Cisco DNA Center on AWS Deployment Guide User Guide
- June 15, 2024
- Cisco
Table of Contents
Cisco DNA Center on AWS Deployment Guide
Product Information
The Cisco DNA Center on AWS is a deployment guide that provides detailed instructions for setting up and managing Cisco DNA Center on the Amazon Web Services (AWS) platform. This guide is designed to help users deploy Cisco DNA Center, a centralized network management and automation platform, on AWS.
Specifications
- First Published: 2023-08-02
- Last Modified: 2023-11-17
- Company: Cisco Systems, Inc.
- Headquarters: 170 West Tasman Drive San Jose, CA 95134-1706 USA
- Website: http://www.cisco.com
- Contact: Tel – 408 526-4000, Fax – 408 527-0883
Product Usage Instructions
Chapter 1: Get Started with Cisco DNA Center on AWS
In this chapter, you will find an overview of Cisco DNA Center on AWS and
the deployment process. It provides guidelines for preparing and accessing
Cisco DNA Center on AWS. Additionally, it explains the verification process
for the Cisco DNA Center VA TAR file.
Chapter 2: Deploy Using Cisco DNA Center VA Launchpad
This chapter explains the deployment process using the Cisco DNA Center VA
Launchpad. It provides step-by-step instructions for downloading and
installing Cisco DNA Center VA Launchpad on a local machine. It also covers
accessing the hosted version of Cisco DNA Center VA Launchpad provided by
Cisco. The chapter concludes with guidelines for integrating Cisco ISE on AWS
with Cisco DNA Center on AWS.
Chapter 3: Troubleshooting
This chapter provides troubleshooting steps for various issues that may
occur during the deployment process. It covers error troubleshooting related
to the Cisco DNA Center VA Launchpad, region issues, VA pod configuration
errors, network connectivity errors, Cisco DNA Center VA configuration errors,
concurrency errors, and other deployment issues.
Chapter 4: Deploy Using AWS CloudFormation
This chapter explains the deployment process using AWS CloudFormation. It
provides instructions for deploying Cisco DNA Center 2.3.5.3 on AWS using AWS
CloudFormation.
Chapter 5: Deploy Cisco DNA Center on AWS Manually Using AWS
CloudFormation
This chapter provides a manual deployment workflow using AWS
CloudFormation. It covers the prerequisites for manual deployment and step-by-
step instructions for deploying Cisco DNA Center on AWS manually using AWS
CloudFormation. The chapter also includes a validation process for the
deployment.
Chapter 6: Deploy Using AWS Marketplace
This chapter explains the deployment process using AWS Marketplace. It
provides instructions for deploying Cisco DNA Center 2.3.5.3 on AWS using AWS
Marketplace. It also covers manual deployment using AWS Marketplace and
includes a workflow and prerequisites for manual deployment. The chapter
concludes with a validation process for the deployment.
FAQ
Q: What is Cisco DNA Center on AWS?
A: Cisco DNA Center on AWS is a deployment guide that helps users set up
and manage Cisco DNA Center on the Amazon Web Services (AWS) platform.
Q: How many ways are there to deploy Cisco DNA Center on AWS?
A: There are three ways to deploy Cisco DNA Center on AWS: using Cisco DNA
Center VA Launchpad, AWS CloudFormation, or AWS Marketplace.
Q: What is Cisco DNA Center VA Launchpad?
A: Cisco DNA Center VA Launchpad is a tool provided by Cisco that
facilitates the installation and management of Cisco DNA Center Virtual
Appliance (VA).
Q: How can I troubleshoot deployment issues?
A: The troubleshooting chapter provides step-by-step instructions for
resolving various deployment issues, including errors related to the Cisco DNA
Center VA Launchpad, network connectivity, configuration, and more.
Cisco DNA Center on AWS Deployment Guide
First Published: 2023-08-02 Last Modified: 2023-11-17
Americas Headquarters
Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA
http://www.cisco.com Tel: 408 526-4000
800 553-NETS (6387) Fax: 408 527-0883
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco
and/or its affiliates in the U.S. and other countries. To view a list of Cisco
trademarks, go to this URL:
https://www.cisco.com/c/en/us/about/legal/trademarks.html. Third-party
trademarks mentioned are the property of their respective owners. The use of
the word partner does not imply a partnership relationship between Cisco and
any other company. (1721R)
© 2023 Cisco Systems, Inc. All rights reserved.
CHAPTER 1
PART I CHAPTER 2
Get Started with Cisco DNA Center on AWS 1 Cisco DNA Center on AWS Overview 1
Deployment Overview 2 Prepare for the Deployment 3 High Availability and Cisco
DNA Center on AWS 3 Guidelines for Integrating Cisco ISE on AWS with Cisco DNA
Center on AWS 4 Guidelines for Accessing Cisco DNA Center on AWS 4 Verify the
Cisco DNA Center VA TAR File 6
Deploy Using Cisco DNA Center VA Launchpad 9
Deploy Cisco DNA Center 2.3.5.3 on AWS Using Cisco DNA Center VA Launchpad 1.6
11 Deploy Cisco DNA Center on AWS Using the Automated Deployment Method 11
Automated Deployment Workflow 11 Prerequisites for Automated Deployment 12
Install Cisco DNA Center VA Launchpad 15 Access Hosted Cisco DNA Center VA
Launchpad 17 Create a Cisco Account 17 Create a Cisco DNA Portal Account 19
Log In to the Cisco DNA Portal with Cisco 22 Create a New VA Pod 25 Manually
Configure Routing on Existing Transit and Customer Gateways 35 Create a New
Cisco DNA Center VA 37 Troubleshoot the Deployment 42 Troubleshoot Docker
Errors 42 Troubleshoot Login Errors 43
Cisco DNA Center on AWS Deployment Guide iii
Contents
CHAPTER 3
PART II CHAPTER 4
Troubleshoot a Hosted Cisco DNA Center VA Launchpad Error 43 Troubleshoot
Region Issues 44 Troubleshoot VA Pod Configuration Errors 44 Troubleshoot a
Network Connectivity Error 46 Troubleshoot Cisco DNA Center VA Configuration
Errors 47 Troubleshoot Concurrency Errors 47 Troubleshoot Other Deployment
Issues 47
Deploy Cisco DNA Center 2.3.5.3 on AWS Using Cisco DNA Center VA Launchpad 1.5
49 Deploy Cisco DNA Center on AWS Using the Automated Deployment Method 49
Automated Deployment Workflow 49 Prerequisites for Automated Deployment 50
Install Cisco DNA Center VA Launchpad 53 Access Hosted Cisco DNA Center VA
Launchpad 55 Create a Cisco Account 55 Create a Cisco DNA Portal Account 57
Log In to the Cisco DNA Portal with Cisco 60 Create a New VA Pod 63 Manually
Configure Routing on Existing Transit and Customer Gateways 72 Create a New
Cisco DNA Center VA 74 Troubleshoot the Deployment 78 Troubleshoot Docker
Errors 78 Troubleshoot Login Errors 79 Troubleshoot a Hosted Cisco DNA Center
VA Launchpad Error 79 Troubleshoot Region Issues 80 Troubleshoot VA Pod
Configuration Errors 80 Troubleshoot a Network Connectivity Error 82
Troubleshoot Cisco DNA Center VA Configuration Errors 83 Troubleshoot
Concurrency Errors 83 Troubleshoot Other Deployment Issues 83
Deploy Using AWS CloudFormation 85
Deploy Cisco DNA Center 2.3.5.3 on AWS Using AWS CloudFormation 87
Cisco DNA Center on AWS Deployment Guide iv
Contents
PART III CHAPTER 5
Deploy Cisco DNA Center on AWS Manually Using AWS CloudFormation 87 Manual
Deployment Using AWS CloudFormation Workflow 87 Prerequisites for Manual
Deployment Using AWS CloudFormation 88 Deploy Cisco DNA Center on AWS Manually
Using AWS CloudFormation 93 Validate the Deployment 98
Deploy Using AWS Marketplace 99
Deploy Cisco DNA Center 2.3.5.3 on AWS Using AWS Marketplace 101 Deploy Cisco
DNA Center on AWS Manually Using AWS Marketplace 101 Manual Deployment Using
AWS Marketplace Workflow 101 Prerequisites for Manual Deployment Using AWS
Marketplace 101 Deploy Cisco DNA Center on AWS Manually Using AWS Marketplace
107 Validate the Deployment 107
Cisco DNA Center on AWS Deployment Guide v
Contents
Cisco DNA Center on AWS Deployment Guide vi
1 C H A P T E R
Get Started with Cisco DNA Center on AWS
· Cisco DNA Center on AWS Overview, on page 1 · Deployment Overview, on page 2
· Prepare for the Deployment, on page 3
Cisco DNA Center on AWS Overview
Cisco DNA Center offers centralized, intuitive management that makes it fast
and easy to design, provision, and apply policies across your network
environment. The Cisco DNA Center user interface provides end-to-end network
visibility and uses network insights to optimize network performance and
deliver the best user and application experience. Cisco DNA Center on Amazon
Web Services (AWS) provides the full functionality that a Cisco DNA Center
appliance deployment offers. Cisco DNA Center on AWS runs in your AWS cloud
environment and manages your network from the cloud.
Cisco DNA Center on AWS Deployment Guide 1
Deployment Overview
Get Started with Cisco DNA Center on AWS
Deployment Overview
There are three ways to deploy Cisco DNA Center on AWS:
· Automated Deployment: Cisco DNA Center VA Launchpad configures Cisco DNA
Center on AWS. It helps you create the services and components that are
required for the cloud infrastructure. For example, it helps create Virtual
Private Clouds (VPCs), subnets, security groups, IPsec VPN tunnels, and
gateways. Then the Cisco DNA Center Amazon Machine Image (AMI) deploys as an
Amazon Elastic Compute Cloud (EC2) instance with the prescribed configuration
in a new VPC along with subnets, transit gateways, and other essential
resources like Amazon CloudWatch for monitoring, Amazon DynamoDB for state
storage, and security groups.
Cisco provides two methods for you to use Cisco DNA Center VA Launchpad. You
can download and install Cisco DNA Center VA Launchpad on a local machine, or
you can access Cisco DNA Center VA Launchpad hosted by Cisco. Regardless of
the method, Cisco DNA Center VA Launchpad provides the tools you need to
install and manage your Cisco DNA Center Virtual Appliance (VA).
For the high-level procedure, see Deploy Using Cisco DNA Center VA Launchpad,
on page 9.
· Manual Deployment Using AWS CloudFormation: You manually deploy the Cisco
DNA Center AMI on your AWS. Instead of using the Cisco DNA Center VA Launchpad
deployment tool, you use AWS CloudFormation, which is a deployment tool within
AWS. Then you manually configure Cisco DNA Center by creating the AWS
infrastructure, establishing a VPN tunnel, and deploying your Cisco DNA Center
VA. For the high-level procedure, see Deploy Using AWS CloudFormation, on page
85.
· Manual Deployment Using AWS Marketplace: You manually deploy the Cisco DNA
Center AMI on your AWS account. Instead of using the Cisco DNA Center VA
Launchpad deployment tool, you use AWS Marketplace, which is an online
software store within AWS. You launch the software through the Amazon EC2
launch console, and then you manually deploy Cisco DNA Center by creating the
AWS infrastructure, establishing a VPN tunnel, and configuring your Cisco DNA
Center VA. Note that for this deployment method, only Launch through EC2 is
supported. The other two launch options (Launch from Website and Copy to
Service Catalog) are not supported. For the procedure, see Deploy Using AWS
Marketplace, on page 99.
If you have minimal experience with the AWS administration, the automated
method with Cisco DNA Center VA Launchpad offers the most streamlined,
supportive installation process. If you are familiar with the AWS
administration and have existing VPCs, the manual methods offer an alternative
installation process.
Consider the benefits and drawbacks of each method with the following table:
Cisco DNA Center on AWS Deployment Guide 2
Get Started with Cisco DNA Center on AWS
Prepare for the Deployment
Automated Deployment with Cisco Manual Deployment Using AWS Manual Deployment Using AWS
DNA Center VA Launchpad
CloudFormation
Marketplace
· It helps create the AWS infrastructure, such as VPCs, subnets, security
groups, IPsec VPN tunnels, and gateways, in your AWS account.
· It automatically completes the installation of Cisco DNA Center.
· The AWS CloudFormation file is required to create a Cisco DNA Center VA on
AWS.
· You create the AWS infrastructure, such as VPCs, subnets, and security
groups, in your AWS account.
· The AWS CloudFormation file is not required to create a Cisco DNA Center VA
on AWS.
· You create the AWS infrastructure, such as VPCs, subnets, and security
groups, in your AWS account.
· It provides access to your VAs.
· It provides manageability of your VAs.
· Deployment time is approximately 1- 1½ hours.
· You establish a VPN tunnel.
· You deploy Cisco DNA Center.
· Deployment time is approximately from a couple hours to a couple days.
· You establish a VPN tunnel.
· You deploy Cisco DNA Center.
· Deployment time is approximately from a couple hours to a couple days.
· Automated alerts are sent to your Amazon CloudWatch dashboard.
· You need to manually configure monitoring through the AWS console.
· You need to manually configure monitoring through the AWS console.
· You can choose between an automated cloud or enterprise Network File System (NFS) backup.
· You can only configure an on-premises NFS for backups.
· You can only configure an on-premises NFS for backups.
· Any manual alterations made to the automated configuration workflow of Cisco DNA Center on AWS can cause conflict with the automated deployment.
Prepare for the Deployment
Before you deploy Cisco DNA Center on AWS, consider your network requirements
and if you will need to implement supported Cisco DNA Center on AWS
integrations and how you will access Cisco DNA Center on AWS. In addition,
Cisco strongly recommends you verify that the Cisco DNA Center VA TAR file you
downloaded is a genuine Cisco TAR file. See Verify the Cisco DNA Center VA TAR
File, on page 6.
High Availability and Cisco DNA Center on AWS
The Cisco DNA Center on AWS high availability (HA) implementation is as
follows: · Single-node EC2 HA within an Availability Zone (AZ) is enabled by
default.
Cisco DNA Center on AWS Deployment Guide 3
Guidelines for Integrating Cisco ISE on AWS with Cisco DNA Center on AWS
Get Started with Cisco DNA Center on AWS
· If a Cisco DNA Center EC2 instance crashes, AWS automatically brings up
another instance with the same IP address. This ensures uninterrupted
connectivity and minimizes disruptions during critical network operations.
Note If you deploy Cisco DNA Center on AWS using Cisco DNA Center VA
Launchpad, Release 1.5.0 or earlier and a Cisco DNA Center EC2 instance
crashes, AWS automatically brings up another instance in the same AZ. In this
case, AWS may assign Cisco DNA Center a different IP address.
· The experience and Recovery Time Objective (RTO) are similar to a power
outage sequence in a bare-metal Cisco DNA Center appliance.
Guidelines for Integrating Cisco ISE on AWS with Cisco DNA Center on AWS
Cisco ISE on AWS can be integrated with Cisco DNA Center on AWS. To integrate
them together in the cloud, consider the following guidelines:
· Cisco ISE on AWS should be deployed in a separate VPC from the one reserved
for Cisco DNA Center VA Launchpad.
· The VPC for Cisco ISE on AWS can be in the same region as or a different
region from the VPC for Cisco DNA Center on AWS.
· You can use VPC or Transit Gateway (TGW) peering, depending on your
environment.
· To connect the Cisco DNA Center on AWS with Cisco ISE on AWS using a VPC or
TGW peering, add the required routing entries to the VPC or TGW peering route
tables and to the route table that is attached to the subnet associated with
Cisco DNA Center on AWS or Cisco ISE on AWS.
· Cisco DNA Center VA Launchpad cannot detect any out-of-band changes to
entities that were created by Cisco DNA Center VA Launchpad. These entities
include VPCs, VPNs, TGWs, TGW attachments, subnets, routing, and so on. For
example, it’s possible to delete or change a VA pod that was created by Cisco
DNA Center VA Launchpad from another application, and Cisco DNA Center VA
Launchpad would not know about this change.
In addition to basic accessibility rules, you need to allow the following
inbound ports for attaching a security group to the Cisco ISE instance in the
cloud:
· For Cisco DNA Center on AWS and Cisco ISE on AWS integration, allow TCP
ports 9060 and 8910.
· For radius authentication, allow UDP ports 1812, 1813, and any other enabled
ports.
· For device administration via TACACS, allow TCP port 49.
· For additional settings, such as Datagram Transport Layer Security (DTLS) or
RADIUS Change of Authorization (CoA) made on Cisco ISE on AWS, allow the
corresponding ports.
Guidelines for Accessing Cisco DNA Center on AWS
After you create a virtual instance of Cisco DNA Center, you can access it
through the Cisco DNA Center GUI and CLI.
Cisco DNA Center on AWS Deployment Guide 4
Get Started with Cisco DNA Center on AWS
Guidelines for Accessing Cisco DNA Center on AWS
Important
The Cisco DNA Center GUI and CLI are accessible only through the Enterprise network, not from the public network. With the automated deployment method, Cisco DNA Center VA Launchpad ensures that Cisco DNA Center is accessible only from the Enterprise intranet. With the manual deployment method, you need to ensure Cisco DNA Center is not accessible on the public intranet for security reasons.
Guidelines for Accessing the Cisco DNA Center GUI To access the Cisco DNA
Center GUI:
· Use a supported browser. For a current list of supported browsers, see the
Release Notes for Cisco DNA Center VA Launchpad.
· In a browser, enter the IP address of your Cisco DNA Center instance in the
following format: http://ip-address/dna/home For example:
http://192.0.2.27/dna/home
· Use the following credentials for the initial login: Username: admin
Password: maglev1@3
Note You are required to change this password when you log in to Cisco DNA Center for the first time. The password must: · Omit any tab or line breaks · Have a minimum of eight characters · Contain characters from at least three of the following categories: · Lowercase letters (a-z) · Uppercase letters (A-Z) · Numbers (0-9) · Special characters (for example, ! or #)
Guidelines for Accessing the Cisco DNA Center CLI
To access the Cisco DNA Center CLI: · Use the IP address and keys
corresponding to the method you used to deploy Cisco DNA Center: · If you
deployed Cisco DNA Center using Cisco DNA Center VA Launchpad, use the IP
address and keys provided by Cisco DNA Center VA Launchpad.
Cisco DNA Center on AWS Deployment Guide 5
Verify the Cisco DNA Center VA TAR File
Get Started with Cisco DNA Center on AWS
· If you deployed Cisco DNA Center manually using AWS, use the IP address and keys provided by AWS.
Note The key must be a .pem file. If the key file is downloaded as a key.cer
file, you need to rename the file to key.pem.
· Manually change the access permissions on the key.pem file to 400. Use the
Linux chmod command to change the access permissions. For example: chmod 400
key.pem
· Use the following Linux command to access the Cisco DNA Center CLI: ssh -i
key.pem maglev@ip-address -p 2222 For example:
ssh -i key.pem maglev@192.0.2.27 -p 2222
Verify the Cisco DNA Center VA TAR File
Before deploying the Cisco DNA Center VA, we strongly recommend that you
verify that the TAR file you downloaded is a genuine Cisco TAR file.
Before you begin Ensure that you’ve downloaded Cisco DNA Center VA TAR file
from the Cisco Software Download site.
Procedure
Step 1 Step 2 Step 3 Step 4
Download the Cisco public key (cisco_image_verification_key.pub) for signature
verification from the location specified by Cisco. Download the secure hash
algorithm (SHA512) checksum file for the TAR file from the location specified
by Cisco. Obtain the TAR file’s signature file (.sig) from Cisco support
through email or by download from the secure Cisco website (if available).
(Optional) Perform an SHA verification to determine whether the TAR file is
corrupted due to a partial download.
Depending on your operating system, enter one of the following commands:
· On a Linux system: sha512sum
· On a Mac system: shasum -a 512
Microsoft Windows does not include a built-in checksum utility, but you can
use the certutil tool:
certutil -hashfile
For example:
certutil -hashfile D:CustomersFINALIZE.BIN sha256
Cisco DNA Center on AWS Deployment Guide 6
Get Started with Cisco DNA Center on AWS
Verify the Cisco DNA Center VA TAR File
Step 5
On Windows, you can also use Windows PowerShell to generate the digest. For
example:
PS C:UsersAdministrator> Get-FileHash -Path D:CustomersFINALIZE.BIN Algorithm
Hash Path SHA256
B84B6FFD898A370A605476AC7EC94429B445312A5EEDB96166370E99F2838CB5
D:CustomersFINALIZE.BIN
Compare the command output to the SHA512 checksum file that you downloaded. If
the command output does not match, download the TAR file again and run the
appropriate command a second time. If the output still does not match, contact
Cisco support.
Verify that the TAR file is genuine and from Cisco by verifying its signature:
openssl dgst -sha512 -verify cisco_image_verification_key.pub -signature
Note
This command works in both Mac and Linux environments. For Windows, you must download
and install OpenSSL (available on the OpenSSL Downloads site) if you have not already done
so.
If the TAR file is genuine, running this command displays a Verified OK message. If this message fails to appear, do not install the TAR file and contact Cisco support.
Cisco DNA Center on AWS Deployment Guide 7
Verify the Cisco DNA Center VA TAR File
Get Started with Cisco DNA Center on AWS
Cisco DNA Center on AWS Deployment Guide 8
I P A R T
Deploy Using Cisco DNA Center VA Launchpad
· Deploy Cisco DNA Center 2.3.5.3 on AWS Using Cisco DNA Center VA Launchpad
1.6, on page 11 · Deploy Cisco DNA Center 2.3.5.3 on AWS Using Cisco DNA
Center VA Launchpad 1.5, on page 49
2 C H A P T E R
Deploy Cisco DNA Center 2.3.5.3 on AWS Using Cisco DNA Center VA Launchpad 1.6
· Deploy Cisco DNA Center on AWS Using the Automated Deployment Method, on
page 11 · Automated Deployment Workflow, on page 11 · Prerequisites for
Automated Deployment, on page 12 · Install Cisco DNA Center VA Launchpad, on
page 15 · Access Hosted Cisco DNA Center VA Launchpad, on page 17 · Create a
New VA Pod, on page 25 · Manually Configure Routing on Existing Transit and
Customer Gateways, on page 35 · Create a New Cisco DNA Center VA, on page 37 ·
Troubleshoot the Deployment, on page 42
Deploy Cisco DNA Center on AWS Using the Automated Deployment Method
You provide Cisco DNA Center VA Launchpad with the needed details to create
the AWS infrastructure in your AWS account, which includes a VPC, an IPsec VPN
tunnel, gateways, subnets, and security groups. As a result, Cisco DNA Center
VA Launchpad deploys the Cisco DNA Center AMIs as an Amazon EC2 instance with
the prescribed configuration in a separate VPC. The configuration includes the
subnets, transit gateways, and other essential resources like Amazon
CloudWatch for monitoring, Amazon DynamoDB for state storage, and security
groups. Using Cisco DNA Center VA Launchpad, you can also access and manage
your VAs, as well as manage the user settings. For information, see the Cisco
DNA Center VA Launchpad 1.6 Administrator Guide.
Automated Deployment Workflow
To deploy Cisco DNA Center on AWS using the automated method, follow these
high-level steps: 1. Meet the prerequisites. See Prerequisites for Automated
Deployment, on page 12. 2. (Optional) Integrate Cisco ISE on AWS and your
Cisco DNA Center VA together. See Guidelines for
Integrating Cisco ISE on AWS with Cisco DNA Center on AWS, on page 4.
Cisco DNA Center on AWS Deployment Guide 11
Prerequisites for Automated Deployment
Deploy Using Cisco DNA Center VA Launchpad
3. Install Cisco DNA Center VA Launchpad or access Cisco DNA Center VA
Launchpad hosted by Cisco. See Install Cisco DNA Center VA Launchpad, on page
15 or Access Hosted Cisco DNA Center VA Launchpad, on page 17.
4. Create a new VA pod to contain your Cisco DNA Center VA instance. See
Create a New VA Pod, on page 25.
5. (Optional) Manually configure the TGW routing table on AWS and add the
routing configuration to your existing Customer Gateway (CGW) if you’re using
an existing TGW and existing attachments, such as a VPC, as your preferred on-
premises connectivity option. See Manually Configure Routing on Existing
Transit and Customer Gateways, on page 35.
6. Create your new instance of Cisco DNA Center. See Create a New Cisco DNA
Center VA, on page 37.
7. (Optional) If necessary, troubleshoot any issues that arise during the
deployment. See Troubleshoot the Deployment, on page 42.
8. Manage your Cisco DNA Center VA using Cisco DNA Center VA Launchpad. See
the Cisco DNA Center VA Launchpad 1.6 Administrator Guide.
Prerequisites for Automated Deployment
Before you can begin to deploy Cisco DNA Center on AWS using Cisco DNA Center
VA Launchpad, make sure that the following requirements are met:
· Install Docker Community Edition (CE) on your platform. Cisco DNA Center VA
Launchpad supports Docker CE on Mac, Windows, and Linux platforms. See the
documentation on the Docker website for the specific procedure for your
platform.
· Regardless of how you access Cisco DNA Center VA Launchpad to deploy your
Cisco DNA Center VA, make sure that your cloud environment meets the following
specifications: · Cisco DNA Center Instance: r5a.8xlarge, 32 vCPUs, 256-GB
RAM, and 4-TB storage
Important
Cisco DNA Center supports only the r5a.8xlarge instance size. Any changes to this configuration aren’t supported. Additionally, the r5a.8xlarge instance size isn’t supported in specific availability zones. To view the list of unsupported availability zones, see the Release Notes for Cisco DNA Center VA Launchpad 1.6.0.
· Backup Instance: T3.micro, 2 vCPUs, 500-GB storage, and 1-GB RAM
· You have valid credentials to access your AWS account.
· Your AWS account is a subaccount (a child account) to maintain resource
independence and isolation. With a subaccount, this ensures that the Cisco DNA
Center deployment doesn’t impact your existing resources.
· Important: Your AWS account is subscribed to Cisco DNA Center Virtual
Appliance – Bring Your Own License (BYOL) in AWS Marketplace.
Cisco DNA Center on AWS Deployment Guide 12
Deploy Using Cisco DNA Center VA Launchpad
Prerequisites for Automated Deployment
· If you’re an admin user, you must have administrator access permission for
your AWS account. (In AWS, the policy name is displayed as
AdministratorAccess.)
The administrator access policy must be attached to your AWS account directly
and not to a group. The application doesn’t enumerate through a group policy.
So, if you are added to a group with the administrator access permission, you
will not be able to create the required infrastructure.
· If you’re a subuser, your administrator must add you to the CiscoDNACenter
user group. When an admin user logs in to Cisco DNA Center VA Launchpad for
the first time, the CiscoDNACenter user group is created on their AWS account
with all the required policies attached. The admin user can add subusers to
this group to allow them to log in to Cisco DNA Center VA Launchpad. The
following policies are attached to the CiscoDNACenter user group: ·
AmazonDynamoDBFullAccess · IAMReadOnlyAccess · AmazonEC2FullAccess ·
AWSCloudFormationFullAccess · AWSLambda_FullAccess · CloudWatchFullAccess ·
ServiceQuotasFullAccess · AmazonEventBridgeFullAccess · service-
role/AWS_ConfigRole · AmazonS3FullAccess · ClientVPNServiceRolePolicy
(Version: 2012-10-17) This policy allows the following rules: ·
ec2:CreateNetworkInterface
Cisco DNA Center on AWS Deployment Guide 13
Prerequisites for Automated Deployment
Deploy Using Cisco DNA Center VA Launchpad
· ec2:CreateNetworkInterfacePermission · ec2:DescribeSecurityGroups ·
ec2:DescribeVpcs · ec2:DescribeSubnets · ec2:DescribeInternetGateways ·
ec2:ModifyNetworkInterfaceAttribute · ec2:DeleteNetworkInterface ·
ec2:DescribeAccountAttributes · ds:AuthorizeApplication ·
ds:DescribeDirectories · ds:GetDirectoryLimits · ds:UnauthorizeApplication ·
logs:DescribeLogStreams · logs:CreateLogStream · logs:PutLogEvents ·
logs:DescribeLogGroups · acm:GetCertificate · acm:DescribeCertificate ·
iam:GetSAMLProvider · lambda:GetFunctionConfiguration
· ConfigPermission (Version: 2012-10-17, Sid: VisualEditor0) This policy
allows the following rules: · config:Get · config: ·
config:ConfigurationRecorder · config:Describe · config:Deliver ·
config:List · config:Select · tag:GetResources · tag:GetTagKeys ·
cloudtrail:DescribeTrails
Cisco DNA Center on AWS Deployment Guide 14
Deploy Using Cisco DNA Center VA Launchpad
Install Cisco DNA Center VA Launchpad
· cloudtrail:GetTrailStatus · cloudtrail:LookupEvents · config:PutConfigRule ·
config:DeleteConfigRule · config:DeleteEvaluationResults
· PassRole (Version: 2012-10-17, Sid: VisualEditor0) This policy allows the
following rules: · iam:GetRole · iam:PassRole
Install Cisco DNA Center VA Launchpad
This procedure shows you how to install Cisco DNA Center VA Launchpad using
Docker containers for the server and client applications.
Before you begin Make sure you have Docker CE installed on your machine. For
information, see Prerequisites for Automated Deployment, on page 12.
Procedure
Step 1
Step 2 Step 3 Step 4
Go to the Cisco Software Download site and download the following files: ·
Launchpad-desktop-client-1.6.0.tar.gz
· Launchpad-desktop-server-1.6.0.tar.gz
Verify that the TAR file is genuine and from Cisco. For detailed steps, see
Verify the Cisco DNA Center VA TAR File, on page 6. Load the Docker images
from the downloaded files:
docker load < Launchpad-desktop-client-1.6.0.tar.gz
docker load < Launchpad-desktop-server-1.6.0.tar.gz
Use the docker images command to display a list of the Docker images in the
repository and verify that you have the latest copies of the server and client
applications. In the files, the TAG column should display the numbers starting
with 1.6. For example: $ docker images
Cisco DNA Center on AWS Deployment Guide 15
Install Cisco DNA Center VA Launchpad
Deploy Using Cisco DNA Center VA Launchpad
Step 5 Step 6
Step 7
Run the server application: docker run -d -p
Run the client application:
docker run -d -p
For example:
$ docker run -d -p 90:80 -e CHOKIDAR_USEPOLLING=true -e REACT_APP_API_URL=http://localhost:9090 –name client dd50d550aa7c
Note
Make sure that the exposed server port number and the REACT_APP_API_URL port number
are the same. In Step 5 and Step 6, port number 9090 is used in both examples.
Use the docker ps -a command to verify that the server and client applications
are running. The STATUS column should show that the applications are up. For
example:
$ docker ps -a
Step 8 Step 9
Note
If you encounter an issue while running the server or client applications, see Troubleshoot Docker
Errors, on page 78.
Verify that the server application is accessible by entering the URL in the
following format: http://
http://192.0.2.2:9090/api/valaunchpad/api-docs/
The application programming interfaces (APIs) being used for the Cisco DNA
Center VA are displayed in the window.
Verify that the client application is accessible by entering the URL in the
following format: http://
http://192.0.2.1:90/valaunchpad
The Cisco DNA Center VA Launchpad login window is displayed.
Cisco DNA Center on AWS Deployment Guide 16
Deploy Using Cisco DNA Center VA Launchpad
Access Hosted Cisco DNA Center VA Launchpad
Note
It can take a few minutes to load the Cisco DNA Center VA Launchpad login window while the
client and server applications load the artifacts.
Access Hosted Cisco DNA Center VA Launchpad
You can access Cisco DNA Center VA Launchpad through Cisco DNA Portal. If you
are new to Cisco DNA Portal, you must create a Cisco account and a Cisco DNA
Portal account. Then you can log in to Cisco DNA Portal to access Cisco DNA
Center VA Launchpad. If you are familiar with Cisco DNA Portal and have a
Cisco account and a Cisco DNA Portal account, you can directly log in to Cisco
DNA Portal to access Cisco DNA Center VA Launchpad.
Create a Cisco Account
To access Cisco DNA Center VA Launchpad through Cisco DNA Portal, you must
create a Cisco account first.
Procedure
Step 1
In your browser, enter: dna.cisco.com The Cisco DNA Portal login window is displayed.
Step 2 Step 3
Click Create a new account. On the Cisco DNA Portal Welcome window, click Create a Cisco account.
Cisco DNA Center on AWS Deployment Guide 17
Create a Cisco Account
Deploy Using Cisco DNA Center VA Launchpad
Step 4 On the Create Account window, complete the required fields and then click Register.
Step 5 Verify your account by going to the email that you registered your
account with and clicking Activate Account.
Cisco DNA Center on AWS Deployment Guide 18
Deploy Using Cisco DNA Center VA Launchpad
Create a Cisco DNA Portal Account
Create a Cisco DNA Portal Account
To access Cisco DNA Center VA Launchpad through Cisco DNA Portal, you must
create a Cisco DNA Portal account.
Before you begin Make sure that you have a Cisco account. For more
information, see Create a Cisco Account, on page 17.
Procedure
Step 1
In your browser, enter: dna.cisco.com The Cisco DNA Portal login window is displayed.
Cisco DNA Center on AWS Deployment Guide 19
Create a Cisco DNA Portal Account
Deploy Using Cisco DNA Center VA Launchpad
Step 2 Step 3
Click Log In With Cisco. Enter your Cisco account’s email in the Email field, and click Next.
Step 4 Enter your Cisco account’s password in the Password field.
Cisco DNA Center on AWS Deployment Guide 20
Deploy Using Cisco DNA Center VA Launchpad
Create a Cisco DNA Portal Account
Step 5 Step 6
Click Log in.
On the Cisco DNA Portal Welcome window, enter the name of your organization or
team in the Name your account field. Then click Continue.
Step 7
On the Cisco DNA Portal Confirm CCO Profile window, do the following:
a) Verify the details are correct. b) After reading, acknowledging, and
agreeing with the conditions, check the check box. c) Click Create Account.
Cisco DNA Center on AWS Deployment Guide 21
Log In to the Cisco DNA Portal with Cisco
Deploy Using Cisco DNA Center VA Launchpad
After successfully creating an account, the Cisco DNA Portal home page is
displayed.
Log In to the Cisco DNA Portal with Cisco
To access Cisco DNA Center VA Launchpad through Cisco DNA Portal, you must log
in to Cisco DNA Portal.
Cisco DNA Center on AWS Deployment Guide 22
Deploy Using Cisco DNA Center VA Launchpad
Log In to the Cisco DNA Portal with Cisco
Before you begin Make sure that you have a Cisco account and a Cisco DNA
Portal account. For more information, see Create a Cisco Account, on page 17
and Create a Cisco DNA Portal Account, on page 19.
Procedure
Step 1
In your browser, enter: dna.cisco.com The Cisco DNA Portal login window is displayed.
Step 2 Step 3
Click Log In With Cisco. Enter your Cisco account’s email in the Email field, and click Next.
Cisco DNA Center on AWS Deployment Guide 23
Log In to the Cisco DNA Portal with Cisco
Deploy Using Cisco DNA Center VA Launchpad
Step 4 Enter your Cisco account’s password in the Password field.
Step 5 Step 6
Click Log in. If you only have one Cisco DNA Portal account, the Cisco DNA
Portal home page is displayed.
(Optional) If you have multiple Cisco DNA Portal accounts, choose the account
that you want to log in to by clicking the account’s adjacent Continue button.
The Cisco DNA Portal home page is displayed.
Cisco DNA Center on AWS Deployment Guide 24
Deploy Using Cisco DNA Center VA Launchpad
Create a New VA Pod
Create a New VA Pod
A VA pod is the AWS hosting environment for the Cisco DNA Center VA. The
hosting environment includes AWS resources, such as the Cisco DNA Center VA
EC2 instance, Amazon Elastic Block Storage (EBS), backup NFS server, security
groups, routing tables, Amazon CloudWatch logs, Amazon Simple Notification
System (SNS), VPN Gateway (VPN GW), TGW, and so on.
Using Cisco DNA Center VA Launchpad, you can create multiple VA pods–one VA
pod for each Cisco DNA Center VA.
Note
· The AWS Super Administrator user can set a limit on the number of VA pods that can be created in each
region. The VPCs used for resources outside of the Cisco DNA Center VA Launchpad contribute to this
number as well. For example, if your AWS account has a limit of five VPCs and two are in use, you can
only create three more VA pods in the selected region.
· On some steps, all the resources must be set up successfully to proceed to the next step. If all the resources haven’t been set up successfully, the proceed button is disabled. If all the resources have been set up successfully and the proceed button is disabled, wait a few seconds because the resources are still loading. After all the configurations are complete, the button is enabled.
· Your VA pod configuration doesn’t change when you update Cisco DNA Center VA Launchpad to a later release, you downgrade to an earlier Cisco DNA Center VA Launchpad release, or you update the region setup where your VA pod is located.
For example, if you created a VA pod in Cisco DNA Center VA Launchpad, Release 1.6.0, the backup password is a combination of the backup instance’s stack name and the backup server’s IP address. If you access this VA pod in an earlier release, such as Release 1.5.0, the backup password doesn’t change.
This procedure guides you through the steps to create a new VA pod.
Cisco DNA Center on AWS Deployment Guide 25
Create a New VA Pod
Deploy Using Cisco DNA Center VA Launchpad
Before you begin Your AWS account must have administrator access permission to
perform this procedure. For information, see Prerequisites for Automated
Deployment, on page 12.
Procedure
Step 1 Step 2
Log in to Cisco DNA Center VA Launchpad using one of the following methods:
· IAM Login: This method uses user roles to define user access privileges.
Cisco DNA Center VA Launchpad supports multi-factor authentication (MFA) as an
optional, additional form of authentication, if your company requires it. For
more information, see “Log In to Cisco DNA Center VA Launchpad Using IAM” in
the Cisco DNA Center VA Launchpad 1.6 Administrator Guide.
· Federated Login: This method uses one identity to gain access to networks or
applications managed by other operators. For more information, see “Generate
Federated User Credentials Using saml2aws” or “Generate Federated User
Credentials Using AWS CLI” in the Cisco DNA Center VA Launchpad 1.6
Administrator Guide.
For information about how to get an Access Key ID and Secret Access Key, see
the AWS Account and Access Keys topic in the AWS Tools for PowerShell User
Guide on the AWS website.
If you encounter any login errors, you need to resolve them and log in again.
For more information, see Troubleshoot the Deployment, on page 42.
If you are an admin user logging in for the first time, enter your email
address in the Email ID field and click Submit. If you are a subuser, proceed
to Step 3.
You can subscribe to the Amazon Simple Notification System (SNS) to receive
alerts about deployed resources, changes, and resource over-utilization.
Further, alarms can be set up to notify you if Amazon CloudWatch detects any
unusual behavior in Cisco DNA Center VA Launchpad. In addition, AWS Config
evaluates and assesses your configured resources and sends audit logs of the
results as well. For more information, see “Subscribe to the Amazon SNS Email
Subscription” and “View Amazon CloudWatch Alarms” in the Cisco DNA Center VA
Launchpad 1.6 Administrator Guide. After you enter your email, several
processes happen:
· The CiscoDNACenter user group is created in your AWS account with all the
required policies attached. The admin user can add subusers to this group to
allow subusers to log in to Cisco DNA Center VA Launchpad.
Cisco DNA Center on AWS Deployment Guide 26
Deploy Using Cisco DNA Center VA Launchpad
Create a New VA Pod
· An Amazon S3 bucket is automatically created to store the state of the
deployment. We recommend that you do not delete this or any other bucket from
the AWS account, either globally or for each region. Doing so could impact the
Cisco DNA Center VA Launchpad deployment workflow.
· If you are logging in to a region for the first time, Cisco DNA Center VA
Launchpad creates several resources in AWS. This process can take some time,
depending on whether the region was previously enabled or not. Until the
process completes, you cannot create a new VA pod. During this time, the
following message is displayed: “Setting up the initial region configuration.
This might take a couple of minutes.”
After you log in successfully, the Dashboard pane is displayed.
Note
If you’re prompted to update the region setup, follow the prompts to complete the update. For
more information, see “Update a Region Setup” in the Cisco DNA Center VA Launchpad 1.6
Administrator Guide.
Step 3 Step 4
Click + Create New VA Pod. Choose the region where you want to create the new
VA pod by completing the following steps in the Region Selection dialog box:
a. From the Region drop-down list, choose a region.
Cisco DNA Center on AWS Deployment Guide 27
Create a New VA Pod
Deploy Using Cisco DNA Center VA Launchpad
Step 5
If you already chose one region from the left navigation pane’s Region drop- down list, this region is automatically chosen.
Note
If you’re prompted to update the region setup, follow the prompts to complete the update.
For more information, see “Update a Region Setup” in the Cisco DNA Center VA Launchpad
1.6 Administrator Guide.
b. Click Next.
Configure the AWS infrastructure, which includes the VPC, private subnet,
routing table, security group, virtual gateway, and CGW, by completing the
following steps: a) In the Environmental Details fields, configure the
following fields:
· VA Pod Name: Assign a name to the new VA pod. Keep the following
restrictions in mind:
· The name must be unique within the region. (This means that you can use the
same name across multiple regions.)
· The name can have a maximum of 12 characters.
· The name can include letters (A-Z), numbers (0-9), and dashes (-).
· Availability Zone: Click this drop-down list and choose an availability
zone, which is an isolated location within your selected region.
· AWS VPC CIDR: Enter a unique VPC subnet to use to launch the AWS resources.
Keep the following guidelines in mind:
· The recommended CIDR range is /25.
· In IPv4 CIDR notation, the last octet (the fourth octet) of the IP address
can only have the values 0 or 128.
· This subnet should not overlap with your corporate subnet.
b) Under Transit Gateway (TGW), choose one of the following options:
· VPN GW: Choose this option if you have a single VA pod, and you want to use a VPN gateway. A VPN GW is the VPN endpoint on the Amazon side of your Site- to-Site VPN connection. It can be attached to only a single VPC.
· New VPN GW + New TGW: Choose this option if you have multiple VA pods or VPCs, and you want to use the TGW as a transit hub to interconnect multiple VPCs and on-premises networks. It can also be used as a VPN endpoint for the Amazon side of the Site-to-Site VPN connection.
Note
You can create only one TGW per region.
· Existing TGW: Choose this option if you have an existing TGW that you want
to use to create a new VA pod, and then choose one of the following options:
· New VPN GW: Choose this option if you want to create a new VPN gateway for
your existing TGW.
· Existing Attachment: Choose this option if you want to use an existing VPN
or direct-connect attachment. From the Select Attachment ID, drop-down list,
choose an attachment ID.
Cisco DNA Center on AWS Deployment Guide 28
Deploy Using Cisco DNA Center VA Launchpad
Create a New VA Pod
If you choose this option, you must also configure the routing on the existing TGW and CGW. For information, see Manually Configure Routing on Existing Transit and Customer Gateways, on page 35.
c) Do one of the following:
· If you selected Existing TGW and Existing Attachments as your preferred
connectivity options, proceed to Step 5.
· If you selected VPN GW, New VPN GW + New TGW, or Existing TGW + New VPN GW,
provide the following VPN details:
· Customer Gateway IP: Enter the IP address of your Enterprise firewall or
router to form an IPsec tunnel with the AWS VPN gateway.
· VPN Vendor: From the drop-down list, choose a VPN vendor.
The following VPN vendors are not supported: Barracuda, Sophos, Vyatta, and
Zyxel. For more information, see Troubleshoot VA Pod Configuration Errors, on
page 44.
· Platform: From the drop-down list, choose a platform.
· Software: From the drop-down list, choose a software.
d) For the Customer Profile size, leave the default Medium setting.
The customer profile size applies to both the Cisco DNA Center VA instance and the backup instance. The Medium configures the instances as follows:
· Cisco DNA Center Instance: r5a.8xlarge, 32 vCPU, 256-GB RAM, and 4-TB storage.
Important
Cisco DNA Center supports only the r5a.8xlarge instance size. Any changes to this configuration aren’t supported. Additionally, the r5a.8xlarge instance size isn’t supported in specific availability zones. To view the list of unsupported availability zones, see the Release Notes for Cisco DNA Center VA Launchpad 1.6.0.
· Backup Instance: T3.micro, 2 vCPU, 500-GB storage, and 1-GB RAM
e) For the Backup Target, choose one of the following options as the
destination for the backups of your Cisco DNA Center databases and files: ·
Enterprise Backup (NFS): Choose this option if you want the backup to be
stored in the on-premises servers.
· Cloud Backup (NFS): Choose this option if you want the backup to be stored
in AWS. Note the following backup details. You will use this information later
to log in to the cloud backup server: · SSH IP Address:
· SSH Port: 22
· Server Path: /var/dnac-backup/
· Username: maglev
· Password: <xxxx##########>
Cisco DNA Center on AWS Deployment Guide 29
Create a New VA Pod
Deploy Using Cisco DNA Center VA Launchpad
Your backup server password is dynamically created. The password is composed of the first four characters of the backup instance’s stack name and the backup server’s IP address without the periods.
For example, if the backup instance’s stack name is DNAC-ABC-0123456789987 and the backup server’s IP address is 10.0.0.1, the backup server password is DNAC10001.
Note
· You can find the backup instance’s stack name either on the Cisco DNA Center
Configuration In Progress window (see Step 9 in Create a New Cisco DNA
Center VA, on page 37) or on the AWS Console > CloudFormation > Stacks
window.
· You can find the backup server’s IP address also on the Cisco DNA Center Configuration In Progress window (see Step 9 in Create a New Cisco DNA Center VA, on page 37) or on the Cisco DNA Center Virtual Appliance Details window (see “View Cisco DNA Center VA Details” in the Cisco DNA Center VA Launchpad 1.6 Administrator Guide).
· Passphrase:
Your passphrase is used to encrypt the security-sensitive components of the
backup. These security-sensitive components include certificates and
credentials.
This passphrase is required and you will be prompted to enter this passphrase
when restoring the backup files. Without this passphrase, backup files are not
restored.
· Open Ports: 22, 2049, 873, and 111
f) Click Next. The Summary pane is displayed.
Cisco DNA Center on AWS Deployment Guide 30
Deploy Using Cisco DNA Center VA Launchpad
Create a New VA Pod
g) Review the environment and VPN details that you entered. If you are
satisfied, click Start Configuring AWS Environment. Important This setup takes
about 20 minutes to complete. Do not exit the application or close this window
or tab. Otherwise, the setup will pause.
h) After the AWS infrastructure is successfully configured, the AWS
Infrastructure Configured pane is displayed.
Cisco DNA Center on AWS Deployment Guide 31
Create a New VA Pod
Deploy Using Cisco DNA Center VA Launchpad
If the AWS infrastructure configuration fails, exit Cisco DNA Center VA Launchpad and see Troubleshoot the Deployment, on page 42 for information about possible causes and solutions.
Step 6
Download the on-premises configuration file by completing the following steps:
a) After the AWS infrastructure is successfully configured, click Proceed to
On-Prem Configuration. b) In the Configure On-premise pane, click Download
Configuration File. Forward this file to your
network administrator to configure the on-premises-side IPsec tunnel.
Make sure your network administrator configures only one IPsec tunnel.
Cisco DNA Center on AWS Deployment Guide 32
Deploy Using Cisco DNA Center VA Launchpad
Create a New VA Pod
Note
· The network administrator can make the necessary changes to this configuration file
and apply it to your Enterprise firewall or router to bring up the IPsec tunnels.
The provided configuration file enables you to bring up two tunnels between AWS and the Enterprise router or firewall.
· Most virtual private gateway solutions have one tunnel up and the other down. You can have both tunnels up and use the Equal Cost Multiple Path (ECMP) networking feature. ECMP processing enables the firewall or router to use equal-cost routes to transmit traffic to the same destination. To do this, your router or firewall must support ECMP. Without ECMP, we recommend that you either keep one tunnel down and manually failover or use a solution, such as an IP SLA, to automatically bring up the tunnel in a failover scenario.
Step 7
c) Click Proceed to Network Connectivity Check button.
Check the status of your network configuration based on the on-premises
connectivity preferences that you selected during the AWS infrastructure
configuration by completing one of the following actions:
· If you selected VPN GW as your preferred on-premises connectivity option,
the IPsec tunnel configuration status is displayed, as follows:
· If the network administrator hasn’t configured the IPsec tunnel yet, a
padlock is displayed on the IPsec tunnel:
· Ask your network administrator to verify that the IPsec tunnel on the
Enterprise firewall or router is up. After the IPsec tunnel comes up, the
IPsec tunnel turns green:
Cisco DNA Center on AWS Deployment Guide 33
Create a New VA Pod
Deploy Using Cisco DNA Center VA Launchpad
· If you selected New VPN GW + New TGW or Existing TGW and New VPN GW as your preferred on-premises connectivity option, Cisco DNA Center VA Launchpad checks whether your VPC is connected to the TGW, which in turn is connected to your on-premises firewall or router.
Note
For the TGW-to-Enterprise firewall or router connection to succeed, your network
administrator must add the configuration to your on-premises firewall or router.
The connection status is displayed, as follows:
· If the connection from the TGW to your on-premises firewall or router isn’t
connected yet, it’s grayed out:
· After TGW connectivity is successfully established, the TGW connection is green:
· If you selected Existing TGW and Existing Attachment as your preferred on-
premises connectivity option, make sure that routing is configured between the
existing TGW and the newly attached VPC, where Cisco DNA Center is launched.
For information, see Manually Configure Routing on Existing Transit and
Customer Gateways, on page 35. The connection status is displayed, as follows:
· If your VPC is not attached to the TGW, the TGW connection is grayed out:
Cisco DNA Center on AWS Deployment Guide 34
Deploy Using Cisco DNA Center VA Launchpad
Manually Configure Routing on Existing Transit and Customer Gateways
· After TGW connectivity is successfully established, the TGW connection is green:
Step 8
Click Go to Dashboard to return to the Dashboard pane, where you can create more VA pods and manage your existing ones.
Manually Configure Routing on Existing Transit and Customer Gateways
If you selected Existing Transit Gateway and Existing Attachments as your
preferred connectivity option while creating a new VA pod, Cisco DNA Center VA
Launchpad creates a VPC to launch Cisco DNA Center and attaches this VPC to
your existing TGW. For Cisco DNA Center VA Launchpad to establish the TGW
connection, you must manually configure the TGW routing table on AWS and add
the routing configuration to your existing CGW.
Procedure
Step 1 From the AWS console, go to VPC service.
Cisco DNA Center on AWS Deployment Guide 35
Manually Configure Routing on Existing Transit and Customer Gateways
Deploy Using Cisco DNA Center VA Launchpad
Step 2 Step 3
In the left navigation pane, under Transit Gateways, choose Transit gateway
route tables and select the existing TGW route table.
In the Transit gateway route tables window, click the Associations tab and
then click Create association.
Step 4 In the Transit gateway route tables window, click the Propagations tab and then click Create propagation.
Step 5 Step 6
To ensure that the static route between the respective VPC and VPN is active,
click the Routes tab and then click Create static route. Ensure that your on-
premises router configuration is updated to route the network traffic destined
for the CIDR ranges that are allocated to your CGW in your AWS environment.
For example: route tunnel-int-vpn-0b57b508d80a07291-1 10.0.0.0 255.255.0.0
192.168.44.37 200
Cisco DNA Center on AWS Deployment Guide 36
Deploy Using Cisco DNA Center VA Launchpad
Create a New Cisco DNA Center VA
Create a New Cisco DNA Center VA
Use this procedure to configure a new Cisco DNA Center VA. Procedure
Step 1
In the Dashboard pane, below the map, locate the VA pod where you want to create your Cisco DNA Center VA.
Step 2 Step 3
In the VA pod card, click Create/Manage Cisco DNA Center(s). In the Create/Manage Cisco DNA Center(s) pane, click + Create New Cisco DNA Center.
Cisco DNA Center on AWS Deployment Guide 37
Create a New Cisco DNA Center VA
Deploy Using Cisco DNA Center VA Launchpad
Step 4
Enter the following details:
· Cisco DNA Center Version: From the drop-down list, choose a Cisco DNA Center version.
· Enterprise DNS: Enter the IP address of your Enterprise DNS. Ensure that the Enterprise DNS is reachable from the VA pod in which you’re creating the Cisco DNA Center VA.
Note
Cisco DNA Center VA Launchpad checks the on-premises network connection using UDP
port 53 with the DNS server IP address that you entered.
· FQDN (Fully Qualified Domain Name): Enter the IP address of the Cisco DNA
Center VA as configured on your DNS server.
· Proxy Details: Select one of the following HTTPS network proxy options:
· No Proxy: No proxy server is used.
· Unauthenticated: The proxy server does not require authentication. Enter the
URL and port number of the proxy server.
· Proxy Authentication: The proxy server requires authentication. Enter the
URL, port number, username, and password details for the proxy server.
· Cisco DNA Center Virtual Appliance Credentials: Enter a CLI password to use to log in to the Cisco DNA Center VA. The password must: · Omit any tab or line breaks · Have a minimum of eight characters · Contain characters from at least three of the following categories: · Lowercase letters (a-z) · Uppercase letters (A-Z) · Numbers (0-9) · Special characters (for example, ! or #)
Cisco DNA Center on AWS Deployment Guide 38
Deploy Using Cisco DNA Center VA Launchpad
Create a New Cisco DNA Center VA
Step 5 Step 6
Save this password for future reference.
Note
The username is maglev.
Click Validate to validate the Enterprise DNS server and FQDN configured on the DNS server.
Note
In Cisco DNA Center VA Launchpad, Release 1.6.0, if the DNS server, proxy server, or FQDN
checks fail, continue with your configuration as follows:
· If the DNS server validation fails, you cannot continue creating your Cisco DNA Center VA. Make sure that the entered DNS server IP address is reachable from the VA pod.
· If the proxy server validation fails, you can still continue with your configuration because even if the invalid proxy details aren’t fixed, the Cisco DNA Center VA works.
· If the FQDN validation fails, you can still continue with creating your Cisco DNA Center VA. However, for the Cisco DNA Center VA to work, you need to fix the FQDN configuration.
In the Summary window, review the configuration details.
Note
The Cisco DNA Center IP address is a statically assigned IP address that is maintained across
AWS availability zone outages to ensure uninterrupted connectivity and to minimize disruptions
during critical network operations.
Step 7 Step 8
If you are satisfied with the configuration, click Generate PEM Key File.
In the Download PEM Key File dialog box, click Download PEM Key File. If you
click Cancel, you’re returned to the Summary window.
Cisco DNA Center on AWS Deployment Guide 39
Create a New Cisco DNA Center VA
Deploy Using Cisco DNA Center VA Launchpad
Important Because the PEM key isn’t stored in your AWS account, you need to download it. You need the PEM key to access the Cisco DNA Center VA that is being created.
Step 9
After you downloaded the PEM file, click Start Cisco DNA Center Configuration.
Cisco DNA Center VA Launchpad configures the Cisco DNA Center environment. After the environment is configured, Cisco DNA Center boots. Initially, Cisco DNA Center VA Launchpad displays the outer ring in gray. When Port 2222 is validated, the image turns amber. When Port 443 is validated, the image turns green.
Note
This process takes 45-60 minutes. Do not exit the application or close this window or tab.
Otherwise, the setup will pause.
Cisco DNA Center on AWS Deployment Guide 40
Deploy Using Cisco DNA Center VA Launchpad
Create a New Cisco DNA Center VA
After Cisco DNA Center is done booting, the configuration is complete. You can now view your Cisco DNA Center VA details.
Tip
While the Cisco DNA Center Configuration In Progress window is displayed, record the
backup server’s IP address and the backup instance’s stack name for later use. Your backup server
password is a combination of the first four characters of the backup instance’s stack name and
the backup server’s IP address without the periods.
If the Cisco DNA Center configuration fails, exit to the Create/Manage Cisco DNA Center(s) pane. For information, see Troubleshoot the Deployment, on page 42
Cisco DNA Center on AWS Deployment Guide 41
Troubleshoot the Deployment
Deploy Using Cisco DNA Center VA Launchpad
Step 10
To return to the Create/Manage Cisco DNA Center(s) pane, click Go to Manage Cisco DNA Center(s).
Troubleshoot the Deployment
Cisco DNA Center VA Launchpad is designed to help you seamlessly configure
Cisco DNA Center on AWS with minimal intervention. This section shows you how
to troubleshoot common issues during the deployment of Cisco DNA Center on
AWS.
Note We recommend against making manual changes with Cisco DNA Center VA
Launchpad through the AWS console, because it can lead to issues that Cisco
DNA Center VA Launchpad cannot resolve.
If you have any issues that are not addressed in this section, contact Cisco
TAC.
Troubleshoot Docker Errors
If the error, port is already in use, displays while running the docker images
for Cisco DNA Center VA Launchpad, you can troubleshoot it with the following
possible solutions:
Cisco DNA Center on AWS Deployment Guide 42
Deploy Using Cisco DNA Center VA Launchpad
Troubleshoot Login Errors
Error
Possible Solution
If you receive the following error while On Docker, run the server application:
running the server application:
docker run -d -p
port is already in use
SECRET_KEY=
dockerhub.cisco.com/maglev-docker/server:x.x.x-latest
Note
You can use any available server port.
While running the server application, run the client application:
docker run -d -p 90:80 -e REACT_APP_API_URL=http://localhost:<client-port- number> –name client –pull=always dockerhub.cisco.com/maglevdocker/client:x.x.x
Note
You must use the same port number that you used to run the server application.
If you receive the following error while On Docker, run the client application:
running the client application:
docker run -d -p
port is already in use
dockerhub.cisco.com/maglev-docker/client:x.x.x
Note
You can use any available server port.
Troubleshoot Login Errors
When you log in to Cisco DNA Center VA Launchpad, you may encounter a login error. You can troubleshoot common login errors with the following possible solutions:
Error Invalid credentials.
Possible Solution Reenter your credentials and check that they’re entered correctly.
You don’t have enough access. For admin users, verify that your account has administrator access permission. For subusers, verify that your administrator added you to the CiscoDNACenter user group.
An operation to delete is in progress, please try again after some time.
If an admin user deletes the
Troubleshoot a Hosted Cisco DNA Center VA Launchpad Error
On hosted Cisco DNA Center VA Launchpad, when you trigger a root cause
analysis (RCA), the Rate exceeded error can occur. If this error occurs, the
following banner is displayed:
Cisco DNA Center on AWS Deployment Guide 43
Troubleshoot Region Issues
Deploy Using Cisco DNA Center VA Launchpad
This error banner displays when the maximum number of API requests (10,000 per second) are received for a region. To resolve this issue, increase the limit in AWS with the Service Quotas service, or retry the operation after a few seconds.
Troubleshoot Region Issues
You can troubleshoot region issues with the following possible solutions:
Issue
Possible Solution
While creating a new VA pod in a new Make sure that any manual process on the AWS console has completed successfully and try
region, Cisco DNA Center VA
this step again. If the problem persists, contact Cisco TAC.
Launchpad displays an error message or the screen freezes for more than 5
Note
minutes and does not display a
configuration-in-progress message.
To avoid such conflicts, we recommend that you don’t make any manual changes to the VA pods. Instead, use the Cisco DNA Center VA Launchpad for all actions.
Your region setup fails and Cisco DNA Open a case with AWS and ask that they delete the failed resources from the backend. Center VA Launchpad displays a Bucket [name] did not stabilize error similar to the following:
Troubleshoot VA Pod Configuration Errors
You can troubleshoot VA pod configuration errors with the following possible
solutions:
Cisco DNA Center on AWS Deployment Guide 44
Deploy Using Cisco DNA Center VA Launchpad
Troubleshoot VA Pod Configuration Errors
Error + Create VA Pod button disabled
Possible Solution
Hover your cursor over the disabled button to learn more about why it’s
disabled.
The following are likely reasons why you can’t create a new VA pod:
· You have reached the limit of VPC service quota: For every region, a limit
is set by your AWS administrator for how many VPCs can be created. Typically,
there are 5 VPCs per region, and each VPC can have only one VA pod. However,
you may want to contact your AWS administrator for the exact number.
Note that any VPC used for resources outside of Cisco DNA Center VA Launchpad
contribute to this limit. For example, if your AWS account has a limit of five
VPCs and two are in use, you can only create three more VA pods in the
selected region.
To create new VA pods, ask your AWS administrator to change the limit or
delete some of your existing VA pods or VPCs on your AWS account.
· Pod deletion in progress: The deletion of the last VA pod in the region is
in progress. Wait a few minutes, and then retry creating a new VA pod.
AMI ID for this region is not available for your account.
When you click + Create New VA Pod, Cisco DNA Center VA Launchpad validates
the AMI ID for your selected region.
If you encounter this error, the validation has failed and you can’t create a
new pod in this region. Contact Cisco TAC to help you resolve the issue.
Your VPN configuration is invalid. When configuring a VA pod, the following VPN vendors are not supported:
At this step you cannot update it so please delete the instance and create
· Barracuda
a new one.
· Sophos
· Vyatta
· Zyxel
If you are using an unsupported VPN vendor, Cisco DNA Center VA Launchpad displays the following error message:
CustomerGateway with type
You may encounter this error if you try to create more than one VA pod at a time.
“ipsec.1”, ip-address “xx.xx.xx.xx”, and bgp-asn “65000” already exists (RequestToken:
To resolve this error, delete the failed VA pod and recreate it. Ensure that you create only one VA pod at a time.
f78ad45d-b4f8-d02b-9040-f29e5f5f86cf,
HandlerErrorCode: AlreadyExists)
AWS Infrastructure Failed.
If the AWS configuration fails, return to the Dashboard pane and create a new VA pod. For more information, see Create a New VA Pod, on page 25.
Note
You can delete the VA pod that failed to configure.
Cisco DNA Center on AWS Deployment Guide 45
Troubleshoot a Network Connectivity Error
Deploy Using Cisco DNA Center VA Launchpad
Error
AWS Configuration fails when editing a VA Pod
Possible Solution
Make sure that any manual process on the AWS console has been completed successfully and try this step again. If the problem persists, contact Cisco TAC.
Note
To avoid such conflicts, we recommend that you do not make any manual
changes to the VA pods. Instead, use the Cisco DNA Center VA Launchpad
for all actions.
Deleting VA Pod has failed
Make sure that any manual process on the AWS console has been completed successfully and try this step again. If the problem persists, contact Cisco TAC.
Note
To avoid such conflicts, we recommend that you do not make any manual
changes to the VA pods. Instead, use the Cisco DNA Center VA Launchpad
for all actions.
The resource you are trying to delete If you encounter this error while deleting a VA pod, contact Cisco TAC. has been modified recently. Please refresh the page get the latest changes and try again.
Troubleshoot a Network Connectivity Error
While creating a VA pod, if the IPsec tunnel or TGW connection isn’t
established, make sure that the tunnel is up on your on-premises firewall or
router.
If the tunnel from the VA pod to TWG is green and the tunnel from the TWG to
CGW is gray, make sure that:
· You forwarded the correct configuration file to your network administrator.
· Your network administrator made the necessary changes to the configuration
file. · Your network administrator finished applying this configuration to
your Enterprise firewall or router. · If you chose Existing TGW and Existing
Attachments as your network connectivity preference, make
sure that you correctly followed Manually Configure Routing on Existing
Transit and Customer Gateways, on page 35.
Cisco DNA Center on AWS Deployment Guide 46
Deploy Using Cisco DNA Center VA Launchpad
Troubleshoot Cisco DNA Center VA Configuration Errors
Troubleshoot Cisco DNA Center VA Configuration Errors
You can troubleshoot errors that occur while configuring a Cisco DNA Center VA with the following possible solutions:
Error Environment Setup failed
Possible Solution 1. On Cisco DNA Center VA Launchpad, return to the
Create/Manage Cisco DNA Center(s)
pane.
2. Delete the Cisco DNA Center VA.
3. Create a new Cisco DNA Center VA.
Delete Failed
If the Cisco DNA Center VA deletion fails, contact Cisco TAC.
Troubleshoot Concurrency Errors
You troubleshoot the concurrency errors with the following possible solutions:
Error
Possible Solution
Unable to delete a Pod You cannot delete a component, such as a VA pod or Cisco DNA Center VA, that another user has created
or a Cisco DNA Center while a different action is in progress on the component. After the action completes, you or any other
created by another user can delete the component.
user.
For example, you cannot delete a VA pod or Cisco DNA Center VA while it is in any of the following
processes or states:
· Another user is in the process of creating the Cisco DNA Center VA.
· Another user is in the process of deleting the Cisco DNA Center VA.
· The Cisco DNA Center VA is in a failed state after a deletion attempt.
The status of a Pod has If you tried to delete a VA pod, the original user
account that created the VA pod may have performed a been changed recently.
concurrent action. This concurrency issue changes the status of the selected
VA pod.
To view the updated status of the VA pod, click Refresh.
Troubleshoot Other Deployment Issues
You can troubleshoot other issues that occur while deploying a Cisco DNA
Center VA on AWS with the following possible solutions:
Cisco DNA Center on AWS Deployment Guide 47
Troubleshoot Other Deployment Issues
Deploy Using Cisco DNA Center VA Launchpad
Issue
Possible Reasons and Solutions
Resources are green, but the On some steps, you can only proceed if all the
resources have been successfully set up. To ensure Proceed button is disabled.
the integrity of the deployment, the Proceed button remains disabled until the
setup is complete
and all the resources have been configured and loaded.
Sometimes, the screen shows that the resources have been successfully set up, but the Proceed button is still disabled. In this case, you need to wait a few more seconds for some resources to load. After all the resources have been configured and loaded, the Proceed button is enabled.
Failure when deploying multiple VA pods with the same CGW in single region.
Make sure that: · The CGW IP address is the IP address of your Enterprise firewall or router. · The CGW IP address is a valid public address.
· The CGW IP address hasn’t been used for another VA pod within the same region. Currently, in each region, multiple VA pods cannot have the same CGW IP address. To use the same CGW IP address for more than one VA pod, deploy each VA pod in a different region.
Unable to SSH or ping the Cisco DNA Center VA.
Session ended
You cannot connect via SSH or ping the Cisco DNA Center VA, although the
tunnel is up and the application status is complete (green). This issue might
occur if the on-premises CGW is configured incorrectly. Verify the CGW
configuration and try again.
If your session times out while operations are in progress, such as triggering
an RCA, the operations may abruptly end and display the following
notification:
If your session times out, log back in and restart the operations.
Cisco DNA Center on AWS Deployment Guide 48
3 C H A P T E R
Deploy Cisco DNA Center 2.3.5.3 on AWS Using Cisco DNA Center VA Launchpad 1.5
· Deploy Cisco DNA Center on AWS Using the Automated Deployment Method, on
page 49 · Automated Deployment Workflow, on page 49 · Prerequisites for
Automated Deployment, on page 50 · Install Cisco DNA Center VA Launchpad, on
page 53 · Access Hosted Cisco DNA Center VA Launchpad, on page 55 · Create a
New VA Pod, on page 63 · Manually Configure Routing on Existing Transit and
Customer Gateways, on page 72 · Create a New Cisco DNA Center VA, on page 74 ·
Troubleshoot the Deployment, on page 78
Deploy Cisco DNA Center on AWS Using the Automated Deployment Method
You provide Cisco DNA Center VA Launchpad with the needed details to create
the AWS infrastructure in your AWS account, which includes a VPC, an IPsec VPN
tunnel, gateways, subnets, and security groups. As a result, Cisco DNA Center
VA Launchpad deploys the Cisco DNA Center AMIs as an Amazon EC2 instance with
the prescribed configuration in a separate VPC. The configuration includes the
subnets, transit gateways, and other essential resources like Amazon
CloudWatch for monitoring, Amazon DynamoDB for state storage, and security
groups. Using Cisco DNA Center VA Launchpad, you can also access and manage
your VAs, as well as manage the user settings. For information, see the Cisco
DNA Center VA Launchpad 1.5 Administrator Guide.
Automated Deployment Workflow
To deploy Cisco DNA Center on AWS using the automated method, follow these
high-level steps: 1. Meet the prerequisites. See Prerequisites for Automated
Deployment, on page 50. 2. (Optional) Integrate Cisco ISE on AWS and your
Cisco DNA Center VA together. See Guidelines for
Integrating Cisco ISE on AWS with Cisco DNA Center on AWS, on page 4.
Cisco DNA Center on AWS Deployment Guide 49
Prerequisites for Automated Deployment
Deploy Using Cisco DNA Center VA Launchpad
3. Install Cisco DNA Center VA Launchpad or access Cisco DNA Center VA
Launchpad hosted by Cisco. See Install Cisco DNA Center VA Launchpad, on page
53 or Access Hosted Cisco DNA Center VA Launchpad, on page 55.
4. Create a new VA pod to contain your Cisco DNA Center VA instance. See
Create a New VA Pod, on page 63.
5. (Optional) Manually configure the TGW routing table on AWS and add the
routing configuration to your existing Customer Gateway (CGW) if you’re using
an existing TGW and existing attachments, such as a VPC, as your preferred on-
premises connectivity option. See Manually Configure Routing on Existing
Transit and Customer Gateways, on page 72.
6. Create your new instance of Cisco DNA Center. See Create a New Cisco DNA
Center VA, on page 74.
7. (Optional) If necessary, troubleshoot any issues that arise during the
deployment. See Troubleshoot the Deployment, on page 78.
8. Manage your Cisco DNA Center VA using Cisco DNA Center VA Launchpad. See
the Cisco DNA Center VA Launchpad 1.5 Administrator Guide.
Prerequisites for Automated Deployment
Before you can begin to deploy Cisco DNA Center on AWS using Cisco DNA Center
VA Launchpad, make sure that the following requirements are met:
· Install Docker Community Edition (CE) on your platform. Cisco DNA Center VA
Launchpad supports Docker CE on Mac, Windows, and Linux platforms. See the
documentation on the Docker website for the specific procedure for your
platform.
· Regardless of how you access Cisco DNA Center VA Launchpad to deploy your
Cisco DNA Center VA, make sure that your cloud environment meets the following
specifications: · Cisco DNA Center Instance: r5a.8xlarge, 32 vCPUs, 256-GB
RAM, and 4-TB storage
Important
Cisco DNA Center supports only the r5a.8xlarge instance size. Any changes to this configuration aren’t supported. Additionally, the r5a.8xlarge instance size isn’t supported in specific availability zones. To view the list of unsupported availability zones, see the Release Notes for Cisco DNA Center VA Launchpad 1.5.0.
· Backup Instance: T3.micro, 2 vCPUs, 500-GB storage, and 1-GB RAM
· You have valid credentials to access your AWS account.
· Your AWS account is a subaccount (a child account) to maintain resource
independence and isolation. With a subaccount, this ensures that the Cisco DNA
Center deployment doesn’t impact your existing resources.
· Important: Your AWS account is subscribed to Cisco DNA Center Virtual
Appliance – Bring Your Own License (BYOL) in AWS Marketplace.
Cisco DNA Center on AWS Deployment Guide 50
Deploy Using Cisco DNA Center VA Launchpad
Prerequisites for Automated Deployment
· If you’re an admin user, you must have administrator access permission for
your AWS account. (In AWS, the policy name is displayed as
AdministratorAccess.)
The administrator access policy must be attached to your AWS account directly
and not to a group. The application doesn’t enumerate through a group policy.
So, if you are added to a group with the administrator access permission, you
will not be able to create the required infrastructure.
· If you’re a subuser, your administrator must add you to the CiscoDNACenter
user group. When an admin user logs in to Cisco DNA Center VA Launchpad for
the first time, the CiscoDNACenter user group is created on their AWS account
with all the required policies attached. The admin user can add subusers to
this group to allow them to log in to Cisco DNA Center VA Launchpad. The
following policies are attached to the CiscoDNACenter user group: ·
AmazonDynamoDBFullAccess · IAMReadOnlyAccess · AmazonEC2FullAccess ·
AWSCloudFormationFullAccess · AWSLambda_FullAccess · CloudWatchFullAccess ·
ServiceQuotasFullAccess · AmazonEventBridgeFullAccess · service-
role/AWS_ConfigRole · AmazonS3FullAccess · ClientVPNServiceRolePolicy
(Version: 2012-10-17) This policy allows the following rules: ·
ec2:CreateNetworkInterface
Cisco DNA Center on AWS Deployment Guide 51
Prerequisites for Automated Deployment
Deploy Using Cisco DNA Center VA Launchpad
· ec2:CreateNetworkInterfacePermission · ec2:DescribeSecurityGroups ·
ec2:DescribeVpcs · ec2:DescribeSubnets · ec2:DescribeInternetGateways ·
ec2:ModifyNetworkInterfaceAttribute · ec2:DeleteNetworkInterface ·
ec2:DescribeAccountAttributes · ds:AuthorizeApplication ·
ds:DescribeDirectories · ds:GetDirectoryLimits · ds:UnauthorizeApplication ·
logs:DescribeLogStreams · logs:CreateLogStream · logs:PutLogEvents ·
logs:DescribeLogGroups · acm:GetCertificate · acm:DescribeCertificate ·
iam:GetSAMLProvider · lambda:GetFunctionConfiguration
· ConfigPermission (Version: 2012-10-17, Sid: VisualEditor0) This policy
allows the following rules: · config:Get · config: ·
config:ConfigurationRecorder · config:Describe · config:Deliver ·
config:List · config:Select · tag:GetResources · tag:GetTagKeys ·
cloudtrail:DescribeTrails
Cisco DNA Center on AWS Deployment Guide 52
Deploy Using Cisco DNA Center VA Launchpad
Install Cisco DNA Center VA Launchpad
· cloudtrail:GetTrailStatus · cloudtrail:LookupEvents · config:PutConfigRule ·
config:DeleteConfigRule · config:DeleteEvaluationResults
· PassRole (Version: 2012-10-17, Sid: VisualEditor0) This policy allows the
following rules: · iam:GetRole · iam:PassRole
Install Cisco DNA Center VA Launchpad
This procedure shows you how to install Cisco DNA Center VA Launchpad using
Docker containers for the server and client applications.
Before you begin Make sure you have Docker CE installed on your machine. For
information, see Prerequisites for Automated Deployment, on page 50.
Procedure
Step 1
Step 2 Step 3 Step 4
Go to the Cisco Software Download site and download the following files: ·
Launchpad-desktop-client-1.5.0.tar.gz
· Launchpad-desktop-server-1.5.0.tar.gz
Verify that the TAR file is genuine and from Cisco. For detailed steps, see
Verify the Cisco DNA Center VA TAR File, on page 6. Load the Docker images
from the downloaded files:
docker load < Launchpad-desktop-client-1.5.0.tar.gz
docker load < Launchpad-desktop-server-1.5.0.tar.gz
Use the docker images command to display a list of the Docker images in the
repository and verify that you have the latest copies of the server and client
applications. In the files, the TAG column should display the numbers starting
with 1.5. For example:
Cisco DNA Center on AWS Deployment Guide 53
Install Cisco DNA Center VA Launchpad
Deploy Using Cisco DNA Center VA Launchpad
Step 5 Step 6
Step 7
Run the server application: docker run -d -p
Run the client application:
docker run -d -p
For example:
$ docker run -d -p 90:80 -e CHOKIDAR_USEPOLLING=true -e REACT_APP_API_URL=http://localhost:9090 –name client dd50d550aa7c
Note
Make sure that the exposed server port number and the REACT_APP_API_URL port number
are the same. In Step 5 and Step 6, port number 9090 is used in both examples.
Use the docker ps -a command to verify that the server and client applications
are running. The STATUS column should show that the applications are up.
For example:
Step 8 Step 9
Note
If you encounter an issue while running the server or client applications, see Troubleshoot Docker
Errors, on page 78.
Verify that the server application is accessible by entering the URL in the
following format: http://
For example:
http://192.0.2.2:9090/api/valaunchpad/api-docs/
The application programming interfaces (APIs) being used for the Cisco DNA
Center VA are displayed in the window.
Verify that the client application is accessible by entering the URL in the following format:
http://
For example:
http://192.0.2.1:90/valaunchpad
The Cisco DNA Center VA Launchpad login window is displayed.
Note
It can take a few minutes to load the Cisco DNA Center VA Launchpad login window while the
client and server applications load the artifacts.
Cisco DNA Center on AWS Deployment Guide 54
Deploy Using Cisco DNA Center VA Launchpad
Access Hosted Cisco DNA Center VA Launchpad
Access Hosted Cisco DNA Center VA Launchpad
You can access Cisco DNA Center VA Launchpad through Cisco DNA Portal. If you
are new to Cisco DNA Portal, you must create a Cisco account and a Cisco DNA
Portal account. Then you can log in to Cisco DNA Portal to access Cisco DNA
Center VA Launchpad. If you are familiar with Cisco DNA Portal and have a
Cisco account and a Cisco DNA Portal account, you can directly log in to Cisco
DNA Portal to access Cisco DNA Center VA Launchpad.
Create a Cisco Account
To access Cisco DNA Center VA Launchpad through Cisco DNA Portal, you must
create a Cisco account first.
Procedure
Step 1
In your browser, enter: dna.cisco.com The Cisco DNA Portal login window is displayed.
Step 2 Step 3
Click Create a new account. On the Cisco DNA Portal Welcome window, click Create a Cisco account.
Cisco DNA Center on AWS Deployment Guide 55
Create a Cisco Account
Deploy Using Cisco DNA Center VA Launchpad
Step 4 On the Create Account window, complete the required fields and then click Register.
Step 5 Verify your account by going to the email that you registered your
account with and clicking Activate Account.
Cisco DNA Center on AWS Deployment Guide 56
Deploy Using Cisco DNA Center VA Launchpad
Create a Cisco DNA Portal Account
Create a Cisco DNA Portal Account
To access Cisco DNA Center VA Launchpad through Cisco DNA Portal, you must
create a Cisco DNA Portal account.
Before you begin Make sure that you have a Cisco account. For more
information, see Create a Cisco Account, on page 55.
Procedure
Step 1
In your browser, enter: dna.cisco.com The Cisco DNA Portal login window is displayed.
Cisco DNA Center on AWS Deployment Guide 57
Create a Cisco DNA Portal Account
Deploy Using Cisco DNA Center VA Launchpad
Step 2 Step 3
Click Log In With Cisco. Enter your Cisco account’s email in the Email field, and click Next.
Step 4 Enter your Cisco account’s password in the Password field.
Cisco DNA Center on AWS Deployment Guide 58
Deploy Using Cisco DNA Center VA Launchpad
Create a Cisco DNA Portal Account
Step 5 Step 6
Click Log in.
On the Cisco DNA Portal Welcome window, enter the name of your organization or
team in the Name your account field. Then click Continue.
Step 7
On the Cisco DNA Portal Confirm CCO Profile window, do the following:
a) Verify the details are correct. b) After reading, acknowledging, and
agreeing with the conditions, check the check box. c) Click Create Account.
Cisco DNA Center on AWS Deployment Guide 59
Log In to the Cisco DNA Portal with Cisco
Deploy Using Cisco DNA Center VA Launchpad
After successfully creating an account, the Cisco DNA Portal home page is
displayed.
Log In to the Cisco DNA Portal with Cisco
To access Cisco DNA Center VA Launchpad through Cisco DNA Portal, you must log
in to Cisco DNA Portal.
Cisco DNA Center on AWS Deployment Guide 60
Deploy Using Cisco DNA Center VA Launchpad
Log In to the Cisco DNA Portal with Cisco
Before you begin Make sure that you have a Cisco account and a Cisco DNA
Portal account. For more information, see Create a Cisco Account, on page 55
and Create a Cisco DNA Portal Account, on page 57.
Procedure
Step 1
In your browser, enter: dna.cisco.com The Cisco DNA Portal login window is displayed.
Step 2 Step 3
Click Log In With Cisco. Enter your Cisco account’s email in the Email field, and click Next.
Cisco DNA Center on AWS Deployment Guide 61
Log In to the Cisco DNA Portal with Cisco
Deploy Using Cisco DNA Center VA Launchpad
Step 4 Enter your Cisco account’s password in the Password field.
Step 5 Step 6
Click Log in. If you only have one Cisco DNA Portal account, the Cisco DNA
Portal home page is displayed.
(Optional) If you have multiple Cisco DNA Portal accounts, choose the account
that you want to log in to by clicking the account’s adjacent Continue button.
The Cisco DNA Portal home page is displayed.
Cisco DNA Center on AWS Deployment Guide 62
Deploy Using Cisco DNA Center VA Launchpad
Create a New VA Pod
Create a New VA Pod
A VA pod is the AWS hosting environment for the Cisco DNA Center VA. The
hosting environment includes AWS resources, such as the Cisco DNA Center VA
EC2 instance, Amazon Elastic Block Storage (EBS), backup NFS server, security
groups, routing tables, Amazon CloudWatch logs, Amazon Simple Notification
System (SNS), VPN Gateway (VPN GW), TGW, and so on.
Using Cisco DNA Center VA Launchpad, you can create multiple VA pods–one VA
pod for each Cisco DNA Center VA.
Note
· The AWS Super Administrator user can set a limit on the number of VA pods that can be created in each
region. The VPCs used for resources outside of the Cisco DNA Center VA Launchpad contribute to this
number as well. For example, if your AWS account has a limit of five VPCs and two are in use, you can
only create three more VA pods in the selected region.
· On some steps, all the resources must be set up successfully to proceed to the next step. If all the resources haven’t been set up successfully, the proceed button is disabled. If all the resources have been set up successfully and the proceed button is disabled, wait a few seconds because the resources are still loading. After all the configurations are complete, the button is enabled.
This procedure guides you through the steps to create a new VA pod.
Before you begin Your AWS account must have administrator access permission to
perform this procedure. For information, see Prerequisites for Automated
Deployment, on page 50.
Cisco DNA Center on AWS Deployment Guide 63
Create a New VA Pod
Deploy Using Cisco DNA Center VA Launchpad
Procedure
Step 1 Step 2
Log in to Cisco DNA Center VA Launchpad using one of the following methods:
· IAM Login: This method uses user roles to define user access privileges.
Cisco DNA Center VA Launchpad supports multi-factor authentication (MFA) as an
optional, additional form of authentication, if your company requires it. For
more information, see “Log In to Cisco DNA Center VA Launchpad Using IAM” in
the Cisco DNA Center VA Launchpad 1.5 Administrator Guide.
· Federated Login: This method uses one identity to gain access to networks or
applications managed by other operators. For more information, see “Generate
Federated User Credentials Using saml2aws” or “Generate Federated User
Credentials Using AWS CLI” in the Cisco DNA Center VA Launchpad 1.5
Administrator Guide.
For information about how to get an Access Key ID and Secret Access Key, see
the AWS Account and Access Keys topic in the AWS Tools for PowerShell User
Guide on the AWS website.
If you encounter any login errors, you need to resolve them and log in again.
For more information, see Troubleshoot the Deployment, on page 78.
If you are an admin user logging in for the first time, enter your email
address in the Email ID field and click Submit. If you are a subuser, proceed
to Step 3.
You can subscribe to the Amazon Simple Notification System (SNS) to receive
alerts about deployed resources, changes, and resource over-utilization.
Further, alarms can be set up to notify you if Amazon CloudWatch detects any
unusual behavior in Cisco DNA Center VA Launchpad. In addition, AWS Config
evaluates and assesses your configured resources and sends audit logs of the
results as well. For more information, see “Subscribe to the Amazon SNS Email
Subscription” and “View Amazon CloudWatch Alarms” in the Cisco DNA Center VA
Launchpad 1.5 Administrator Guide. After you enter your email, several
processes happen:
· The CiscoDNACenter user group is created in your AWS account with all the
required policies attached. The admin user can add subusers to this group to
allow subusers to log in to Cisco DNA Center VA Launchpad.
· An Amazon S3 bucket is automatically created to store the state of the
deployment. We recommend that you do not delete this or any other bucket from
the AWS account, either globally or for each region. Doing so could impact the
Cisco DNA Center VA Launchpad deployment workflow.
· If you are logging in to a region for the first time, Cisco DNA Center VA
Launchpad creates several resources in AWS. This process can take some time,
depending on whether the region was previously
Cisco DNA Center on AWS Deployment Guide 64
Deploy Using Cisco DNA Center VA Launchpad
Create a New VA Pod
enabled or not. Until the process completes, you cannot create a new VA pod. During this time, the following message is displayed: “Setting up the initial region configuration. This might take a couple of minutes.”
After you log in successfully, the Dashboard pane is displayed.
Note
If you’re prompted to update the region version, follow the prompts to complete the update. For
more information, see “Update a Region Level” in the Cisco DNA Center VA Launchpad 1.5
Administrator Guide.
Step 3
Step 4 Step 5
(Optional) To create the new VA pod in a region other than the default (us- east-1), click the Region drop-down list and choose a region.
Note
If you’re prompted to update the region version, follow the prompts to complete the update. For
more information, see “Update a Region Level” in the Cisco DNA Center VA Launchpad 1.5
Administrator Guide.
Click + Create New VA Pod. Configure the AWS infrastructure, which includes
the VPC, private subnet, routing table, security group, virtual gateway, and
CGW, by completing the following steps: a) In the Environmental Details
fields, configure the following fields:
· VA Pod Name: Assign a name to the new VA pod. The name must be unique across
all regions and can include letters (A-Z and a-z), numbers (0-9), and dashes
(-).
· Availability Zone: Click this drop-down list and choose an availability
zone, which is an isolated location within your selected region.
· AWS VPC CIDR: Enter a unique VPC subnet to use to launch the AWS resources.
Keep the following guidelines in mind:
· The recommended CIDR range is /25.
· In IPv4 CIDR notation, the last octet (the fourth octet) of the IP address
can only have the values 0 or 128.
Cisco DNA Center on AWS Deployment Guide 65
Create a New VA Pod
Deploy Using Cisco DNA Center VA Launchpad
· This subnet should not overlap with your corporate subnet.
b) Under Transit Gateway (TGW), choose one of the following options:
· VPN GW: Choose this option if you have a single VA pod, and you want to use a VPN gateway. A VPN GW is the VPN endpoint on the Amazon side of your Site- to-Site VPN connection. It can be attached to only a single VPC.
· New VPN GW + New TGW: Choose this option if you have multiple VA pods or VPCs, and you want to use the TGW as a transit hub to interconnect multiple VPCs and on-premises networks. It can also be used as a VPN endpoint for the Amazon side of the Site-to-Site VPN connection.
Note
You can create only one TGW per region.
· Existing TGW: Choose this option if you have an existing TGW that you want
to use to create a new VA pod, and then choose one of the following options:
· New VPN GW: Choose this option if you want to create a new VPN gateway for
your existing TGW.
· Existing Attachment: Choose this option if you want to use an existing VPN
or direct-connect attachment. From the Select Attachment ID, drop-down list,
choose an attachment ID.
If you choose this option, you must also configure the routing on the existing
TGW and CGW. For information, see Manually Configure Routing on Existing
Transit and Customer Gateways, on page 72.
c) Do one of the following:
· If you selected Existing TGW and Existing Attachments as your preferred
connectivity options, proceed to Step 5.
· If you selected VPN GW, New VPN GW + New TGW, or Existing TGW + New VPN GW,
provide the following VPN details:
· Customer Gateway IP: Enter the IP address of your Enterprise firewall or
router to form an IPsec tunnel with the AWS VPN gateway.
· VPN Vendor: From the drop-down list, choose a VPN vendor.
The following VPN vendors are not supported: Barracuda, Sophos, Vyatta, and
Zyxel. For more information, see Troubleshoot VA Pod Configuration Errors, on
page 80.
· Platform: From the drop-down list, choose a platform.
· Software: From the drop-down list, choose a software.
d) For the Customer Profile size, leave the default Medium setting.
The customer profile size applies to both the Cisco DNA Center VA instance and
the backup instance. The Medium configures the instances as follows:
· Cisco DNA Center Instance: r5a.8xlarge, 32 vCPU, 256-GB RAM, and 4-TB
storage.
Cisco DNA Center on AWS Deployment Guide 66
Deploy Using Cisco DNA Center VA Launchpad
Create a New VA Pod
Important
Cisco DNA Center supports only the r5a.8xlarge instance size. Any changes to this configuration aren’t supported. Additionally, the r5a.8xlarge instance size isn’t supported in specific availability zones. To view the list of unsupported availability zones, see the Release Notes for Cisco DNA Center VA Launchpad 1.5.0.
· Backup Instance: T3.micro, 2 vCPU, 500-GB storage, and 1-GB RAM
e) For the Backup Target, choose one of the following options as the
destination for the backups of your Cisco DNA Center databases and files: ·
Enterprise Backup (NFS): Choose this option if you want the backup to be
stored in the on-premises servers.
· Cloud Backup (NFS): Choose this option if you want the backup to be stored
in AWS. Note the following backup details. You will use this information later
to log in to the cloud backup server: · SSH IP Address:
· SSH Port: 22
· Server Path: /var/dnac-backup/
· Username: maglev
· Password: maglev1@3
· Passphrase: maglev1@
· Open Ports: 22, 2049, 873, and 111
f) Click Next. The Summary pane is displayed.
Cisco DNA Center on AWS Deployment Guide 67
Create a New VA Pod
Deploy Using Cisco DNA Center VA Launchpad
g) Review the environment and VPN details that you entered. If you are
satisfied, click Start Configuring AWS Environment. Important This setup takes
about 20 minutes to complete. Do not exit the application or close this window
or tab. Otherwise, the setup will pause.
h) After the AWS infrastructure is successfully configured, the AWS
Infrastructure Configured pane is displayed.
Cisco DNA Center on AWS Deployment Guide 68
Deploy Using Cisco DNA Center VA Launchpad
Create a New VA Pod
If the AWS infrastructure configuration fails, exit Cisco DNA Center VA Launchpad and see Troubleshoot the Deployment, on page 78 for information about possible causes and solutions.
Step 6
Download the on-premises configuration file by completing the following steps:
a) After the AWS infrastructure is successfully configured, click Proceed to
On-Prem Configuration. b) In the Configure On-premise pane, click Download
Configuration File. Forward this file to your
network administrator to configure the on-premises-side IPsec tunnel.
Make sure your network administrator configures only one IPsec tunnel.
Cisco DNA Center on AWS Deployment Guide 69
Create a New VA Pod
Deploy Using Cisco DNA Center VA Launchpad
Note
· The network administrator can make the necessary changes to this configuration file
and apply it to your Enterprise firewall or router to bring up the IPsec tunnels.
The provided configuration file enables you to bring up two tunnels between AWS and the Enterprise router or firewall.
· Most virtual private gateway solutions have one tunnel up and the other down. You can have both tunnels up and use the Equal Cost Multiple Path (ECMP) networking feature. ECMP processing enables the firewall or router to use equal-cost routes to transmit traffic to the same destination. To do this, your router or firewall must support ECMP. Without ECMP, we recommend that you either keep one tunnel down and manually failover or use a solution, such as an IP SLA, to automatically bring up the tunnel in a failover scenario.
Step 7
c) Click Proceed to Network Connectivity Check button.
Check the status of your network configuration based on the on-premises
connectivity preferences that you selected during the AWS infrastructure
configuration by completing one of the following actions:
· If you selected VPN GW as your preferred on-premises connectivity option,
the IPsec tunnel configuration status is displayed, as follows:
· If the network administrator hasn’t configured the IPsec tunnel yet, a
padlock is displayed on the IPsec tunnel:
· Ask your network administrator to verify that the IPsec tunnel on the
Enterprise firewall or router is up. After the IPsec tunnel comes up, the
IPsec tunnel turns green:
Cisco DNA Center on AWS Deployment Guide 70
Deploy Using Cisco DNA Center VA Launchpad
Create a New VA Pod
· If you selected New VPN GW + New TGW or Existing TGW and New VPN GW as your preferred on-premises connectivity option, Cisco DNA Center VA Launchpad checks whether your VPC is connected to the TGW, which in turn is connected to your on-premises firewall or router.
Note
For the TGW-to-Enterprise firewall or router connection to succeed, your network
administrator must add the configuration to your on-premises firewall or router.
The connection status is displayed, as follows:
· If the connection from the TGW to your on-premises firewall or router isn’t
connected yet, it’s grayed out:
· After TGW connectivity is successfully established, the TGW connection is green:
· If you selected Existing TGW and Existing Attachment as your preferred on-
premises connectivity option, make sure that routing is configured between the
existing TGW and the newly attached VPC, where Cisco DNA Center is launched.
For information, see Manually Configure Routing on Existing Transit and
Customer Gateways, on page 72. The connection status is displayed, as follows:
· If your VPC is not attached to the TGW, the TGW connection is grayed out:
Cisco DNA Center on AWS Deployment Guide 71
Manually Configure Routing on Existing Transit and Customer Gateways
Deploy Using Cisco DNA Center VA Launchpad
· After TGW connectivity is successfully established, the TGW connection is green:
Step 8
Click Go to Dashboard to return to the Dashboard pane, where you can create more VA pods and manage your existing ones.
Manually Configure Routing on Existing Transit and Customer Gateways
If you selected Existing Transit Gateway and Existing Attachments as your
preferred connectivity option while creating a new VA pod, Cisco DNA Center VA
Launchpad creates a VPC to launch Cisco DNA Center and attaches this VPC to
your existing TGW. For Cisco DNA Center VA Launchpad to establish the TGW
connection, you must manually configure the TGW routing table on AWS and add
the routing configuration to your existing CGW.
Procedure
Step 1 From the AWS console, go to VPC service.
Cisco DNA Center on AWS Deployment Guide 72
Deploy Using Cisco DNA Center VA Launchpad
Manually Configure Routing on Existing Transit and Customer Gateways
Step 2 Step 3
In the left navigation pane, under Transit Gateways, choose Transit gateway
route tables and select the existing TGW route table.
In the Transit gateway route tables window, click the Associations tab and
then click Create association.
Step 4 In the Transit gateway route tables window, click the Propagations tab and then click Create propagation.
Step 5 Step 6
To ensure that the static route between the respective VPC and VPN is active,
click the Routes tab and then click Create static route. Ensure that your on-
premises router configuration is updated to route the network traffic destined
for the CIDR ranges that are allocated to your CGW in your AWS environment.
For example: route tunnel-int-vpn-0b57b508d80a07291-1 10.0.0.0 255.255.0.0
192.168.44.37 200
Cisco DNA Center on AWS Deployment Guide 73
Create a New Cisco DNA Center VA
Deploy Using Cisco DNA Center VA Launchpad
Create a New Cisco DNA Center VA
Use this procedure to configure a new Cisco DNA Center VA. Procedure
Step 1
On the Dashboard pane, locate one of the VA pods and, in the VA pod card, click Create/Manage Cisco DNA Center(s).
Step 2 On the Create/Manage Cisco DNA Center(s) pane, click + Create New Cisco DNA Center.
Step 3
Enter the following details:
· Cisco DNA Center Version: From the drop-down list, choose a Cisco DNA Center version.
· Enterprise DNS: Enter the IP address of your Enterprise DNS. Ensure that the Enterprise DNS is reachable from the VA pod in which you’re creating the Cisco DNA Center VA.
Note
Cisco DNA Center VA Launchpad checks the on-premises network connection using UDP
port 53 with the DNS server IP address that you entered.
· FQDN (Fully Qualified Domain Name): Enter the IP address of the Cisco DNA Center VA as configured on your DNS server.
Cisco DNA Center on AWS Deployment Guide 74
Deploy Using Cisco DNA Center VA Launchpad
Create a New Cisco DNA Center VA
· Proxy Details: Select one of the following HTTPS network proxy options: · No
Proxy: No proxy server is used. · Unauthenticated: The proxy server does not
require authentication. Enter the URL and port number of the proxy server. ·
Proxy Authentication: The proxy server requires authentication. Enter the URL,
port number, username, and password details for the proxy server.
· Cisco DNA Center Virtual Appliance Credentials: Enter a CLI password to use
to log in to the Cisco DNA Center VA. The password must: · Omit any tab or
line breaks · Have a minimum of eight characters · Contain characters from at
least three of the following categories: · Lowercase letters (a-z) · Uppercase
letters (A-Z) · Numbers (0-9) · Special characters (for example, ! or #)
Save this password for future reference.
Note
The username is maglev.
Step 4
Click Validate to validate the Enterprise DNS server and FQDN configured on the DNS server.
Note
In Cisco DNA Center VA Launchpad, Release 1.5.0, if the DNS server, proxy server, or FQDN
checks fail, continue with your configuration as follows:
· If the DNS server validation fails, you cannot continue creating your Cisco DNA Center VA. Make sure that the entered DNS server IP address is reachable from the VA pod.
· If the proxy server validation fails, you can still continue with your configuration because even if the invalid proxy details aren’t fixed, the Cisco DNA Center VA works.
· If the FQDN validation fails, you can still continue with creating your Cisco DNA Center VA. However, for the Cisco DNA Center VA to work, you need to fix the FQDN configuration.
Step 5 Step 6 Step 7
Review the configuration details.
If you are satisfied with the configuration, click Start Cisco DNA Center
Configuration. In the Download PEM key File dialog box, click Download PEM
Key. If you click Cancel, you’re returned to the Summary window.
Important Because the PEM key isn’t stored in your AWS account, you need to
download it. You need the PEM key to access the Cisco DNA Center VA that is
being created.
Cisco DNA Center on AWS Deployment Guide 75
Create a New Cisco DNA Center VA
Deploy Using Cisco DNA Center VA Launchpad
After you downloaded the PEM file, the dialog box closes, and Cisco DNA Center
VA Launchpad begins configuring the Cisco DNA Center environment.
After the environment is configured, Cisco DNA Center boots. Initially, Cisco
DNA Center VA Launchpad displays the outer ring in gray. When Port 2222 is
validated, the image turns amber. When Port 443 is validated, the image turns
green.
Cisco DNA Center on AWS Deployment Guide 76
Deploy Using Cisco DNA Center VA Launchpad
Create a New Cisco DNA Center VA
Note
This process takes 45-60 minutes. Do not exit the application or close this window or tab.
Otherwise, the setup will pause.
After Cisco DNA Center is done booting, the configuration is complete. You can now view your Cisco DNA Center VA details.
If the Cisco DNA Center configuration fails, exit to the Create/Manage Cisco
DNA Center(s) pane. For information, see Troubleshoot the Deployment, on page
78
Cisco DNA Center on AWS Deployment Guide 77
Troubleshoot the Deployment
Deploy Using Cisco DNA Center VA Launchpad
Step 8 To return to the Create/Manage Cisco DNA Center(s) pane, click Go to
Manage Cisco DNA Center(s).
Troubleshoot the Deployment
Cisco DNA Center VA Launchpad is designed to help you seamlessly configure
Cisco DNA Center on AWS with minimal intervention. This section shows you how
to troubleshoot common issues during the deployment of Cisco DNA Center on
AWS.
Note We recommend against making manual changes with Cisco DNA Center VA
Launchpad through the AWS console, because it can lead to issues that Cisco
DNA Center VA Launchpad cannot resolve.
If you have any issues that are not addressed in this section, contact Cisco
TAC.
Troubleshoot Docker Errors
If the error, port is already in use, displays while running the docker images
for Cisco DNA Center VA Launchpad, you can troubleshoot it with the following
possible solutions:
Cisco DNA Center on AWS Deployment Guide 78
Deploy Using Cisco DNA Center VA Launchpad
Troubleshoot Login Errors
Error
Possible Solution
If you receive the following error while On Docker, run the server application:
running the server application:
docker run -d -p
port is already in use
SECRET_KEY=
dockerhub.cisco.com/maglev-docker/server:x.x.x-latest
Note
You can use any available server port.
While running the server application, run the client application:
docker run -d -p 90:80 -e REACT_APP_API_URL=http://localhost:<client-port- number> –name client –pull=always dockerhub.cisco.com/maglevdocker/client:x.x.x
Note
You must use the same port number that you used to run the server application.
If you receive the following error while On Docker, run the client application:
running the client application:
docker run -d -p
port is already in use
dockerhub.cisco.com/maglev-docker/client:x.x.x
Note
You can use any available server port.
Troubleshoot Login Errors
When you log in to Cisco DNA Center VA Launchpad, you may encounter a login error. You can troubleshoot common login errors with the following possible solutions:
Error Invalid credentials.
Possible Solution Reenter your credentials and check that they’re entered correctly.
You don’t have enough access. For admin users, verify that your account has administrator access permission. For subusers, verify that your administrator added you to the CiscoDNACenter user group.
An operation to delete is in progress, please try again after some time.
If an admin user deletes the
Troubleshoot a Hosted Cisco DNA Center VA Launchpad Error
On hosted Cisco DNA Center VA Launchpad, when you trigger a root cause
analysis (RCA), the Rate exceeded error can occur. If this error occurs, the
following banner is displayed:
Cisco DNA Center on AWS Deployment Guide 79
Troubleshoot Region Issues
Deploy Using Cisco DNA Center VA Launchpad
This error banner displays when the maximum number of API requests (10,000 per second) are received for a region. To resolve this issue, increase the limit in AWS with the Service Quotas service, or retry the operation after a few seconds.
Troubleshoot Region Issues
You can troubleshoot region issues with the following possible solutions:
Issue
Possible Solution
While creating a new VA pod in a new Make sure that any manual process on the AWS console has completed successfully and try
region, Cisco DNA Center VA
this step again. If the problem persists, contact Cisco TAC.
Launchpad displays an error message or the screen freezes for more than 5
Note
minutes and does not display a
configuration-in-progress message.
To avoid such conflicts, we recommend that you don’t make any manual changes to the VA pods. Instead, use the Cisco DNA Center VA Launchpad for all actions.
Your region setup fails and Cisco DNA Open a case with AWS and ask that they delete the failed resources from the backend. Center VA Launchpad displays a Bucket [name] did not stabilize error similar to the following:
Troubleshoot VA Pod Configuration Errors
You can troubleshoot VA pod configuration errors with the following possible
solutions:
Cisco DNA Center on AWS Deployment Guide 80
Deploy Using Cisco DNA Center VA Launchpad
Troubleshoot VA Pod Configuration Errors
Error + Create VA Pod button disabled
Possible Solution
Hover your cursor over the disabled button to learn more about why it’s
disabled.
The following are likely reasons why you can’t create a new VA pod:
· You have reached the limit of VPC service quota: For every region, a limit
is set by your AWS administrator for how many VPCs can be created. Typically,
there are 5 VPCs per region, and each VPC can have only one VA pod. However,
you may want to contact your AWS administrator for the exact number.
Note that any VPC used for resources outside of Cisco DNA Center VA Launchpad
contribute to this limit. For example, if your AWS account has a limit of five
VPCs and two are in use, you can only create three more VA pods in the
selected region.
To create new VA pods, ask your AWS administrator to change the limit or
delete some of your existing VA pods or VPCs on your AWS account.
· Pod deletion in progress: The deletion of the last VA pod in the region is
in progress. Wait a few minutes, and then retry creating a new VA pod.
AMI ID for this region is not available for your account.
When you click + Create New VA Pod, Cisco DNA Center VA Launchpad validates
the AMI ID for your selected region.
If you encounter this error, the validation has failed and you can’t create a
new pod in this region. Contact Cisco TAC to help you resolve the issue.
Your VPN configuration is invalid. When configuring a VA pod, the following VPN vendors are not supported:
At this step you cannot update it so please delete the instance and create
· Barracuda
a new one.
· Sophos
· Vyatta
· Zyxel
If you are using an unsupported VPN vendor, Cisco DNA Center VA Launchpad displays the following error message:
CustomerGateway with type
You may encounter this error if you try to create more than one VA pod at a time.
“ipsec.1”, ip-address “xx.xx.xx.xx”, and bgp-asn “65000” already exists (RequestToken:
To resolve this error, delete the failed VA pod and recreate it. Ensure that you create only one VA pod at a time.
f78ad45d-b4f8-d02b-9040-f29e5f5f86cf,
HandlerErrorCode: AlreadyExists)
AWS Infrastructure Failed.
If the AWS configuration fails, return to the Dashboard pane and create a new VA pod. For more information, see Create a New VA Pod, on page 63.
Note
You can delete the VA pod that failed to configure.
Cisco DNA Center on AWS Deployment Guide 81
Troubleshoot a Network Connectivity Error
Deploy Using Cisco DNA Center VA Launchpad
Error
AWS Configuration fails when editing a VA Pod
Possible Solution
Make sure that any manual process on the AWS console has been completed successfully and try this step again. If the problem persists, contact Cisco TAC.
Note
To avoid such conflicts, we recommend that you do not make any manual
changes to the VA pods. Instead, use the Cisco DNA Center VA Launchpad
for all actions.
Deleting VA Pod has failed
Make sure that any manual process on the AWS console has been completed successfully and try this step again. If the problem persists, contact Cisco TAC.
Note
To avoid such conflicts, we recommend that you do not make any manual
changes to the VA pods. Instead, use the Cisco DNA Center VA Launchpad
for all actions.
The resource you are trying to delete If you encounter this error while deleting a VA pod, contact Cisco TAC. has been modified recently. Please refresh the page get the latest changes and try again.
Troubleshoot a Network Connectivity Error
While creating a VA pod, if the IPsec tunnel or TGW connection isn’t
established, make sure that the tunnel is up on your on-premises firewall or
router.
If the tunnel from the VA pod to TWG is green and the tunnel from the TWG to
CGW is gray, make sure that:
· You forwarded the correct configuration file to your network administrator.
· Your network administrator made the necessary changes to the configuration
file. · Your network administrator finished applying this configuration to
your Enterprise firewall or router. · If you chose Existing TGW and Existing
Attachments as your network connectivity preference, make
sure that you correctly followed Manually Configure Routing on Existing
Transit and Customer Gateways, on page 72.
Cisco DNA Center on AWS Deployment Guide 82
Deploy Using Cisco DNA Center VA Launchpad
Troubleshoot Cisco DNA Center VA Configuration Errors
Troubleshoot Cisco DNA Center VA Configuration Errors
You can troubleshoot errors that occur while configuring a Cisco DNA Center VA with the following possible solutions:
Error Environment Setup failed
Possible Solution 1. On Cisco DNA Center VA Launchpad, return to the
Create/Manage Cisco DNA Center(s)
pane.
2. Delete the Cisco DNA Center VA.
3. Create a new Cisco DNA Center VA.
Delete Failed
If the Cisco DNA Center VA deletion fails, contact Cisco TAC.
Troubleshoot Concurrency Errors
You troubleshoot the concurrency errors with the following possible solutions:
Error
Possible Solution
Unable to delete a Pod You cannot delete a component, such as a VA pod or Cisco DNA Center VA, that another user has created
or a Cisco DNA Center while a different action is in progress on the component. After the action completes, you or any other
created by another user can delete the component.
user.
For example, you cannot delete a VA pod or Cisco DNA Center VA while it is in any of the following
processes or states:
· Another user is in the process of creating the Cisco DNA Center VA.
· Another user is in the process of deleting the Cisco DNA Center VA.
· The Cisco DNA Center VA is in a failed state after a deletion attempt.
The status of a Pod has If you tried to delete a VA pod, the original user
account that created the VA pod may have performed a been changed recently.
concurrent action. This concurrency issue changes the status of the selected
VA pod.
To view the updated status of the VA pod, click Refresh.
Troubleshoot Other Deployment Issues
You can troubleshoot other issues that occur while deploying a Cisco DNA
Center VA on AWS with the following possible solutions:
Cisco DNA Center on AWS Deployment Guide 83
Troubleshoot Other Deployment Issues
Deploy Using Cisco DNA Center VA Launchpad
Issue
Possible Reasons and Solutions
Resources are green, but the On some steps, you can only proceed if all the
resources have been successfully set up. To ensure Proceed button is disabled.
the integrity of the deployment, the Proceed button remains disabled until the
setup is complete
and all the resources have been configured and loaded.
Sometimes, the screen shows that the resources have been successfully set up, but the Proceed button is still disabled. In this case, you need to wait a few more seconds for some resources to load. After all the resources have been configured and loaded, the Proceed button is enabled.
Failure when deploying multiple VA pods with the same CGW in single region.
Make sure that: · The CGW IP address is the IP address of your Enterprise firewall or router. · The CGW IP address is a valid public address.
· The CGW IP address hasn’t been used for another VA pod within the same region. Currently, in each region, multiple VA pods cannot have the same CGW IP address. To use the same CGW IP address for more than one VA pod, deploy each VA pod in a different region.
Unable to SSH or ping the Cisco DNA Center VA.
Session ended
You cannot connect via SSH or ping the Cisco DNA Center VA, although the
tunnel is up and the application status is complete (green). This issue might
occur if the on-premises CGW is configured incorrectly. Verify the CGW
configuration and try again.
If your session times out while operations are in progress, such as triggering
an RCA, the operations may abruptly end and display the following
notification:
If your session times out, log back in and restart the operations.
Cisco DNA Center on AWS Deployment Guide 84
I I P A R T
Deploy Using AWS CloudFormation
· Deploy Cisco DNA Center 2.3.5.3 on AWS Using AWS CloudFormation, on page 87
4 C H A P T E R
Deploy Cisco DNA Center 2.3.5.3 on AWS Using AWS CloudFormation
· Deploy Cisco DNA Center on AWS Manually Using AWS CloudFormation, on page 87
· Manual Deployment Using AWS CloudFormation Workflow, on page 87 ·
Prerequisites for Manual Deployment Using AWS CloudFormation, on page 88 ·
Deploy Cisco DNA Center on AWS Manually Using AWS CloudFormation, on page 93 ·
Validate the Deployment, on page 98
Deploy Cisco DNA Center on AWS Manually Using AWS CloudFormation
If you’re familiar with AWS administration, you have the option of deploying
the Cisco DNA Center AMI manually on your AWS account using AWS
CloudFormation. With this method, you need to create the AWS infrastructure,
establish a VPN tunnel, and deploy Cisco DNA Center.
Manual Deployment Using AWS CloudFormation Workflow
To deploy Cisco DNA Center on AWS using this method, follow these high-level
steps: 1. Meet the prerequisites. See Prerequisites for Manual Deployment
Using AWS CloudFormation, on page
88. 2. (Optional) Integrate Cisco ISE on AWS and your Cisco DNA Center VA
together. See Guidelines for
Integrating Cisco ISE on AWS with Cisco DNA Center on AWS, on page 4. 3.
Deploy Cisco DNA Center on AWS using AWS CloudFormation. See Deploy Cisco DNA
Center on
AWS Manually Using AWS CloudFormation, on page 93. 4. Make sure that your
environment setup and the Cisco DNA Center VA configuration are installed
correctly
and working as expected. See Validate the Deployment, on page 98.
Cisco DNA Center on AWS Deployment Guide 87
Prerequisites for Manual Deployment Using AWS CloudFormation
Deploy Using AWS CloudFormation
Prerequisites for Manual Deployment Using AWS CloudFormation
Before you can begin to deploy Cisco DNA Center on AWS, make sure that the
following network, AWS, and Cisco DNA Center requirements have been met:
Network Environment You must have the following information about your network
environment on hand:
· Enterprise DNS server IP address · (Optional) HTTPS Network Proxy details
AWS Environment You must meet the following AWS environment requirements:
· You have valid credentials to access your AWS account.
Note We recommend that your AWS account be a subaccount (a child account) to
maintain resource independence and isolation. A subaccount ensures that the
Cisco DNA Center deployment does not impact your existing resources.
· Important: Your AWS account is subscribed to Cisco DNA Center Virtual
Appliance – Bring Your Own License (BYOL) in AWS Marketplace.
· You must have administrator access permission for your AWS account. (In AWS,
the policy name is displayed as AdministratorAccess.)
· The following resources and services must be set up in AWS:
Cisco DNA Center on AWS Deployment Guide 88
Deploy Using AWS CloudFormation
Prerequisites for Manual Deployment Using AWS CloudFormation
· VPC: The recommended CIDR range is /25. In IPv4 CIDR notation, the last
octet (the fourth octet) of the IP address can only have the values 0 or 128.
For example: x.x.x.0 or x.x.x.128.
· Subnets: The recommended subnet range is /28 and should not overlap with
your corporate subnet.
· Route Tables: Make sure that your VPC subnet is allowed to communicate with
your Enterprise network via your VPN GW or TGW.
· Security Groups: For communication between your Cisco DNA Center VA on AWS
and the devices in your Enterprise network, the AWS security group that you
attach to your Cisco DNA Center VA on AWS must allow the following ports:
· TCP 22, 80, 443, 9991, 25103, 32626
· UDP 123, 162, 514, 6007, 21730
You must also configure the inbound and outbound ports. To configure inbound
ports, refer to the following figure:
To configure outbound ports, refer to the following figure:
Cisco DNA Center on AWS Deployment Guide 89
Prerequisites for Manual Deployment Using AWS CloudFormation
Deploy Using AWS CloudFormation
Port — TCP 22, 80, 443
UDP 123
The following table lists information about the ports that Cisco DNA Center uses, the services communicating over these ports, the appliance’s purpose in using them, and the recommended action.
Service Name ICMP
Purpose
Devices use ICMP messages to communicate network connectivity issues.
Recommended Action Enable ICMP.
HTTPS, SFTP, HTTP
Software image download from Cisco Ensure that firewall rules limit the
DNA Center through HTTPS:443, source IP of the hosts or network
SFTP:22, HTTP:80.
devices allowed to access Cisco DNA
Certificate download from Cisco DNA Center on these ports.
Center through HTTPS:443, HTTP:80 Note
We do not recommend
(Cisco 9800 Wireless Controller, PnP),
the use of HTTP 80. Use
Sensor/Telemetry.
HTTPS 443 wherever
Note
Block port 80 if you don’t
possible.
use Plug and Play (PnP),
Software Image
Management (SWIM),
Embedded Event
Management (EEM),
device enrollment, or
Cisco 9800 Wireless
Controller.
NTP
Devices use NTP for time
Port must be open to allow devices to
synchronization.
synchronize the time.
Cisco DNA Center on AWS Deployment Guide 90
Deploy Using AWS CloudFormation
Prerequisites for Manual Deployment Using AWS CloudFormation
Port UDP 162 UDP 514 UDP 6007 TCP 9991
UDP 21730 TCP 25103
TCP 32626
Service Name SNMP
Purpose
Cisco DNA Center receives SNMP network telemetry from devices.
Recommended Action
Port must be open for data analytics based on SNMP.
Syslog
Cisco DNA Center receives syslog Port must be open for data analytics
messages from devices.
based on syslog.
NetFlow
Cisco DNA Center receives NetFlow Port must be open for data analytics
network telemetry from devices.
based on NetFlow.
Wide Area Bonjour Service
Cisco DNA Center receives multicast Port must be open on Cisco DNA Domain Name System (mDNS) traffic Center if the Bonjour application is from the Service Discovery Gateway installed. (SDG) agents using the Bonjour Control Protocol.
Application Visibility Application Visibility Service CBAR Port must be open when CBAR is
Service
device communication.
enabled on a network device.
Cisco 9800 Wireless Used for telemetry. Controller and Cisco Catalyst 9000 switches with streaming telemetry enabled
Port must be open for telemetry connections between Cisco DNA Center and Catalyst 9000 devices.
Intelligent Capture (gRPC) collector
Used for receiving traffic statistics and Port must be open if you are using the packet – capture data used by the Cisco Cisco DNA Assurance Intelligent DNA Assurance Intelligent Capture Capture (gRPC) feature. (gRPC) feature.
· VPN Gateway (VPN GW) or Transit Gateway (TGW): You must have an existing
connection to your Enterprise network, which is your Customer Gateway (CGW).
For your existing connection from the CGW to AWS, make sure that the correct
ports are open for traffic flow to and from the Cisco DNA Center VA, whether
you open them using the firewall settings or a proxy gateway. For more
information about the well-known network service ports that the appliance
uses, see “Required Network Ports” in the “Plan the Deployment” chapter of the
Cisco DNA Center First-Generation Appliance Installation Guide, Release 2.3.5.
· Site-to-Site VPN Connection: You can use TGW Attachments and TGW Route
Tables.
· Your AWS environment must be configured with one of the following regions: · ap-northeast-1 (Tokyo) · ap-northeast-2 (Seoul) · ap-south-1 (Mumbai) · ap- southeast-1 (Singapore) · ap-southeast-2 (Sydney) · ca-central-1 (Canada)
Cisco DNA Center on AWS Deployment Guide 91
Prerequisites for Manual Deployment Using AWS CloudFormation
Deploy Using AWS CloudFormation
· eu-central-1 (Frankfurt) · eu-south-1 (Milan) · eu-west-1 (Ireland) · eu-
west-2 (London) · eu-west-3 (Paris) · us-east-1 (Virginia) · us-east-2 (Ohio)
· us-west-1 (N. California) · us-west-2 (Oregon)
· If you want to enable multiple IAM users with the ability to configure Cisco
DNA Center using the same environment setup, you need to create a group with
the following policies and then add the required users to that group: ·
IAMReadOnlyAccess · AmazonEC2FullAccess · AWSCloudFormationFullAccess
· The Cisco DNA Center instance size must meet the following minimum resource
requirements: · r5a.8xlarge
Important
Cisco DNA Center supports only the r5a.8xlarge instance size. Any changes to this configuration aren’t supported. Additionally, the r5a.8xlarge instance size isn’t supported in specific availability zones. To view the list of unsupported availability zones, see the Release Notes for Cisco DNA Center VA Launchpad.
· 32 vCPU · 256-GB RAM · 4-TB storage · 2500 disk input/output operations per second (IOPS) · 180 MBps disk bandwidth
· You have the following AWS information on hand: · Subnet ID · Security Group ID · Keypair ID · Environment name
Cisco DNA Center on AWS Deployment Guide 92
Deploy Using AWS CloudFormation
Deploy Cisco DNA Center on AWS Manually Using AWS CloudFormation
· CIDR reservation
Cisco DNA Center Environment You must meet the following requirements for your
Cisco DNA Center environment:
· You have access to the Cisco DNA Center GUI. · You have the following Cisco
DNA Center information on hand:
· NTP setting · Default gateway setting · CLI password · UI username and
password · Static IP · FQDN for the Cisco DNA Center VA IP address
Deploy Cisco DNA Center on AWS Manually Using AWS CloudFormation
You can manually deploy Cisco DNA Center on AWS using AWS CloudFormation. The
provided AWS CloudFormation template contains the relevant details for all
required parameters. As a part of the deployment process, the AWS
CloudFormation template for the Cisco DNA Center instance automatically
creates the following Amazon CloudWatch dashboard and alarms:
· DNACDashboard (VA_Instance_MonitoringBoard): This dashboard provides
monitoring information about the Cisco DNA Center instance’s CPUUtilization,
NetworkIn, NetworkOut, DiskReadOps, and DiskWriteOps.
· DnacCPUAlarm: When the CPU usage is greater than or equal to 80% for Cisco
DNA Center instances, this alarm is triggered. The default threshold for CPU
usage is 80%.
· DnacSystemStatusAlarm: If the system status check fails for a Cisco DNA
Center instance, the recovery process is started. The default threshold for
the system status check is 0.
Before you begin · You have the AWS environment set up with all the required
components. For information, see Prerequisites for Manual Deployment Using AWS
CloudFormation, on page 88. · The VPN tunnel is up.
Cisco DNA Center on AWS Deployment Guide 93
Deploy Cisco DNA Center on AWS Manually Using AWS CloudFormation
Deploy Using AWS CloudFormation
Step 1
Step 2 Step 3 Step 4
Procedure
Depending on which file you want to download, do one of the following: · Go to
the Cisco Software Download site and download the following file:
DNA_Center_VA_InstanceLaunch_CFT-1.6.0.tar.gz
· Go to the Cisco Software Download site and download the following file:
DNA_Center_VA_InstanceLaunch_CFT-1.5.0.tar.gz
Both TAR files contain the AWS CloudFormation template that you use to create your Cisco DNA Center VA instance. The AWS CloudFormation template contains several AMIs, each having a different AMI ID based on a specific region. Use the appropriate AMI ID for your region:
Region ap-northeast-1 (Tokyo)
Cisco DNA Center AMI ID ami-0e15eb31bcb994472
ap-northeast-2 (Seoul)
ami-043e1b9f3ccace4b2
ap-south-1 (Mumbai)
ami-0bbdbd7bcc1445c5f
ap-southeast-1 (Singapore)
ami-0c365aa4cfb5121a9
ap-southeast-2 (Sydney)
ami-0d2d9e5ebb58de8f7
ca-central-1 (Canada)
ami-0485cfdbda5244c6e
eu-central-1 (Frankfurt)
ami-0677a8e229a930434
eu-south-1 (Milan)
ami-091f667a02427854d
eu-west-1 (Ireland)
ami-0a8a59b277dff9306
eu-west-2 (London)
ami-0cf5912937286b42e
eu-west-3 (Paris)
ami-0b12cfdd092ef754e
us-east-1 (Virginia)
ami-08ad555593196c1de
us-east-2 (Ohio)
ami-0c52ce38eb8974728
us-west-1 (Northern California)
ami-0b83a898072e12970
us-west-2 (Oregon)
ami-02b6cd5eee1f3b521
Verify that the TAR file is genuine and from Cisco. For detailed steps, see
Verify the Cisco DNA Center VA TAR File, on page 6. Log in to the AWS console.
The AWS console is displayed.
In the search bar, enter cloudformation.
Cisco DNA Center on AWS Deployment Guide 94
Deploy Using AWS CloudFormation
Deploy Cisco DNA Center on AWS Manually Using AWS CloudFormation
Step 5 Step 6
From the drop-down menu, choose CloudFormation. Click Create stack and choose With new resources (standard).
Step 7
Under Specify template, select Upload a template file, and choose the AWS CloudFormation template that you downloaded in Step 1.
Cisco DNA Center on AWS Deployment Guide 95
Deploy Cisco DNA Center on AWS Manually Using AWS CloudFormation
Deploy Using AWS CloudFormation
Step 8
Enter a stack name and review the following parameters: · EC2 Instance
Configuration · Environment Name: Assign a unique environment name. The
environment name is used to differentiate the deployment and is prepended to
your AWS resource names. If you use the same environment name as a previous
deployment, the current deployment will fail.
· Private Subnet ID: Enter the VPC subnet to be used for Cisco DNA Center.
· Security Group: Enter the security group to be attached to the Cisco DNA
Center VA that you are deploying.
· Keypair: Enter the SSH keypair used to access the CLI of Cisco DNA Center VA
that you are deploying.
· Cisco DNA Center Configuration: Enter the following information: ·
DnacInstanceIP: Cisco DNA Center IP address.
· DnacNetmask: Cisco DNA Center netmask.
· DnacGateway: Cisco DNA Center gateway address.
· DnacDnsServer: Enterprise DNS Server.
· DnacPassword: Cisco DNA Center password.
Cisco DNA Center on AWS Deployment Guide 96
Deploy Using AWS CloudFormation
Deploy Cisco DNA Center on AWS Manually Using AWS CloudFormation
Note
You can use the Cisco DNA Center password to access the Cisco DNA Center VA CLI
through the AWS EC2 Serial Console. The password must:
· Omit any tab or line breaks
· Have a minimum of eight characters
· Contain characters from at least three of the following categories:
· Lowercase letters (a-z)
· Uppercase letters (A-Z)
· Numbers (0-9)
· Special characters (for example, ! or #)
Step 9
· DnacFQDN: Cisco DNA Center FQDN. · DnacHttpsProxy: (Optional) Enterprise
HTTPS proxy. · DnacHttpsProxyUsername: (Optional) HTTPS proxy username. ·
DnacHttpsProxyPassword: (Optional) HTTPS proxy password.
(Optional) Click Next to configure the stack options.
Step 10 Step 11
Click Next to review your stack information. If you are satisfied with the configuration, click Submit to finish.
Cisco DNA Center on AWS Deployment Guide 97
Validate the Deployment
Deploy Using AWS CloudFormation
The stack creation process usually takes from 45 to 60 minutes.
Validate the Deployment
To ensure that your environment setup and Cisco DNA Center VA configuration
are working, perform the following validation checks.
Before you begin Ensure that your stack creation on AWS CloudFormation has no
errors.
Procedure
Step 1
Step 2
Step 3 Step 4
From the Amazon EC2 console, validate the network and system configuration and
verify that the Cisco DNA Center IP address is correct. Send a ping to the
Cisco DNA Center IP address to ensure that your host details and network
connection are valid. Establish an SSH connection with Cisco DNA Center to
verify that Cisco DNA Center is authenticated. Test HTTPS accessibility to the
Cisco DNA Center GUI using one of the following methods:
· Use a browser.
For more information about browser compatibility, see the Cisco DNA Center
Release Notes.
· Use Telnet through the CLI.
· Use curl through the CLI.
Cisco DNA Center on AWS Deployment Guide 98
I I I PA R T
Deploy Using AWS Marketplace
· Deploy Cisco DNA Center 2.3.5.3 on AWS Using AWS Marketplace, on page 101
5 C H A P T E R
Deploy Cisco DNA Center 2.3.5.3 on AWS Using AWS Marketplace
· Deploy Cisco DNA Center on AWS Manually Using AWS Marketplace, on page 101 ·
Manual Deployment Using AWS Marketplace Workflow, on page 101 · Prerequisites
for Manual Deployment Using AWS Marketplace, on page 101 · Deploy Cisco DNA
Center on AWS Manually Using AWS Marketplace, on page 107 · Validate the
Deployment, on page 107
Deploy Cisco DNA Center on AWS Manually Using AWS Marketplace
If you’re familiar with AWS administration, you have the option of deploying
Cisco DNA Center manually on your AWS account using AWS Marketplace.
Manual Deployment Using AWS Marketplace Workflow
To deploy Cisco DNA Center on AWS using this method, follow these high-level
steps: 1. Meet the prerequisites. See Prerequisites for Manual Deployment
Using AWS Marketplace, on page 101. 2. (Optional) Integrate
Read User Manual Online (PDF format)
Read User Manual Online (PDF format) >>