running for the
application.
For more information about the system application MIB, you can browse MIB information at the
following URL:
For an example of the data stored in this MIB, see the Sample MIB Walk for System Application MIB,
page C-8.
APPENDIX
C
System Application Resource MIB Tables
This section describes MIB tables that contain the following information:
• Installed Packages, page C-2
• Installed Elements, page C-2
• Package Status Information, page C-3
• Element Status Information, page C-4
• Status of Packages When They Ran Previously, page C-5
• Status of Elements When They Ran Previously, page C-5
• Process Map, page C-7
• Scalar Variables, page C-6
OL-9351-01
User Guide for Cisco Unified Service Monitor
C-1
Appendix C Service Monitor Support for SNMP MIBs
System Application MIB Implementation
Installed Packages
Table C-1 stores information for installed packages for Service Monitor and other applications in the
Cisco Unified Management Suite that support the system application MIB.
Table C-1sysApplInstallPkgTable
MIB Row EntryDescription from the MIB
sysApplInstallPkgIndexPart of the index for this table. An integer used
only for indexing purposes. Generally
monotonically increasing from 1 as new
applications are installed.
sysApplInstallPkgManufacturerThe manufacturer of the software application
package.
sysApplInstallPkgProductName The name assigned to the software application
package by the manufacturer.
sysApplInstallPkgVersionThe version number assigned to the application
package by the manufacturer of the software.
sysApplInstallPkgSerialNumber The serial number of the software assigned by
the manufacturer.
sysApplInstallPkgDateThe date and time this software application was
installed on the host.
sysApplInstallPkgLocationThe complete pathname where the application
package is installed.
Cisco Unified Communications
Management Suite Usage
Running number for each application
registered with the SNMP subagent.
Cisco Systems, Inc.
Name provided when the application
was registered with the SNMP
subagent, such as Cisco Unified Service
Monitor 1.0.
NoteUse this name to select an
application to watch.
Version number such as 1.0.2, where 1
is the major version, 0 is the minor
version, and 2 is the patch version or
incremental device update (IDU)
number.
“n/a”
—
NMSROOT—Directory where Service
Monitor is installed. If you selected the
default directory during installation, it
is C:\Program~1\CSCOpx.
Installed Elements
User Guide for Cisco Unified Service Monitor
C-2
For each entry in the installed packages table, Table C-1 , there can be many entries in the installed
element table, Table C-2. The number of installed elements for a package corresponds to the number of
processes being monitored for that package.
Table C-2 lists the contents of sysApplInstallElmtTable.
OL-9351-01
Appendix C Service Monitor Support for SNMP MIBs
System Application MIB Implementation
Table C-2sysApplInstallElmtTable
Cisco Unified Communications
MIB Row EntryDescription from the MIB
sysApplInstallPkgIndexPart of the index for this table. This value identifies
the installed software package for the application of
which this process is a part.
sysApplInstallElmtIndexUnique number across the applications. Running number.
sysApplInstallElmtNameThe name assigned to the software element package
by the manufacturer.
sysApplInstallElmtTypeThe type of element that is part of the installed
application.
sysApplInstallElmtDateThe date and time that this component was installed
on the system.
sysApplInstallElmtPathInstall location for this applicationNMSROOT—Directory where
sysApplInstallInstallElmt
The installed file size in 2
32
byte blocks.Default 0 (not implemented).
SizeHigh
sysApplInstallInstallElmt
The installed file size in 2
32
byte blocks.Default 0 (not implemented).
SizeLow
sysApplInstallElmtRoleAn operator-assigned value used in the determination
of application status.
Management Suite Usage
Value from
sysApplInstallPkgTable,
Table C-1.
Process name used in the daemon
manager (not a file or executable
name as specified in RFC 2287).
Default application(5).
NoteAll dates and times are
formatted using SNMPv2
textual conventions.
Service Monitor is installed. If you
selected the default directory
during installation, it is
C:\Program~1\CSCOpx.
Value used in determining
application status:
• required(3)—Process that
must run for the application to
be considered running.
sysApplInstallElmtModifyDateThe date and time that this element was last modified.
sysApplInstallCurSizeHighThe current file size in 2
sysApplInstallCurSizeLowThe current file size in 2
32
byte blocks.Default 0 (not implemented).
32
byte blocks.Default 0 (not implemented).
Package Status Information
Table C-3 supplies current application status for Service Monitor and other applications in the Cisco
Unified Management Suite that support the system application MIB.
User Guide for Cisco Unified Service Monitor
OL-9351-01
• unknown(5)—Optional
process.
NoteAll dates and times are
formatted using SNMPv2
textual conventions.
C-3
Appendix C Service Monitor Support for SNMP MIBs
System Application MIB Implementation
Table C-3sysApplRunTable
MIB Row EntryDescription from the MIB
sysApplInstallPkgIndexPart of the index for this table. This value identifies
the installed software package for the application of
which this process is a part.
sysApplRunIndexPart of the index for this table. An arbitrary integer
used only for indexing purposes. Generally,
monotonically increasing from 1 as new applications
are started on the host, it uniquely identifies
application invocations.
sysApplRunStartedThe date and time that the application was started.
sysApplRunCurrentStateThe current state of the running application instance.
The possible values are running(1), runnable(2) but
waiting for a resource such as CPU, waiting(3) for an
event, exiting(4), or other(5).
Cisco Unified Communications
Management Suite Usage
Value from
sysApplInstallPkgTable,
Table C-1.
Running number.
NoteAll dates and times are
formatted using SNMPv2
textual conventions.
This value is the measure of
application health:
• running(1)—All required
processes are running.
Element Status Information
Table C-4 provides current status for processes that belong to each application that is currently running.
Table C-4sysApplElmtRunTable
MIB Row EntryDescription from the MIB
sysApplElmtRunInstallPkgPart of the index for this table. This value identifies
the installed software package for the application of
which this process is a part.
sysApplElmtRunInvocIDPart of the index for this table. This value identifies
the invocation of an application of which this process
is a part.
sysApplElmtRunIndexPart of the index for this table. A unique value for
each process running on the host.
• other(5)–One or more
required processes are not
running.
When all required processes stop
or the daemon manager stops, this
entry moves to the
sysApplPastRun table.
Cisco Unified Communications
Management Suite Usage
Value from
sysApplInstallPkgTable,
Table C-1.
Default 0.
NoteService Monitor processes
run independently and are
not invoked by any other
process.
Process ID in the operating
system.
C-4
User Guide for Cisco Unified Service Monitor
OL-9351-01
Appendix C Service Monitor Support for SNMP MIBs
System Application MIB Implementation
Table C-4sysApplElmtRunTable (continued)
Cisco Unified Communications
MIB Row EntryDescription from the MIB
sysApplElmtRunInstallIDPart of the index for this table. The value of this object
is the same value as sysApplInstallElmtIndex for the
application element of which this entry represents a
running instance.
sysApplElmtRunTimeStartedThe time the process was started.—
sysApplElmtRunStateThe current state of the running process. The possible
values are running(1), runnable(2) but waiting for a
resource such as CPU, waiting(3) for an event,
exiting(4), or other(5).
sysApplElmtRunNameThe full path and filename of the process.—
sysApplElmtRunParametersThe starting parameters for the process.—
sysApplElmtRunCPUHundredths of a second of the total system CPU
resources consumed by this process.
sysApplElmtRunMemoryThe total amount of real system memory, measured in
kilobytes, currently allocated to this process.
sysApplElmtRunNumFilesThe number of regular files that the process currently
has open.
sysApplElmtRunUserThe process owner's login name.Either casuser or SYSTEM.
Management Suite Usage
Value from
sysApplInstallElmtTable,
Table C-2.
If all processes are running
successfully, value is running(1).
NoteIf the process terminates,
the process entry moves to
the sysElmtPastRun table.
Obtained from the operating
system.
Obtained from the operating
system.
Default 0 (not implemented).
Status of Packages When They Ran Previously
Table C-5 contains the status of applications when they ran previously.
Table C-5sysApplPastRunTable
MIB Row EntryDescription from the MIB
sysApplInstallPkgIndexValue from sysApplInstallPkgTable, Table C-1.
sysApplPastRunIndexPart of the index for this table. An arbitrary integer used only for indexing purposes.
Generally monotonically increasing from 1 as new applications are started on the host, it
uniquely identifies application invocations.
sysApplPastRunStartedThe date and time that the application started.
NoteAll dates and times are formatted using SNMPv2 textual conventions.
sysApplPastExitStateThe state of the application instance when it was terminated.
sysApplPastRunEndedThe date and time the application instance was determined to be no longer running.
NoteAll dates and times are formatted using SNMPv2 textual conventions.
Status of Elements When They Ran Previously
Table C-6 contains the status of processes when they ran previously.
OL-9351-01
User Guide for Cisco Unified Service Monitor
C-5
Appendix C Service Monitor Support for SNMP MIBs
System Application MIB Implementation
Table C-6sysApplElmtPastRunTable
MIB Row EntryDescription from the MIB
sysApplElmtPastRunInvocIDPart of the index for this table. Identifies the invocation of an application of which
this process is a part.
sysApplElmtPastRunIndex Part of the index for this table. A unique value for each process running on the host.
sysApplElmtPastRunInstallIDPart of the index for this table. The value of this object is the same value as the
sysApplInstallElmtIndex for the application element of which this entry represents
a running instance.
sysApplElmtPastRunTimeStartedThe time the process was started.
sysApplElmtPastRunTimeEndedThe time the process was ended.
sysApplElmtPastRunNameThe full path and filename of the process.
sysApplElmtPastRunParametersThe starting parameters for the process.
sysApplElmtPastRunCPUThe last known number of hundredths of a second of the total system CPU resources
consumed by this process.
sysApplElmtPastRunMemoryThe last known total amount of real system memory, measured in kilobytes,
allocated to this process before it terminated.
sysApplElmtPastRunNumFilesThe number of regular files that the process currently has open.
sysApplElmtPastRunUserThe process owner's login name.
Scalar Variables
These variables are used to control MIB table size. You cannot update them.
Table C-7Scalars
MIB Row EntryDescription from the MIBDefault Value
sysApplPastRunMaxRowsMaximum number of entries allowed in the sysApplPastRun table. 2000
sysApplPastRunTableRemItemsCounter for entries removed from the sysApplPastRun table after
the maximum number (sysApplPastRunMaxRows) of entries are
exceeded.
sysApplPastRunTblTimeLimitMaximum time that an entry in the sysApplPastRun table can exist
before being removed.
sysApplElemPastRunMaxRowsMaximum number of entries allowed in the
sysApplElmtPastRuntable.
sysApplElemPastRunTableRemItemsCounter for entries removed from the sysApplElmtPastRun table
after the maximum number (sysApplElemPastRunMaxRows) of
entries are exceeded.
SysApplElemPastRunTblTimeLimitMaximum time that an entry in the sysApplElmtPastRunTable can
exist before being removed.
sysApplAgentPollIntervalMinimum interval at which polling to obtain the status of the
managed resources occurs.
20 entries
86400 seconds
(1 day)
2000 entries
20 entries
86400 seconds
(1 day)
60 seconds
C-6
User Guide for Cisco Unified Service Monitor
OL-9351-01
Appendix C Service Monitor Support for SNMP MIBs
System Application MIB Implementation
Process Map
The sysApplMapTable contains one entry for each process currently running on the system. Tab l e C- 8
provides the index mapping from a process identifier to the invoked application, installed element, and
installed application package.
This example shows abridged output from a MIB walk of the SYS-APPL-MIB on a system where Cisco
Unified Operations Manager and Service Monitor are installed.
***** SNMP QUERY STARTED *****
1: sysApplInstallPkgManufacturer.1 (octet string) Copyright (c) 2004 by Cisco Systems,
Inc.
[43.6F.70.79.72.69.67.68.74.20.28.63.29.20.32.30.30.34.20.62.79.20.43.69.73.63.6F.20.5
3.79.73.74.65.6D.73.2C.20.49.6E.63.2E (hex)]
2: sysApplInstallPkgManufacturer.2 (octet string) Copyright (c) 2004 by Cisco Systems,
Inc.
[43.6F.70.79.72.69.67.68.74.20.28.63.29.20.32.30.30.34.20.62.79.20.43.69.73.63.6F.20.5
3.79.73.74.65.6D.73.2C.20.49.6E.63.2E (hex)]
3: sysApplInstallPkgProductName.1 (octet string) Cisco Unified Service Monitor
This section describes how to configure Service Monitor with Cisco Secure ACS:
• Before You Begin: Integration Notes, page D-1
• Configuring Service Monitor on Cisco Secure ACS, page D-3
• Verifying the Service Monitor and Cisco Secure ACS Configuration, page D-3
Before You Begin: Integration Notes
NoteYou can integrate Service Monitor with Cisco Secure ACS only if they are installed on separate systems
because Service Monitor must be configured as an AAA client for Cisco Secure ACS.
APPENDIX
D
For information about Common Services login modules and user roles, see Configuring Users (ACS and
Non-ACS), page 2-5.
This section contains the following notes, which you should read before you begin Cisco Secure ACS
and Service Monitor integration:
• Multiple instances of the same application using the same Cisco Secure ACS will share settings. Any
changes will affect all instances of that application.
• If an application is configured with Cisco Secure ACS and then that application is reinstalled, it will
inherit the old settings.
NoteThis is applicable if you are using Cisco Secure ACS version 3.2.3 or earlier.
• You must create roles in Cisco Secure ACS for each Cisco Unified Communications Management
Suite application that is running on the Service Monitor server.
For example: You must create roles in Cisco Secure ACS for Service Monitor. These roles are not
shared by any other Cisco Unified Communications Management Suite application.
• The roles that you create in Cisco Secure ACS are shared across all Service Monitor servers that are
configured to the same Cisco Secure ACS.
OL-9351-01
User Guide for Cisco Unified Service Monitor
D-1
Before You Begin: Integration Notes
For example: You have configured threeService Monitor servers with a Cisco Secure ACS, and you
have created a role in Cisco Secure ACS for Service Monitor (say, SMSU). This role is shared by
licensed versions of Service Monitor running on all three servers.
• A user can have different access privileges for different Cisco Unified Communications
Management Suite applications.
For example: A user, SMSU, can have the following privileges:
–
System Administrator for Service Monitor
–
Network Operator for Operations Manager
–
Network Administrator for Service Monitor
–
Help Desk for Operations Manager
• Using Common Services, you must do the following:
–
Set AAA Mode to ACS—You will need to supply the following information obtained from
Cisco Secure ACS to complete this task: IP address or hostname, port, admin username and
password, and shared secret key.
NoteWhen you set Common Services AAA mode to ACS, all Cisco Unified Communications
Appendix D Configuring Service Monitor with Cisco Secure ACS
Management Suite applications running on the same server register with
Cisco Secure ACS and use it for authentication and authorization. If Service Monitor
and Operations Manager are installed on a server in ACS mode, all of the following use
Cisco Secure ACS: Service Monitor, Operations Manager, and Common Services.
–
Set up System Identity Setup username. This user was configured during Service Monitor
installation. For more information, click the CiscoWorks link on the Service Monitor home page
and select Common Services > Server > Security > Multi-Server Trust Management > System Identity Setup.
• On Cisco Secure ACS, you must configure a user with the same username as the System Identity
Setup user. For Service Monitor, that user must have Network Administrator privileges on Cisco
Secure ACS.
• In ACS mode, fallback is provided for authentication only. (Fallback options allow you to access
Service Monitor if the login module fails, or you accidentally lock yourself or others out.) If
authentication with ACS fails, Service Monitor does the following:
1. Tries authentication using non-ACS mode (CiscoWorks local mode).
2. If non-ACS authentication is successful, presents you with a dialog box with instructions to
change the login mode to CiscoWorks local. (You can do so only if you have permission to
perform that operation in non-ACS mode.)
NoteYou will not be allowed to log in if authentication fails in non-ACS mode.
For details on configuring ACS mode, click the CiscoWorks link on the Service Monitor home page and
select Common Services > Server > Security > AAA Mode and click Help.
D-2
User Guide for Cisco Unified Service Monitor
OL-9351-01
Appendix D Configuring Service Monitor with Cisco Secure ACS
Configuring Service Monitor on Cisco Secure ACS
Configuring Service Monitor on Cisco Secure ACS
After you complete setting the CiscoWorks server to ACS mode with Cisco Secure ACS, perform the
following tasks on Cisco Secure ACS:
1. Click Shared Profile Components to verify that the Cisco Unified Service Monitor (Service
Monitor) application entry is present.
2. Based on your authentication setting (per user or per group) on Cisco Secure ACS, click either User
Setup or Group Setup.
On Cisco Secure ACS, verify the per user or per group setting for Cisco Unified Service Monitor
using Interface Configuration > TACACS + (Cisco IOS).
3. Assign the appropriate Service Monitor privileges to the user or group.
For Service Monitor, you must ensure that a user with the same name as the System Identity Setup
user is configured on Cisco Secure ACS and has Network Administrator privileges.
NoteYou configured the System Identity Setup user during Service Monitor installation. For more
information, click the CiscoWorks link on the Service Monitor home page and select
Common Services > Server > Security > Multi-Server Trust Management > System
Identity Setup.
You can modify roles on Cisco Secure ACS.
Step 1Select Shared Profile Components > Cisco Unified Service Monitor.
Step 2Click the Service Monitor role that you want to modify.
Step 3Select the Service Monitor tasks that suit your business workflow and needs.
Step 4Click Submit.
NoteIf desired, you can also create new roles on Cisco Secure ACS.
Verifying the Service Monitor and Cisco Secure ACS
Configuration
After performing the tasks in Configuring Service Monitor on Cisco Secure ACS, page D-3, verify the
configuration as follows:
1. Log in to Service Monitor with the username defined in Cisco Secure ACS.
2. Try to perform tasks, to ensure that you can perform only those tasks that you are entitled to perform
based on your privileges on Cisco Secure ACS.
OL-9351-01
For example: If your privilege is Help Desk, then:
–
You should be able to view the Cisco 1040s that are managed by Service Monitor.
User Guide for Cisco Unified Service Monitor
D-3
Verifying the Service Monitor and Cisco Secure ACS Configuration
–
You should not be able to add Cisco 1040s for Service Monitor to manage, and you should not
be able to delete them.
Appendix D Configuring Service Monitor with Cisco Secure ACS
D-4
User Guide for Cisco Unified Service Monitor
OL-9351-01
INDEX
A
AAA mode 2-5, D-2
ACS mode
authentication
2-5
modifying user roles and privileges 2-7
users, configuring2-6
using Service Monitor2-7
administering Service Monitor
SNMP, using to manage Service Monitor
queries, configuring for
2-8
security, configuring for queries 2-10
system application MIB log file, viewing 2-10
archiving call metrics
disabling
1-3
enabling1-3
audience for this documentvii
authentication
ACS mode
2-5
and authorization2-5
fallback mode D-2
non-ACS mode 2-5
automatic registration 1-12
B
backing up
call metrics files
2-1
C
call metrics
archiving, enabling and disabling
1-3
files2-1
backing up2-1
data format1-17
deleting2-1
location of 1-17
cautions
significance of
viii
Cisco 1040
adding
1-9
default configuration 1-12
deleting1-15
failover1-13
ID
format
1-3
starting 1-3
image file1-4
maximum number supported B-1
registration
automatic
1-12
manual1-9
resetting 1-13
unreachable, trap1-17, A-2
web interface1-15
Cisco Secure Access Control Server (ACS)2-5
Cisco Unified Operations Manager, as a trap receiver1-4
configuring
Cisco 1040, editing
1-11
DHCP1-5
DNS1-5
system
SNMP queries
2-8
users2-6
CiscoWorks local login module 2-5
OL-9351-01
User Guide for Cisco Unified Service Monitor
IN-1
Index
using ACS mode2-6
copying files to TFTP server 1-4
D
database
password, changing
debugging, enabling 2-3
deleting
Cisco 1040
1-15
files from TFTP server1-15
DHCP, configuring 1-5
disabling
automatic registration
call metrics archiving 1-3
debugging2-3
DNS, configuring1-5
documentation viii
audience for thisvii
typographical conventions in vii
2-3, 2-11
1-3
log files 2-3
H
hostname, changing 2-10, 2-13
I
image file
copying to TFTP server
1-4
directory 1-3
updating 1-14
IP address, changing2-13
K
keepalive1-13
L
E
editing
Cisco 1040 configuration
default configuration1-12
enabling
automatic registration
1-3
call metrics archiving 1-3
F
failover, Cisco 1040 1-13
files
call metrics
configuration, copying1-4
history log file, maintaining 2-4
image, copying 1-4
2-1
1-11
license
number of devices supported, verifying
registeringB-3
licensing
overview
B-1
remindersB-4
log files
by module
2-5
debugging, enabling and disabling 2-3
history 2-4
location 2-3
maintaining 2-4
login
CiscoWorks login module
D-2
failureD-2
fallback mode D-2
B-1
IN-2
User Guide for Cisco Unified Service Monitor
OL-9351-01
Index
M
managing log files 2-3
MIBs
system application, log file
2-10
used by Service MonitorA-1
MOS
threshold, configuring
1-3
violation trap1-17, A-1
N
non-ACS mode
authentication
2-5
CiscoWorks Local Login module 2-5
users, configuring2-5
O
Operations Manager, as a trap receiver1-4
overview
licensing
B-1
Service Monitor 1-1
P
password, database2-3, 2-11
Permission Report 2-5
privileges, configuring on Cisco Secure ACS 2-7, D-3
processes
Service Monitor
2-8
starting and stopping 2-8
R
registering
Cisco 1040
automatic
1-12
manual 1-9
license, Service Monitor B-3
resetting
Cisco 1040
1-13
roles, user
Cisco Secure ACS, configuring
2-7
Cisco Secure ACS, modifying2-6
S
security
certificate
SNMP queries2-10
Service Monitor
hostname, changing
IP address, changing2-13
overview 1-1
processes2-8
setting up1-3
setting time
on Cisco 1040s
Windows time service 1-14
setting up Service Monitor 1-3
SNMP
queries
security
service2-9
trap receivers 1-4
SNMP, using to manage Service Monitor 2-8
SNMP queries, configuring for2-8
Windows SNMP Service, enabling or disabling 2-9
Windows SNMP Service, installing and
Windows SNMP Service status, determining 2-9
SNMP queries, configuring security for 2-10
system application MIB log file, viewing2-10
SNMP MIBs, Service Monitor support forC-1
system application MIB implementation C-1
sample MIB walkC-8
2-12
2-10
uninstalling
2-10, 2-13
1-14
2-9
OL-9351-01
User Guide for Cisco Unified Service Monitor
IN-3
Index
starting
Service Monitor
1-2
Service Monitor processes 2-8
stopping Service Monitor processes2-8
syslog
file
2-3
handling, during peak usage 2-3
service2-3
system administration
database password
2-3
system application MIB
sample MIB walk
C-8
system application MIB implementation C-1
resource MIB tablesC-1
element status informationC-4
installed elements C-2
installed packagesC-2
package status informationC-3
process mapC-7
scalar variablesC-6
status of elements previously runC-5
status of packages previously run C-5
sample MIB walkC-8
System Identity Setup User
in Common Services
D-2
on Cisco Secure ACSD-3
trap receivers
configuring
1-4
Operations Manager 1-4
port 1-4
troubleshooting
syslog messages
2-3
typographical conventions in this documentvii
U
updating image files 1-14
users
configuring
2-6
using ACS mode 2-6
using CiscoWorks local login module 2-5
privileges2-7
Permission Report2-5
roles2-7, D-1
System Identity Setup User D-1
V
viewing
log files
by module
2-5
T
TFTP server1-4
configuring1-3
image file 1-4
threshold, MOS, configuring 1-3
time
Cisco 1040, setting
Windows time service 1-14
trap
MOS violation
unreachable Cisco 10401-17, A-2
User Guide for Cisco Unified Service Monitor
IN-4
1-14
1-17, A-1
W
warning
syslog service
Windows SNMP Service
disabling
enabling2-9
installing 2-9
status, determining 2-9
uninstalling 2-9
Windows time service 1-14
2-3
2-9
OL-9351-01
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.