CISCO Prime Network Registrar 11.1 User Guide

June 16, 2024
Cisco

CISCO Prime Network Registrar 11.1

CISCO-Prime-Network-Registrar

Product Information

Specifications

  • Product Name: Cisco Prime Network Registrar 11.1
  • Publication Date: 2022-07-13
  • Manufacturer: Cisco Systems, Inc.
  • Headquarters: San Jose, CA, USA
  • Website: http://www.cisco.com
  • Contact: Tel: 408 526-4000, 800 553-NETS (6387), Fax: 408 527-0883

Introduction

Cisco Prime Network Registrar is a software solution designed for network administrators to manage and control IP addresses and phone numbers in a network environment. It provides configuration and performance guidelines, as well as support for various deployment scenarios.

Target Users
This product is intended for network administrators and IT professionals responsible for managing IP address allocation and phone number assignments in their network infrastructure.

Deployment Scenarios
The Cisco Prime Network Registrar can be deployed in various network environments, including:

  • Small-to-Medium-Size LANs
  • Large Enterprise Networks
  • Service Provider Networks

Configuration and Performance Guidelines
The following guidelines are provided for configuring and optimizing the performance of Cisco Prime Network Registrar:

  • General Configuration Guidelines
  • Special Configuration Cases
  • General Performance Guidelines
  • Interoperability with Earlier Releases

Related Topics

For more information on configuration, performance, and deployment scenarios, refer to the relevant chapters in the administration guide.

Product Usage Instructions

Chapter 1: Getting Started
This chapter provides an introduction to Cisco Prime Network Registrar and is intended for new users who are getting started with the product.

Chapter 2: Introduction to Cisco Prime Network Registrar
This chapter provides an overview of the features and capabilities of Cisco Prime Network Registrar. It explains the target users, deployment scenarios, and provides configuration and performance guidelines.

Cisco Prime Network Registrar 11.1 Administration Guide
First Published: 2022-07-13
Americas Headquarters
Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000
800 553-NETS (6387) Fax: 408 527-0883

THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE- NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.
All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current online version for the latest version.
Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at www.cisco.com/go/offices.
The documentation set for this product strives to use bias-free language. For purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on standards documentation, or language that is used by a referenced third-party product.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: https://www.cisco.com/c/en/us/about/legal/trademarks.html. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1721R)
© 2022 Cisco Systems, Inc. All rights reserved.

CONTENTS

PART I CHAPTER 1
CHAPTER 2

Getting Started 15
Introduction to Cisco Prime Network Registrar 1 Target Users 1 Regional and Local Clusters 2 Deployment Scenarios 2 Small-to-Medium-Size LANs 3 Large Enterprise and Service Provider Networks 3 Configuration and Performance Guidelines 4 Related Topics 4 General Configuration Guidelines 5 Special Configuration Cases 5 General Performance Guidelines 6 Interoperability with Earlier Releases 6
Cisco Prime Network Registrar User Interfaces 9 Management Components 9 Introduction to the Web-Based User Interfaces 10 Supported Web Browsers 10 Access Security 11 Logging in to the Web UI 11 Multiple Users 12 Changing Passwords 12 Navigating the Web UI 12 Waiting for Page Resolution Before Proceeding 13 Committing Changes in the Web UI 14

Cisco Prime Network Registrar 11.1 Administration Guide iii

Contents

CHAPTER 3

Role and Attribute Visibility Settings 14 Displaying and Modifying Attributes 14
Grouping and Sorting Attributes 14 Modifying Attributes 14 Displaying Attribute Help 15 Left Navigation Pane 15 Help Pages 15 Logging Out 16 Local Cluster Web UI 16 Related Topics 16 Local Basic Main Menu Page 16 Local Advanced Main Menu Page 17 Setting Local User Preferences 18 Configuring Clusters in the Local Web UI 20 Regional Cluster Web UI 20 Related Topics 20 Command Line Interface 20 REST API 22 Global Search in Prime Network Registrar 22
Server Status Dashboard 25 Opening the Dashboard 25 Display Types 26 General Status Indicators 26 Graphic Indicators for Levels of Alert 27 Magnifying and Converting Charts 27 Legends 27 Tables 27 Line Charts 28 Area Charts 29 Other Chart Types 30 Getting Help for the Dashboard Elements 30 Customizing the Display 30 Refreshing Displays 31

Cisco Prime Network Registrar 11.1 Administration Guide iv

PART II CHAPTER 4

Setting the Polling Interval 31 Displaying Charts as Tables 31 Exporting to CSV Format 31 Selecting Dashboard Elements to Include 32 Configuring Server Chart Types 32 Host Metrics 33 System Metrics 34 JVM Memory Utilization 35
Local and Regional Administration 37
Managing Administrators 39 Administrators, Groups, Roles, and Tenants 39 How Administrators Relate to Groups, Roles, and Tenants 39 Administrator Types 40 Roles, Subroles, and Constraints 41 Groups 44 External Authentication Servers 44 Configuring a RADIUS External Authentication Server 45 Configuring an AD External Authentication Server 46 Managing Tenants 48 Adding a Tenant 48 Editing a Tenant 49 Managing Tenant Data 49 Assigning a Local Cluster to a Single Tenant 51 Pushing and Pulling Tenant Data 51 Assigning Tenants When Using External Authentication 52 Using cnr_exim With Tenant Data 52 Managing Administrators 53 Adding Administrators 54 Editing Administrators 54 Deleting Administrators 54 Suspending/Reinstating Administrators 55 CLI Commands 55

Contents

Cisco Prime Network Registrar 11.1 Administration Guide v

Contents

Managing Passwords 55 Managing Groups 56
Adding Groups 56 Editing Groups 56 Deleting Groups 56 CLI Commands 56 Managing Roles 57 Adding Roles 57 Editing Roles 57 Deleting Roles 57 CLI Commands 57 Granular Administration 58 Local Advanced and Regional Advanced Web UI 58 Related Topics 58 Scope-Level Constraints 58 Prefix-Level Constraints 60 Link- Level Constraints 61 Centrally Managing Administrators 61 Pushing and Pulling Administrators 62 Pushing Administrators to Local Clusters 62 Pushing Administrators Automatically to Local Clusters 63 Pulling Administrators from the Replica Database 63 Pushing and Pulling External Authentication Servers 64 Pushing and Pulling Groups 67 Pushing Groups to Local Clusters 67 Pulling Groups from the Replica Database 67 Pushing and Pulling Roles 68 Pushing Roles to Local Clusters 68 Pulling Roles from the Replica Database 69 Pushing and Pulling Tenants 70 Pushing Tenants to Local Clusters 70 Pulling Tenants from the Replica Database 70 Session Management 71 User Sessions 71

Cisco Prime Network Registrar 11.1 Administration Guide vi

Contents

CHAPTER 5 CHAPTER 6

Active User Sessions 72 Logs for Session Events 73
Managing Owners and Regions 75 Managing Owners 75 Local Advanced and Regional Advanced Web UI 75 CLI Commands 75 Managing Regions 76 Local Advanced and Regional Advanced Web UI 76 CLI Commands 76 Centrally Managing Owners and Regions 76 Pushing and Pulling Owners or Regions 77 Pushing Owners or Regions to Local Clusters 77 Pulling Owners and Regions from the Replica Database 78
Managing the Central Configuration 79 Central Configuration Tasks 79 Default Ports for Cisco Prime Network Registrar Services 80 Firewall Considerations 81 DNS Performance and Firewall Connection Tracking 81 Configuring Caching DNS to Use Umbrella 83 Licensing 83 Use Cisco Smart Licensing 84 Setting Up Smart Licensing in Cisco Prime Network Registrar 84 Viewing Smart License Usage 87 Renewing License Authorization and ID Certificate 87 Re-registering Cisco Prime Network Register with the CSSM (or Satellite) 88 Deregistering Cisco Prime Network Register 89 Disabling Smart Licensing 89 Using Smart License Reservation 90 Smart Product Registration and License Authorization Statuses 92 Use Traditional Licensing 93 Adding Traditional License 94 License History 95

Cisco Prime Network Registrar 11.1 Administration Guide vii

Contents

License Utilization 95 Registering a Local Cluster that is Behind a NAT 96 Configuring Server Clusters 97 Adding Local Clusters 98 Editing Local Clusters 99 Connecting to Local Clusters 99 Synchronizing with Local Clusters 99 Replicating Local Cluster Data 100 Viewing Replica Data 100 Purging Replica Data 101 Deactivating, Reactivating, and Recovering Data for Clusters 101 Viewing Cluster Report 103 Central Configuration Management Server 103 Managing CCM Server 104 Editing CCM Server Properties 104 Trivial File Transfer 105 Viewing and Editing the TFTP Server 105 Managing the TFTP Server Network Interfaces 106 Simple Network Management 106 Setting Up the SNMP Server 108 How Notification Works 110 Handling SNMP Notification Events 113
Handling Deactivated Scopes or Prefixes 114 Editing Trap Configuration 114 Deleting Trap Configuration 115 Server Up/Down Traps 115 Handling SNMP Queries 116 Integrating Cisco Prime Network Registrar SNMP into System SNMP 117 Polling Process 117 Polling Utilization and Lease History Data 117 Adjusting the Polling Intervals 118 Enabling Lease History Collection 118 Managing DHCP Scope Templates 119 Pushing Scope Templates to Local Clusters 119

Cisco Prime Network Registrar 11.1 Administration Guide viii

Pulling Scope Templates from Replica Data 120 Managing DHCP Policies 120
Pushing Policies to Local Clusters 121 Pulling Policies from Replica Data 121 Managing DHCP Client-Classes 122 Pushing Client-Classes to Local Clusters 122 Pulling Client-Classes from Replica Data 123 Managing Virtual Private Networks 123 Pushing VPNs to Local Clusters 124 Pulling VPNs from Replica Data 124 Managing DHCP Failover Pairs 125
Regional Web UI 125 CLI Commands 125 Managing Lease Reservations 126 DHCPv4 Reservations 126 DHCPv6 Reservations 126 Monitoring Resource Limit Alarms 127 Configuring Resource Limit Alarm Thresholds 128 Setting Resource Limit Alarms Polling Interval 129 Viewing Resource Limit Alarms 129 Certificate Management 130 Adding SSL/TLS Certificates 132 Pulling and Pushing SSL/TLS Certificates 133 Pushing SSL/TLS Certificates to Local Clusters 133 Pulling SSL/TLS Certificates from the Replica Database 133 CLI Commands 134 Cisco Prime Network Registrar Use of Certificates 134 Web UI 134 Configuration Management Server 134 Authoritative DNS Server 134 Caching DNS Server 135 Certificate Expiration Notification 135 Local Cluster Management Tutorial 135 Related Topics 136

Contents

Cisco Prime Network Registrar 11.1 Administration Guide ix

Contents

CHAPTER 7

Administrator Responsibilities and Tasks 136 Create the Administrators 136 Create the Address Infrastructure 137 Create the Zone Infrastructure 138
Create the Forward Zones 138 Create the Reverse Zones 139 Create the Initial Hosts 139 Create a Host Administrator Role with Constraints 140 Create a Group to Assign to the Host Administrator 141 Test the Host Address Range 142 Regional Cluster Management Tutorial 142 Administrator Responsibilities and Tasks 142 Create the Regional Cluster Administrator 143 Create the Central Configuration Administrator 143 Create the Local Clusters 144 Add a Router and Modify an Interface 144 Add Zone Management to the Configuration Administrator 145 Create a Zone for the Local Cluster 145 Pull Zone Data and Create a Zone Distribution 146 Create a Subnet and Pull Address Space 146 Push a DHCP Policy 147 Create a Scope Template 148 Create and Synchronize the Failover Pair 148
Managing Routers and Router Interfaces 151 Adding Routers 151 Local Advanced and Regional Advanced Web UI 151 CLI Commands 151 Editing Routers 152 Local Advanced and Regional Advanced Web UI 152 CLI Commands 152 Viewing and Editing the Router Interfaces 152 Local Advanced and Regional Advanced Web UI 152 CLI Commands 152

Cisco Prime Network Registrar 11.1 Administration Guide x

CHAPTER 8

Changeable Router Interface Attributes 152 Bundling Interfaces 153 Pushing and Reclaiming Subnets for Routers 153
Maintaining Servers and Databases 155 Managing Servers 155 Local and Regional Web UI 156 CLI Commands 157 Scheduling Recurring Tasks 157 Local Web UI 158 CLI Commands 159 Logs 159 Log Files 159 Logging Server Events 161 Logging Format and Settings 162 Searching the Logs 162 View Change Log 163 Dynamic Update on Server Log Settings 164 Running Data Consistency Rules 164 Local and Regional Web UI 165 CLI Tool 165 Monitoring and Reporting Server Status 167 Server States 168 Displaying Health 168 Server Health Status 169 Displaying Statistics 169 DNS Statistics 171 CDNS Statistics 172 DHCP Statistics 173 TFTP Statistics 175 Displaying IP Address Usage 177 Displaying Related Servers 177 Monitoring Remote Servers Using Persistent Events 177 DNS Zone Distribution Servers 179

Contents

Cisco Prime Network Registrar 11.1 Administration Guide xi

Contents

CHAPTER 9

DHCP Failover Servers 179 Displaying Leases 180 Modifying the cnr.conf File 180
Syslog Support 181 Troubleshooting DHCP and DNS Servers 183
Immediate Troubleshooting Actions 183 Troubleshooting Server Failures 183 Troubleshooting Tools 184 Using the TAC Tool 184 Using the statscollector Utility 185 Troubleshooting and Optimizing the TFTP Server 187 Tracing TFTP Server Activity 187 Optimizing TFTP Message Logging 187 Enabling TFTP File Caching 188
Backup and Recovery 189 Backing Up Databases 189 Recommendation 189 Syntax and Location 190 Backup Strategy 190 Manual Backup (Using cnr_shadow_backup utility) 190 Setting Automatic Backup Time 191 Performing Manual Backups 191 Using Third-Party Backup Programs with cnr_shadow_backup 191 Backing Up CNRDB Data 191 Backing Up All CNRDBs Using tar or Similar Tools 193 Database Recovery Strategy 193 Recovering CNRDB Data from Backups 195 Recovering All CNRDBs Using tar or Similar Tools 195 Recovering Single CNRDB from tar or Similar Tools 196 Recovering from Regional Cluster Database Issues 196 Handling Lease History Database Issues 197 Handling Subnet Utilization Database Issues 197 Handling Replica Utilization Database Issues 198

Cisco Prime Network Registrar 11.1 Administration Guide xii

Contents

CHAPTER 10
PART III CHAPTER 11 CHAPTER 12 APPENDIX A

Rebuilding the Regional Cluster 198 Virus Scanning While Running Cisco Prime Network Registrar 199 Troubleshooting Databases 200
Using the cnr_exim Data Import and Export Tool 200 Using the cnrdb_recover Utility 202 Using the cnrdb_verify Utility 203 Using the cnrdb_checkpoint Utility 203 Using the cnrdb_util Utility 204 Restoring DHCP Data from a Failover Server 205
Managing Reports 207 ARIN Reports and Allocation Reports 207 Managing ARIN Reports 207 Managing Point of Contact and Organization Reports 208 Creating a Point of Contact Report 208 Registering a Point of Contact 209 Editing a Point of Contact Report 209 Creating an Organization Report 209 Registering an Organization 210 Editing an Organization Report 210 Managing IPv4 Address Space Utilization Reports 211 Regional Advanced Web UI 211 Managing Shared WHOIS Project Allocation and Assignment Reports 212
Cisco Prime Network Registrar on Docker and Kubernetes 213
Cisco Prime Network Registrar on Docker Container 215 How to Run Cisco Prime Network Registrar as Docker Container 215
Cisco Prime Network Registrar on Kubernetes 217 How to Deploy Cisco Prime Network Registrar Instances on Kubernetes 217
Server Statistics 219 DNS Statistics 219

Cisco Prime Network Registrar 11.1 Administration Guide xiii

Contents
CDNS Statistics 231 DHCP Statistics 237 Glossary 253
Cisco Prime Network Registrar 11.1 Administration Guide xiv

I P A R T
Getting Started
· Introduction to Cisco Prime Network Registrar, on page 1 · Cisco Prime Network Registrar User Interfaces, on page 9 · Server Status Dashboard, on page 25

1 C H A P T E R
Introduction to Cisco Prime Network Registrar
Cisco Prime Network Registrar is a full featured, scalable Domain Name System (DNS), Dynamic Host Configuration Protocol (DHCP), and Trivial File Transfer Protocol (TFTP) implementation for medium to large IP networks. It provides the key benefits of stabilizing the IP infrastructure and automating networking services, such as configuring clients and provisioning cable modems. This provides a foundation for policy-based networking. Service provider and enterprise users can better manage their networks to integrate with other network infrastructure software and business applications.
· Target Users, on page 1 · Regional and Local Clusters, on page 2 · Deployment Scenarios, on page 2 · Configuration and Performance Guidelines, on page 4 · Interoperability with Earlier Releases, on page 6
Target Users
Cisco Prime Network Registrar is designed for these users: · Internet service providers (ISPs)–Helps ISPs drive the cost of operating networks that provide leased line, dialup, and DSL (Point-to-Point over Ethernet and DHCP) access to customers. · Multiple service operators (MSOs)–Helps MSOs provide subscribers with internet access using cable or wireless technologies. MSOs can benefit from services and tools providing reliable and manageable DHCP and DNS services that meet the Data Over Cable Service Interface Specification (DOCSIS). Cisco Prime Network Registrar provides policy-based, robust, and scalable DNS and DHCP services that form the basis for a complete cable modem provisioning system. · Enterprises–Helps meet the needs of single- and multisite enterprises (small-to-large businesses) to administer and control network functions. Cisco Prime Network Registrar automates the tasks of assigning IP addresses and configuring the Transport Control Protocol/Internet Protocol (TCP/IP) software for individual network devices. Forward-looking enterprise users can benefit from class-of-service and other features that help integrate with new or existing network management applications, such as user registration.
Cisco Prime Network Registrar 11.1 Administration Guide 1

Regional and Local Clusters

Getting Started

Regional and Local Clusters
The regional cluster acts as an aggregate management system for up to a hundred local clusters. Address and server administrators interact at the regional and local clusters through the regional and local web-based user interface (web UI), and local cluster administrators can continue to use the command line interface (CLI) at the local cluster. The regional cluster consists of a Central Configuration Management (CCM) server, Tomcat web server, servlet engine, and server agent (see Management Components, on page 9). The license management is now done at the regional cluster and hence the local server has to be registered to a regional server to avail the necessary services. See the “Overview” chapter in Cisco Prime Network Registrar 11.1 Installation Guide for more details.
Figure 1: Cisco Prime Network Registrar User Interfaces and Server Clusters

A typical deployment is one regional cluster at a customer network operation center (NOC), the central point of network operations for an organization. Each division of the organization includes a local address management server cluster responsible for managing a part of the network. The System Configuration Protocol (SCP) communicates the configuration changes between the servers.
Deployment Scenarios
The Cisco Prime Network Registrar regional cluster web UI provides a single point to manage any number of local clusters hosting DNS, CDNS, DHCP, or TFTP servers. The regional and local clusters also provide administrator management so that you can assign administrative roles to users logged in to the application. This section describes two basic administrative scenarios and the hardware and software deployments for two different types of installations–a small-to-medium local area network (LAN), and a large-enterprise or service- provider network with three geographic locations.
Cisco Prime Network Registrar 11.1 Administration Guide 2

Getting Started

Small-to-Medium-Size LANs

Small-to-Medium-Size LANs
In this scenario, low-end Linux servers are acceptable. The image below shows a configuration that would be adequate for this network.
Note Regional server is MUST in deployment for small and medium sized LANs.
Figure 2: Small-to-Medium LAN Configuration

Large Enterprise and Service Provider Networks
In a large enterprise or service provider network serving over 500,000 DHCP clients, use mid-range Linux servers. Put DNS and DHCP servers on different systems. The image below shows the hardware that would be adequate for this network.
When supporting geographically dispersed clients, locate DHCP servers at remote locations to avoid disrupting local services if wide-area connections fail. Install the Cisco Prime Network Registrar regional cluster to centrally manage the distributed clusters.

Cisco Prime Network Registrar 11.1 Administration Guide 3

Configuration and Performance Guidelines Figure 3: Large Enterprise or Service Provider Network Configuration

Getting Started

Configuration and Performance Guidelines
Cisco Prime Network Registrar is an integrated DHCP, DNS, and TFTP server cluster capable of running on a Linux workstation or server. Because of the wide range of network topologies for which you can deploy Cisco Prime Network Registrar, you should first consider the following guidelines. These guidelines are very general and cover most cases. Specific or challenging implementations could require additional hardware or servers.
Related Topics
General Configuration Guidelines, on page 5
Cisco Prime Network Registrar 11.1 Administration Guide 4

Getting Started

General Configuration Guidelines

Special Configuration Cases, on page 5
General Performance Guidelines, on page 6
General Configuration Guidelines
The following suggestions apply to most Cisco Prime Network Registrar deployments:
· Configure a separate DHCP server to run in remote segments of the wide area network (WAN).
Ensure that the DHCP client can consistently send a packet to the server in under a second. The DHCP protocol dictates that the client receive a response to a DHCPDISCOVER or DHCPREQUEST packet within four seconds of transmission. Many clients (notably early releases of the Microsoft DHCP stack) actually implement a two-second timeout.
· In large deployments, separate the secondary DHCP server from the primary DNS server used for dynamic DNS updates.
Because lease requests and dynamic DNS updates are persisted to disk, server performance is impacted when using a common disk system. So that the DNS server is not adversely affected, run it on a different cluster than the DHCP server.
· Include a time server in your configuration to deal with time differences between the local and regional clusters so that aggregated data at the regional server appears in a consistent way. See the Polling Utilization and Lease History Data, on page 117.
· Set DHCP lease times in policies to four to ten days.
To prevent leases from expiring when the DHCP client is turned off (overnight or over long weekends), set the DHCP lease time longer than the longest period of expected downtime, such as seven days. See the “Managing Leases” section in Cisco Prime Network Registrar 11.1 DHCP User Guide.
· Locate backup DNS servers on separate network segments.
DNS servers are redundant by nature. However, to minimize client impact during a network failure, ensure that primary and secondary DNS servers are on separate network segments.
· If there are high dynamic DNS update rates in the network, configure separate DNS servers for forward and reverse zones.
· Use NOTIFY/IXFR.
Secondary DNS servers can receive their data from the primary DNS server in two ways: through a full zone transfer (AXFR) or an incremental zone transfer (NOTIFY/IXFR, as described in RFCs 1995 and 1996). Use NOTIFY/IXFR in environments where the name space is relatively dynamic. This reduces the number of records transferred from the primary to the secondary server. See the “Enabling Incremental Zone Transfers (IXFR)” section in Cisco Prime Network Registrar 11.1 Authoritative and Caching DNS User Guide.
Special Configuration Cases
The following suggestions apply to some special configurations:
· When using dynamic DNS updates for large deployments or very dynamic networks, divide primary and secondary DNS and DHCP servers across multiple clusters.

Cisco Prime Network Registrar 11.1 Administration Guide 5

General Performance Guidelines

Getting Started

Dynamic DNS updates generate an additional load on all Cisco Prime Network Registrar servers as new DHCP lease requests trigger dynamic DNS updates to primary servers that update secondary servers through zone transfers.
· During network reconfiguration, set DHCP lease renewal times to a small value.
Do this several days before making changes in network infrastructure (such as to gateway router and DNS server addresses). A renewal time of eight hours ensures that all DHCP clients receive a changed DHCP option parameter within one working day. See the “Managing Leases” section in Cisco Prime Network Registrar 11.1 DHCP User Guide
General Performance Guidelines
For Cisco Prime Network Registrar, the general guideline is to invest in the highest performance disk I/O subsystem available, then memory, and finally the processors. DHCP and Authoritative DNS (especially if using DNS updates) will be most impacted by disk latency, then memory and network performance, and finally CPU (these applications are not CPU intensive).
· The best way to reduce latency and improve performance is to provide high performance disks (SSD are recommended over traditional hard disks). High performance disk controllers are also recommended. This is especially important for DHCP and Authoritative DNS servers that handle Dynamic Updates.
· Providing lots of memory is also important as it reduces disk read requirements if the file system cache can be used. The recommendation here is to assure that a system has sufficient free memory that is twice the size of the Cisco Prime Network Registrar databases. It is difficult to give exact requirements here as it depends on many variables.
· Network performance is also an important consideration and 1 GB or better Ethernet controllers are recommended.
· As most Cisco Prime Network Registrar uses are not CPU intensive, the CPU performance tends to be least important.

Interoperability with Earlier Releases

The following table shows the interoperability of Cisco Prime Network Registrar features on the regional CCM server with versions of the local cluster.
Table 1: CCM Regional Feature Interoperability with Server Versions

Feature

Local Cluster Version

9.0

9.1

10.0

10.1

11.0

11.1

Push and pull:

Address space

x

x

x

x

x

x

IPv6 address space

x

x

x

x

x

x

Scope templates, policies,

x

x

x

x

x

x

client-classes

Cisco Prime Network Registrar 11.1 Administration Guide 6

Getting Started

Interoperability with Earlier Releases

Feature

Local Cluster Version

9.0

9.1

10.0

10.1

11.0

11.1

IPv6 prefix and link templates x

x

x

x

x

x

Zone data and templates

x

x

x

x

x

x

Groups, owners, regions

x

x

x

x

x

x

Resource records (RRs)

x

x

x

x

x

x

Local cluster restoration

x

x

x

x

x

x

Host administration

x

x

x

x

x

x

Extended host administration x

x

x

x

x

x

Administrators and roles

x

x

x

x

x

x

Zone Views

x

x

x

x

x

x

Administrator:

Single sign-on

x

x

x

x

x

x

Password change

x

x

x

x

x

x

IP history reporting:

Lease history

x

x

x

x

x

x

Detailed lease history

x

x

x

x

x

x

Utilization reporting:

DHCP utilization history (v4 x

x

x

x

x

x

History)

DHCP utilization history (v6 History)

x

x

x

x

x

Subnet and scope utilization x

x

x

x

x

x

IPv6 prefix utilization

x

x

x

x

x

x

Cisco Prime Network Registrar 11.1 Administration Guide 7

Interoperability with Earlier Releases

Getting Started

Cisco Prime Network Registrar 11.1 Administration Guide 8

2 C H A P T E R
Cisco Prime Network Registrar User Interfaces
Cisco Prime Network Registrar provides a regional and a local web UI and a regional and local CLI to manage the CDNS, DNS, DHCP, TFTP, and CCM servers:
· Web UI for the regional cluster to access local cluster servers–See Regional Cluster Web UI, on page 20.
· Web UI for the local cluster–See Local Cluster Web UI, on page 16. · CLI for the local clusters–Open the CLIContent.html file in the installation /docs directory (see
Command Line Interface, on page 20). · REST API–See REST API, on page 22. · CCM servers that provide the infrastructure to support these interfaces– See Central Configuration
Management Server, on page 103.
This chapter describes the Cisco Prime Network Registrar user interfaces and the services that the CCM servers provide. Read this chapter before starting to configure the Cisco Prime Network Registrar servers so that you become familiar with each user interface capability.
· Management Components, on page 9 · Introduction to the Web-Based User Interfaces, on page 10 · Local Cluster Web UI, on page 16 · Regional Cluster Web UI, on page 20 · Command Line Interface, on page 20 · REST API, on page 22 · Global Search in Prime Network Registrar, on page 22
Management Components
Cisco Prime Network Registrar contains two management components: · Regional component, consisting of: · Web UI · CLI · CCM Server
Cisco Prime Network Registrar 11.1 Administration Guide 9

Introduction to the Web-Based User Interfaces

Getting Started

· Simple Network Management Protocol (SNMP) server
· Local component, consisting of: · Web UI · CLI · CCM server · Authoritative Domain Name System (DNS) server · Caching / Recursive Domain Name System (CDNS) server · Dynamic Host Configuration Protocol (DHCP) server · Trivial File Transport Protocol (TFTP) server · SNMP server · Management of local address space, zones, scopes, DHCPv6 prefixes and links, and users

Note Cisco Prime Network Registrar includes a Hybrid DNS feature that allows you to run both the Caching DNS and Authoritative DNS servers on the same operating system without two separate virtual or physical machines. However, Cisco recommends hybrid mode for smaller sized deployments only. For larger deployments, Cisco recommends separating Caching and Authoritative DNS on separate physical machines or VMs.
License management is done from the regional cluster when Cisco Prime Network Registrar is installed. You must install the regional server first and load all licenses in the regional server. When you install the local cluster, it registers with regional to obtain its license.
The regional CCM server provides central management of local clusters, with an aggregated view of DHCP address space and DNS zones. It provides management of the distributed address space, zones, scopes, DHCPv6 prefixes and links, and users.
The local CCM server provides management of the local address space, zones, scopes, DHCPv6 prefixes and links, and users.
The remainder of this chapter describes the TFTP and SNMP protocols. The CCM server, web UI, and CLI are described in Cisco Prime Network Registrar User Interfaces, on page 9. The DNS, CDNS, and DHCP servers are described in their respective sections.
Introduction to the Web-Based User Interfaces
The web UI provides granular access to configuration data through user roles and constraints. The UI provides quick access to common functions. The web UI granularity is described in the following sections.
Supported Web Browsers
The web UI has been tested on Microsoft Edge 89, Mozilla Firefox 86, and Google Chrome 89. Internet Explorer is not supported.

Cisco Prime Network Registrar 11.1 Administration Guide 10

Getting Started

Access Security

Access Security
At Cisco Prime Network Registrar installation, you can choose to configure HTTPS to support secure client access to the web UI. You must specify the HTTPS port number and provide the keystore at that time. With HTTPS security in effect, the web UI Login page indicates that the “Page is SSL1 Secure.”
Note Do not use a dollar sign ($) symbol as part of a keystore password.
Logging in to the Web UI
You can log in to the Cisco Prime Network Registrar local or regional cluster web UI by HTTPS secure login. After installing Cisco Prime Network Registrar, open one of the supported web browsers and specify the login location URL in the browser address. Login is convenient and provides some memory features to increase the login speed. You can log in using a secure login as follows: Open the web browser and go to the website. For example, if default ports were used during the installation, the URLs would be https://hostname:8443 for the local cluster web UI, and https://hostname:8453 for the regional cluster web UI.
Note Open the regional web UI first and add the licenses for the required services.
If you are logging in for the first time, this opens the Add Superuser Administrator page. Enter the superuser administrator name and password, and then click the Add button. Smart Licensing is enabled by default in Cisco Prime Network Registrar. Click the Configure Smart Licensing link in the alert window to open the Smart Software Licensing page and set up Smart Licensing. For details, see Use Cisco Smart Licensing, on page 84. If you want to use traditional licensing, you must disable Smart Licensing first (see Disabling Smart Licensing, on page 89). Then, enter the license information as follows: Click Use Traditional Licensing, then click Browse in the New Product Installation page, and add the valid license. If the license key is acceptable, the Cisco Prime Network Registrar login page is displayed.
Note You can add the licenses only in the regional server. The local has to be registered to the regional at the time of installation to run the desired licensed services.
In the local server, confirm the regional server IP address and port number and also the services you want to run at the time of your first login. Click Register to confirm registration. If the regional server is configured with the required licenses, the login page is displayed. Enter the superuser username and password that is created during the first login to log in to the web UI. The password is case-sensitive (see Managing Passwords, on page 55).
1 This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/ ).

Cisco Prime Network Registrar 11.1 Administration Guide 11

Multiple Users

Getting Started

Note There is no default username or password for login.
Depending on how your browser is set up, you might be able to abbreviate the account name or choose it from a drop-down list while setting the username. To log in, click Log In. The Configuration Summary page is displayed by default which shows the summary of configuration details on the cluster. The Configuration Summary page on the regional cluster displays the configured failover-pairs and zone distributions which further can display the underlying cluster or HA pairs. You can use the graphical utilities such as Show Visualization icon ( ) or Show Table View icon ( ) in the chart to view the network data in chart or table format.
Multiple Users
The Cisco Prime Network Registrar user interfaces support multiple, concurrent users. If two users try to access the same object record or data, a Modified object error will occur for the second user. If you receive this error while editing user data, do the following:
· In the web UI–Cancel the edits and refresh the list. Changes made by the first user will be reflected in the list. Redo the edits, if necessary.
· In the CLI–Use the session cache refresh command to clear the current edits, before viewing the changes and making further edits. Make changes, if you feel that it is necessary even after the other user’s changes.
Changing Passwords
Whenever you edit a password on a web UI page, it is displayed as a string of eight dots. The actual password value is never sent to the web browser. So, if you change the password, the field is automatically cleared. You must enter the new password value completely, exactly as you want it to be.
Note The password should not be more than 255 characters long.
For details on changing administrator passwords at the local and regional cluster, see Managing Passwords, on page 55.
Navigating the Web UI
The web UI provides a hierarchy of pages based on the functionality you desire and the thread you are following as part of your administration tasks. The page hierarchy prevents you from getting lost easily.
Caution Do not use the Back button of the browser. Always use the navigation menu, or the Cancel button on the page to return to a previous page. Using the browser Back button can cause erratic behavior or can cause failures.
Cisco Prime Network Registrar 11.1 Administration Guide 12

Getting Started

Waiting for Page Resolution Before Proceeding

A single sign-on feature is available to connect between the regional and local clusters. The regional cluster web UI pages include the Connect button in the List/Add Remote clusters page, which you can click to connect to the local cluster associated with the icon. If you have single sign-on privileges to the local cluster, the connection takes you to the related local server management page (or a related page for related server configurations). If you do not have these privileges, the connection takes you to the login page for the local cluster. To return to the regional cluster, local cluster pages have the Return button on the main toolbar.
Note To protect against vulnerabilities, strict SameSite support for cookies has been added to the web UI in Cisco Prime Network Registrar 11.1. The attribute to control this is in the context.xml file in the tomcat/conf folder. If single sign-on support is required, in the tomcat/conf/context.xml file, delete the line or change the line to . You must restart the server agent for the changes to take effect.
The Search bar in the navigation menu provides an easy way to search for menus. The Pin icon in the top right corner of the navigation menu helps to pin/unpin the menu. Cisco Prime Network Registrar provides a facility to save the frequently used pages/menus as favorites, which helps in accessing them easily. To configure the page/menu as favorite, after navigating to the desired menu, click the Favorite icon (star icon ( ) next to the navigation path), provide the appropriate name, and then click OK. The pages/menus which are configured as favorites appear under the Favorites section of the global navigation. You can delete the menus from the favorites list by clicking the Delete icon next to them. Configuration Summary page is listed under the Favorites section by default.
Note Click the double arrow icon ( ) in any page to view the hidden options/functionalities.
Note Navigation menu items can vary based on if you have the role privileges for IPv4 or IPv6. For example, the Design menu can be DHCPv4 and DHCPv6 if you have the ipv6-management subrole of the addrblock-admin role assigned.
Waiting for Page Resolution Before Proceeding
Operations performed in the web UI, such as resynchronizing or replicating data from server clusters, are synchronous in that they do not return control to the browser until the operation is completed. These operations display confirmation messages in blue text. Also, the browsers display a wait cursor while the operation is in progress.
Tip Wait for each operation in the web UI to finish before you begin a new operation. If the browser becomes impaired, close the browser, reopen it, then log in again. Some operations like zone distributions can take significant amount of time, so you may have to wait till the operation completes.

Cisco Prime Network Registrar 11.1 Administration Guide 13

Committing Changes in the Web UI

Getting Started

Committing Changes in the Web UI
You do not actually commit the page entries you make until you click Save on the page. You can delete items using the Delete icon. To prevent unwanted deletions, a Confirm Delete dialog box appears in many cases so that you have a chance to confirm or cancel the deletion.
Role and Attribute Visibility Settings
Click the Settings drop-down list on the toolbar at the top of the main page to modify user preferences, session settings, user permissions, or debug settings.
· To view the user groups and roles for the administrator, select the User Preferences option. Superuser is a special kind of administrator. (For details how to set up these administrator roles, see Create the Administrators, on page 136.)
· Select Session Settings to open the Session Settings dialog, select the mode from the Session Web UI Mode drop-down list, and click Modify Session Settings. You can also click the drop-down arrow of the Mode icon ( ) to view the list of modes. Select the required mode from the list:
· Basic–Basic user mode (the preset choice).
· Advanced–Advanced user mode that exposes the normal attributes.
· Expert–Expert user mode that exposes a set of attributes that are relevant for fine-tuning or troubleshooting the configuration. In most cases, you would accept the default values for these expert attributes and not change them without guidance from the Cisco Technical Assistance Center (TAC). Each Expert mode attribute is marked with a Warning icon on the configuration pages. Each page is clearly marked as being in Expert mode.
Displaying and Modifying Attributes
Many of the web UI pages, such as those for servers, zones, and scopes, include attribute settings that correspond to those you can set using the CLI. (The CLI name equivalents appear under the attribute name.) The attributes are categorized into groups by their function, with the more prominent attributes listed first and the ones less often configured nearer the bottom of the page.
Grouping and Sorting Attributes
On many Advanced mode web UI pages, you can toggle between showing attributes in groups and in alphabetical order. These pages generally open by default in group view so that you can see the attributes in their respective categories. However, in the case of large numbers of attributes, you might want to see the attributes alphabetized. Click Show A-Z View to change the page to show the attributes alphabetically. Click Show Group View to change the page to show the attributes in groups. You can also expand or collapse the attribute groups in group view by clicking Expand All or Collapse All. In Expert mode, the Expert mode attributes are alphabetized separately further down the page under the Visibility=3 heading and are all marked with the Warning icon.
Modifying Attributes
You can modify attribute values and unset those for optional attributes. In many cases, these attributes have preset values, which are listed under the Default column on the page. The explicit value overrides the default

Cisco Prime Network Registrar 11.1 Administration Guide 14

Getting Started

Displaying Attribute Help

one, but the default one is always the fallback. If there is no default value, unsetting the explicit value removes all values for that attribute.
Displaying Attribute Help
For contextual help for an attribute, click the name of the attribute to open a separate popup window.

Left Navigation Pane
The web UI also provides a navigation pane on the left of the main pages. This navigation pane provides access to objects that are added as part of the various categories. The objects are listed in a tabular format and you can click the object to edit its properties in the main page.
Each object displayed under a category in the pane has a Quick View icon associated with it. The Quick View icon expands to open a dialog box that displays the main details about the object, and provides links (if any) to perform the main actions associated with the object.
By default, the list of objects is displayed in a single column format. However, you can add additional columns in the left pane. To add additional columns for objects, click the gear icon ( ) above the objects table in the left pane, select the desired column names, and then click Close. You can save the column format by clicking the Save Column Format button.
There are Quick Filter and Advanced Filter options available to filter the objects as needed. To do a quick search for the objects, you can use the Quick Filter option. Click the Filter icon ( ) or select Quick Filter from the Show drop-down list located above the objects table and then enter the search string in the search bar. The objects are listed as per your search criteria.
You can also use Advanced Filter to filter the objects. Select Advanced Filter from the Show drop-down list, set the appropriate filter and condition in the Advanced Filter dialog box, and then click OK. Once you click OK, the object list on the left pane is filtered as per the filter specified. To save the filter, click Save As in the Advanced Filter dialog box, enter the appropriate name in the Save Filter dialog box, and then click Save. The saved filter name appears in the Show drop-down list and you can use this filter on that particular object list at any time. You can also set this filter as the default filter by clicking the Set Default Filter button.
The user defined filters can be edited or removed. To do this, select Manage User Defined Filters from the Show drop-down list, select the required user defined filter from the filter list in the Manage User Defined Filters dialog box, and then click Edit or Remove as required.

Help Pages

The web UI provides a separate window that displays help text for each page. The Help pages provide: · A context-sensitive help topic depending on which application page you have open.
· A clickable and hierarchical Contents and Index, and a Favorites setting, as tabs on a left-hand pane that you can show or hide.
· A Search facility that returns a list of topics containing the search string, ordered by frequency of appearance of the search string.
· Forward and backward navigation through the history of Help pages opened.
· A Print function
· A Glossary

Cisco Prime Network Registrar 11.1 Administration Guide 15

Logging Out

Getting Started

Logging Out
Log out of the web UI by clicking Log Out link. You can find the Log Out under the gear icon at the top right corner of the application page.
Local Cluster Web UI
The local cluster web UI provides concurrent access to Cisco Prime Network Registrar user and protocol server administration and configuration. It provides granular administration across servers with permissions you can set on a per element or feature basis. The local cluster web UI is available in three user modes:
· Basic Mode– Provides a more simplified configuration for the more frequently configured objects, such as DHCP scopes and DNS zones (see Local Basic Main Menu Page, on page 16).
· Advanced Mode– Provides the more advanced configuration method familiar to past users of the Cisco Prime Network Registrar web UI, with some enhancements (see Local Advanced Main Menu Page, on page 17).
· Expert Mode (marked with the icon)-For details on Expert mode, see Role and Attribute Visibility Settings, on page 14.
Change to Basic, Advanced, or Expert mode by clicking the drop-down arrow of the Mode icon ( ) on the toolbar at the top right of the page (see Setting Local User Preferences, on page 18).
Note If you change the IP address of your local cluster machine, see the Note in Configuring Clusters in the Local Web UI, on page 20.
Related Topics
Introduction to the Web-Based User Interfaces, on page 10 Regional Cluster Web UI, on page 20
Local Basic Main Menu Page
The Basic tab activated on the toolbar at the top right corner of the page implies that you are in Basic user mode. Otherwise, click the drop-down arrow of the Mode icon ( ) to view the list of modes and select Basic. You can see the submenu items under the navigation menu by clicking the global navigation icon on the top left corner of the page. To choose a submenu under a navigation menu, place the cursor over the navigation menu item. For example, place the cursor on Operate to choose the Manage Servers. Also, you can select any submenu under the required navigation menu and then navigate to the required submenu page from the left pane. For example, place the cursor on Operate, choose Schedule Tasks. You can see List/Add Scheduled Tasks page along with a left pane that has links to Manage Servers, Manage Clusters, Schedule Tasks, and View Change Log. Click the Manage Servers link to view the Manage Servers page. The Local Basic main menu page provides functions with which you can:

Cisco Prime Network Registrar 11.1 Administration Guide 16

Getting Started

Local Advanced Main Menu Page

· Open the dashboard to monitor system health–Open the Operate menu and click Dashboard. See the “Server Status Dashboard” chapter.
· Set up a basic configuration by using the Setup interview pages–Click the Setup icon at the top and select the different tabs in the Setup page. See Cisco Prime Network Registrar 11.1 Quick Start Guide for more details.
· Administer users, tenants, encryption keys–Place the cursor on the Administration menu (for user access options) or Design menu (for Security > Keys option). See Managing Administrators, on page 39.
· Manage the Cisco Prime Network Registrar protocol servers–Place the cursor on the Operate menu and select Manage Servers or Schedule Tasks option. See Maintaining Servers and Databases, on page 155.
· Manage clusters–Place the cursor on the Operate menu and choose Manage Clusters option. See Configuring Server Clusters, on page 97.
· Configure DHCP–Place the cursor on Design menu and select the options under DHCP Settings, DHCPv4, or DHCPv6. See the “Managing DHCP Server” chapter in Cisco Prime Network Registrar 11.1 DHCP User Guide.
· Configure DNS–Place the cursor on the Design menu and select the options under Cache DNS and Auth DNS. Place the cursor on the Deploy menu and select the options under DNS and DNS Updates. See the “Managing Zones” section in Cisco Prime Network Registrar 11.1 Authoritative and Caching DNS User Guide.
· Manage hosts in zones–From the Design menu, choose Hosts under the Auth DNS submenu. See the “Managing Hosts” section in Cisco Prime Network Registrar 11.1 Authoritative and Caching DNS User Guide.
· Go to Advanced mode–Click Advanced in the top right corner of the page. See Local Advanced Main Menu Page, on page 17.
Local Advanced Main Menu Page
To switch to Advanced user mode from the Basic user Main Menu page, click the drop-down arrow of the Mode icon ( ) at the top right of the window to view the list of modes and select Advanced. Doing so opens another Main Menu page, except that it shows the Advanced user mode functions. To switch back to Basic mode at any time, click next to the Mode icon at the top right of the window and select Basic.
The local Advanced mode Main Menu page includes advanced Cisco Prime Network Registrar functions that are in addition to the ones in Basic mode:
· Open the dashboard to monitor system health–Open the Operate menu and click Dashboard. See the “Server Status Dashboard” chapter.
· Administer users, tenants, groups, roles, regions, access control lists (ACLs), and view change logs–Place the cursor on the Administration menu (for user access options), Design menu (for ACLs), or Operate menu (for change logs). See Managing Administrators, on page 39.
· Manage the Cisco Prime Network Registrar protocol servers–Place the cursor on the Operate menu and select Manage Servers or Schedule Tasks option. See Maintaining Servers and Databases, on page 155.

Cisco Prime Network Registrar 11.1 Administration Guide 17

Setting Local User Preferences

Getting Started

· Manage clusters–Place the cursor on the Operate menu and choose Manage Clusters. See Configuring Server Clusters, on page 97.
· Configure Routers–Place the cursor on the Deploy menu and select the options under Router Configuration. See Managing Routers and Router Interfaces, on page 151.
· Configure DHCPv4–Place the cursor on the Design menu and select any option under DHCPv4. See the “Managing DHCP Server” chapter in Cisco Prime Network Registrar 11.1 DHCP User Guide.
· Configure DHCPv6–Place the cursor on the Design menu and select any option under DHCPv6. See the “DHCPv6 Addresses” section in Cisco Prime Network Registrar 11.1 DHCP User Guide.
· Configure DNS–Place the cursor on the Design menu and select the options under Cache DNS and Auth DNS. Place the cursor on the Deploy menu and select the options under DNS and DNS Updates. See the “Managing Zones” section in Cisco Prime Network Registrar 11.1 Authoritative and Caching DNS User Guide.
· Manage hosts in zones–From the Design menu, choose Hosts under the Auth DNS submenu. See the “Managing Hosts” section in Cisco Prime Network Registrar 11.1 Authoritative and Caching DNS User Guide.
· Manage IPv4 address space–Place the cursor on the Design menu and select any option under DHCPv4. See the “Managing Address Space” section in Cisco Prime Network Registrar 11.1 DHCP User Guide.
· Configure IPv6 address space–Place the cursor on the Design menu and select any option under DHCPv6. See the “DHCPv6 Addresses” section in Cisco Prime Network Registrar 11.1 DHCP User Guide.
· Go to Basic mode– Click the drop-down arrow of the Mode icon ( ) at the top right corner of the page and choose Basic. See Local Basic Main Menu Page, on page 16.
The Advanced user mode page provides additional functions:
· View the user role and group data for the logged-in user–See Role and Attribute Visibility Settings, on page 14.
· Set your preferred session settings–See Role and Attribute Visibility Settings, on page 14.
· Set server debugging–You can set debug flags for the protocol servers. Set these values only under diagnostic conditions when communicating with the Cisco Technical Assistance Center (TAC).
· Change your login administrator password–See Managing Passwords, on page 55.
Setting Local User Preferences
You can maintain a short list of web UI settings through subsequent user sessions. The only difference between the Basic and Advanced or Expert mode user preference pages is that Advanced and Expert modes have additional columns listing the data types and defaults.
You can edit the user preferences by going to User Preferences under the Settings drop-down list. The user preference attributes to set are:
· Username–Username string, with a preset value of admin. You cannot modify this field.

Cisco Prime Network Registrar 11.1 Administration Guide 18

Getting Started

Setting Local User Preferences

· Web UI list page size–Adjust the page size by the number of displayed lines in a list; the preset value is 10 lines.
· Web UI mode–User mode at startup: Basic, Advanced, or Expert (see Role and Attribute Visibility Settings, on page 14). If unset, the mode defaults to the one set in the CCM server configuration (see Managing Servers, on page 155).
· Web UI tree page size–Adjust the page size when displaying a tree view in the web UI.
· Web UI log page size–Adjust the page size on log pages.
· Web UI report page size–Adjust the page size to use when displaying report pages in the web UI.
· Views–Specify the DNS view setting at session startup in the web UI or CLI.
· VPN–Specify the VPN setting at session startup in the web UI or CLI.
· Alarm poll interval–Adjust the alarm poll interval; that is, how often Network Registrar polls the alarm data from server.
· Homepage–Set a page from favorites list as the homepage for the application. By default, Configuration Summary page is set as the homepage. You can set a page of your choice as the homepage for the application. To do this, add the desired page to the Favorites list (see Navigating the Web UI, on page 12), select the page name from the Homepage drop-down list, and then click Modify User Preferences. You can click the Home icon ( ) on the top left corner of the web UI to go to the homepage.
· Date format–Set the date-time format for date-time values in the web UI. A format can be selected from the default list or entered in text form as <date- pattern> . Supported patterns are: · Year as “yy”, “yyyy”
· Month as “M”, “MM”, “MMM”, “MMMM”
· Day as “d”, “dd”
· Hour as “h”, “hh”, “H”, “HH”
· Minute as “mm”
· Second as “s”, “ss”
· Delimiters as “:”, “-“, “/”
· Chart X-Axis Timestamp Pattern–Specify the pattern to be used for displaying the timestamp on x-axis while displaying charts.
· Tree node display–Specify the initial display option for tree nodes. If this setting is set to Expanded and the number of nested child nodes is greater than 500, it may take a few minutes to display the tree.
You can unset the page size and web UI mode values by checking the check box in the Unset? column, next to the attribute. After making the user preference settings, click Modify User Preferences.

Cisco Prime Network Registrar 11.1 Administration Guide 19

Configuring Clusters in the Local Web UI

Getting Started

Configuring Clusters in the Local Web UI
You can define other local Cisco Prime Network Registrar clusters in the local web UI. The local cluster on the current machine is called the localhost cluster. To set up other clusters, choose Manage Clusters from the Operate menu to open the List/Add Clusters page. Note that the localhost cluster has the IP address and SCP port of the local machine. Click the Add Cluster icon in the left pane to open the Add Cluster page. At a minimum, you must enter the name and address (IPv4 and/or IPv6) of the remote local cluster. You should also enter the admin name and password, along with possibly the SCP port (if not 1234) of the remote cluster. Click Add Cluster. To edit a cluster, click the cluster name in the Clusters pane on the left to open the Edit Cluster page. If you want to use secure access mode, select use-ssl as disabled, optional, or required (optional is the preset value; you need the security library installed if you choose required). Make the changes and then click Save.
Note If you change the IP address of your local cluster machine, you must modify the localhost cluster to change the address in the ipaddr field. Avoid setting the value to the loopback address (127.0.0.1); if you do, you must also set the actual IP addresses of main and backup servers for DHCP failover and High-Availability (HA) DNS configurations.
Regional Cluster Web UI
The regional cluster web UI provides concurrent access to regional and central administration tasks. It provides granular administration across servers with permissions you can set on a per element or feature basis. After you log in to the application, the Home page appears. Regional cluster administration is described in Managing the Central Configuration, on page 79.
Related Topics
Introduction to the Web-Based User Interfaces, on page 10 Local Cluster Web UI, on page 16
Command Line Interface
Using the Cisco Prime Network Registrar CLI (the nrcmd program), you can control your local cluster server operations. You can set all configurable options, as well as start and stop the servers.
Note The CLI provides concurrent access, by at most 14 simultaneous users and processes per cluster.
Tip See the CLIContents.html file in the /docs subdirectory of your installation directory for details.
The nrcmd program for the CLI is located in the install-path/usrbin directory. On a local cluster, once you are in the appropriate directory, use the following command at the prompt:

Cisco Prime Network Registrar 11.1 Administration Guide 20

Getting Started

Command Line Interface

nrcmd [-C cluster[:port]] [-N user] [-P password] [-h] [-r] [-v] [-b < script | command] nrcmd -C clustername:port -N username -P password [­L| -R] · ­C–Cluster name, preset value localhost. Specify the port number with the cluster name while invoking nrcmd to connect to another cluster. See the preceding example. The port number is optional if the cluster uses the default SCP port–1234 for local and 1244 for regional. Ensure that you include the port number if the port used is not the default one.
· ­N–Username. You have to enter the username that you created when first logged into the web UI. · ­P–User password. You have to enter the password that you created for the username. · ­L–Access the local cluster CLI. · ­R–Access the regional cluster CLI. · -b < script–Process script file of nrcmd commands. · -h–Print this help text. · -r –Login as a read-only user. · -R–Connect to regional. · -v (or -vv)–Report the program version and exit. · -V–Specify the session visibility

Note Cluster defaults to localhost if not specified. Tip For additional command options, see the CLIGuide.html file in /docs.

Note If you change the IP address of your local cluster machine, you must modify the localhost cluster to change the address in the ipaddress attribute. Do not set the value to 127.0.0.1.
You can also send the output to a file using:
nrcmd> session log filename
For example: To send the leases on the DHCP server to a file (leases.txt), use the following commands:
nrcmd> session log leases.txt nrcmd> lease list
Note To close a previously opened file, use session log (no filename). This stops writing the output to any file.
To disconnect from the cluster, use exit:

Cisco Prime Network Registrar 11.1 Administration Guide 21

REST API

Getting Started

nrcmd> exit
Tip The CLI operates on a coordinated basis with multiple user logins. If you receive a cluster lock message, determine who has the lock and discuss the issue with that person. (See Multiple Users, on page 12.)
REST API
The Cisco Prime Network Registrar REST API provides access to a set of resources that can be managed by an HTTP client. It is supported on the regional server and on local DHCP, DNS, and Caching DNS servers, provided web services have been enabled. To know about the REST methods and endpoints to use to get information about the most commonly used objects in Cisco Prime Network Registrar, see Cisco Prime Network Registrar 11.1 REST APIs Quick Start Guide. For complete details on the REST APIs that are supported by Cisco Prime Network Registrar, see Cisco Prime Network Registrar 11.1 REST APIs Reference Guide. Starting with 11.1, Cisco Prime Network Registrar supports Swagger based documentation for the REST API which covers most of the scenarios. However, it does not cover all the REST API requests, especially the special cases with actions.
Global Search in Prime Network Registrar
The Local and Regional web UI in Prime Network Registrar also provides a global search functionality for the IP addresses or DNS names available in the local clusters. The search interface element is available at the top right corner of the main page.

Note To view the search interface element and run the search for IP addresses and DNS names, Cisco Prime Network Registrar must be licensed with DHCP or DNS, and the DHCP or DNS services must be enabled for the local cluster (in the List/Add Remote Clusters page in Regional web UI).

The following table shows the typical search results under different scenarios.
Table 2: Typical Search Results

You search for…

With active licenses and services Search Results for…

An IPv4 address

Only DHCP

The closest matching scope, scope lease or scope reservation

An IPv4 address or a DNS FQDN Only DNS

The related Zone or Resource Record

An IPv6 address

Only DHCP

The closest matching prefix, prefix lease or prefix reservation

Cisco Prime Network Registrar 11.1 Administration Guide 22

Getting Started

Global Search in Prime Network Registrar

You search for…

With active licenses and services Search Results for…

An IPv6 address or a DNS FQDN Only DNS

The related Zone or Resource Record

An IPv4 address, an IPv6 address Both DHCP and DNS or a DNS FQDN

All of the above, based on the type of address

Cisco Prime Network Registrar 11.1 Administration Guide 23

Global Search in Prime Network Registrar

Getting Started

Cisco Prime Network Registrar 11.1 Administration Guide 24

3 C H A P T E R
Server Status Dashboard
The Cisco Prime Network Registrar server status dashboard in the web user interface (web UI) presents a graphical view of the system status, using graphs, charts, and tables, to help in tracking and diagnosis. These dashboard elements are designed to convey system information in an organized and consolidated way, and include:
· Significant protocol server and other metrics · Alarms and alerts · Database inventories · Server health trends
The dashboard is best used in a troubleshooting desk context, where the system displaying the dashboard is dedicated for that purpose and might be distinct from the systems running the protocol servers. The dashboard system should point its browser to the system running the protocol servers. You should interpret dashboard indicators in terms of deviations from your expected normal usage pattern. If you notice unusual spikes or drops in activity, there could be communication failures or power outages on the network that you need to investigate.
· Opening the Dashboard, on page 25 · Display Types, on page 26 · Customizing the Display, on page 30 · Selecting Dashboard Elements to Include, on page 32 · Host Metrics, on page 33
Opening the Dashboard
The Dashboard feature is available on the regional cluster also. It provides System Metrics chart by default. It allows you to display the server specific (DHCP, DNS, and CDNS) charts for various clusters. This can be configured in the Chart Selections page. To open the dashboard in the web UI, from the Operate menu, choose Dashboard.
Cisco Prime Network Registrar 11.1 Administration Guide 25

Display Types

Getting Started

Display Types
Provided you have DHCP and DNS privileges through administrator roles assigned to you, the preset display of the dashboard consists of the following tables (See the table below for an example):
· System Metrics–See System Metrics, on page 34. · DHCP General Indicators–See the “DHCP General Indicators” section in Cisco Prime Network
Registrar 11.1 DHCP User Guide. · DNS General Indicators–See the “DNS General Indicators” section in Cisco Prime Network Registrar
11.1 Authoritative and Caching DNS User Guide.
Tip These are just the preset selections. See Selecting Dashboard Elements to Include, on page 32 for other dashboard elements you can select. The dashboard retains your selections from session to session.
Figure 4: Preset Dashboard Elements

Each dashboard element initially appears as a table or a specific panel chart, depending on the element: · Table–See Tables, on page 27. · Line chart–See Line Charts, on page 28. · Area chart–See Area Charts, on page 29.
General Status Indicators
Note the green indicator in the Server State description in the above image. This indicates that the server sourcing the information is functioning normally. A yellow indicator indicates that server operation is less than optimum. A red indicator indicates that the server is down. These indicators are the same as for the server health on the Manage Servers page in the regular web UI.
Cisco Prime Network Registrar 11.1 Administration Guide 26

Getting Started

Graphic Indicators for Levels of Alert

Graphic Indicators for Levels of Alert
Graphed lines and stacked areas in the charts follow a standard color and visual coding so that you can immediately determine key diagnostic indicators at a glance. The charts use the following color and textural indicators:
· High alerts or warnings–Lines or areas in red, with a hatched texture.
· All other indicators–Lines or areas in various other colors distinguish the data elements. The charts do not use green or yellow.
Magnifying and Converting Charts
You can magnify a chart in a separate window by clicking the Chart Link icon at the bottom of the panel chart and then by clicking the Magnified Chart option (see the image below). In magnified chart view, you can choose an alternative chart type from the one that comes up initially (see Other Chart Types, on page 30).
Figure 5: Magnifying Charts

Legends
Tables

Note Automatic refresh is turned off for magnified charts. To get the most recent data, click the Refresh icon next to the word Dashboard at the top left of the page.
To convert a chart to a table, see the Displaying Charts as Tables section. You cannot convert tables to a graphic chart format.
Each chart includes a color-coded legend by default.
Dashboard elements rendered as tables have data displayed in rows and columns. The following dashboard elements are preset to consist of (or include) tables:
· DHCP DNS Updates · DHCP Address Current Utilization · DHCP General Indicators · DNS General Indicators · Caching DNS General Indicators

Cisco Prime Network Registrar 11.1 Administration Guide 27

Line Charts

Getting Started

Note If you view a table in Expert mode, additional data might appear.

Line Charts

Dashboard elements rendered as line charts can include one or more lines plotted against the x and y axes. The three types of line charts are described in the following table.
Table 3: Line Chart Types

Type of Line Chart Raw data line chart

Description Lines plotted against raw data.

Dashboard Elements Rendered
· Java Virtual Machine (JVM) Memory Utilization (Expert mode only)
· DHCP Buffer Capacity
· DHCP Failover Status (two charts)
· DNS Network Errors
· DNS Related Servers Errors

Delta line chart

Lines plotted against the difference between two sequential raw data.

· DNS Inbound Zone Transfers
· DNS Outbound Zone Transfers

Rate line chart

Lines plotted against the difference between two sequential raw data divided by the sample time between them.

· DHCP Server Request Activity (see the image below)
· DHCP Server Response Activity
· DHCP Response Latency
· DNS Query Responses
· DNS Forwarding Errors

Tip To get the raw data for a chart that shows delta or rate data, enter Expert mode, go to the required chart, click the Chart Link icon at the bottom of the panel chart, and then click Data Table . The Raw Data table is below the Chart Data table.

Cisco Prime Network Registrar 11.1 Administration Guide 28

Getting Started Figure 6: Line Chart Example

Area Charts

Area Charts
Dashboard elements rendered as area charts have multiple related metrics plotted as trend charts, but stacked one on top of the other, so that the highest point represents a cumulative value. The values are independently shaded in contrasting colors. (See the image below for an example of the DHCP Server Request Activity chart shown in Figure 6: Line Chart Example, on page 29 rendered as an area chart.)
Figure 7: Area Chart Example

They are stacked in the order listed in the legend, the left-most legend item at the bottom of the stack and the right-most legend item at the top of the stack. The dashboard elements that are pre-set to area chart are:
· DHCP Buffer Capacity · DHCP Failover Status · DHCP Response Latency · DHCP Server Leases Per Second · DHCP Server Request Activity · DHCP Server Response Activity · DNS Inbound Zone Transfers · DNS Network Errors · DNS Outbound Zone Transfers
Cisco Prime Network Registrar 11.1 Administration Guide 29

Other Chart Types

Getting Started

· DNS Queries Per Second · DNS Related Server Errors
Other Chart Types
The other chart types available for you to choose are: · Line–One of the line charts described in Line Charts, on page 28. · Area–Charts described in the Area Charts, on page 29. · Column–Displays vertical bars going across the chart horizontally, with the values axis being displayed on the left side of the chart. · Scatter–A scatter plot is a type of plot or mathematical diagram using Cartesian coordinates to display values for typically two variables for a set of data.
Tip Each chart type shows the data in distinct ways and in different interpretations. You can decide which type best suits your needs.
Getting Help for the Dashboard Elements
You can open a help window for each dashboard element by clicking the help icon on the table/chart window.
Customizing the Display
To customize the dashboard display, you can: · Refresh the data and set an automatic refresh interval. · Expand a chart and render it in a different format. · Convert a graphic chart to a table. · Download data to comma- separated value (CSV) output. · Display or hide chart legends. · Configure server chart types. · Reset to default display
Each chart supports: · Resizing · Drag and drop to new cell position · Minimizing · Closing

Cisco Prime Network Registrar 11.1 Administration Guide 30

Getting Started

Refreshing Displays

Each chart has a help icon with a description of the chart and a detailed help if you click the link (more…) at the bottom of the description.
Note The changes made to the dashboard/chart will persist only if you click Save in the Dashboard window.
Refreshing Displays
Refresh each display so that it picks up the most recent polling by clicking the Refresh icon.
Setting the Polling Interval
You can set how often to poll for data. Click the Dashboard Settings icon in the upper-right corner of the dashboard display. There are four options to set the polling interval of the cached data, which polls the protocol servers for updates (See the image below).
Figure 8: Setting the Chart Polling Interval

You can set the cached data polling (hence, automatic refresh) interval to: · Disabled–Does not poll, therefore does not automatically refresh the data. · Slow–Refreshes the data every 30 seconds. · Medium–Refreshes the data every 20 seconds. · Fast (the preset value)–Refreshes the data every 10 seconds.
Displaying Charts as Tables
Use the Chart Link icon at the bottom of the panel chart to view the chart link options (see the image below). You can choose to display a graphic chart as a table by clicking the Data Table option.
Figure 9: Specifying Chart Conversion to Table Format

Exporting to CSV Format
You can dump the chart data to a comma-separated value (CSV) file (such as a spreadsheet). In the Chart Link controls at the bottom of the panel charts (see the above image), click the CSV Export option. A Save As window appears, where you can specify the name and location of the CSV file.
Cisco Prime Network Registrar 11.1 Administration Guide 31

Selecting Dashboard Elements to Include

Getting Started

Selecting Dashboard Elements to Include
You can decide how many dashboard elements you want to display on the page. At times, you might want to focus on one server activity only, such as for the DHCP server or the DNS server, and exclude all other metrics for the other servers. In this way, the dashboard becomes less crowded, the elements are larger and more readable. At other times, you might want an overview of all server activities, with a resulting smaller element display. You can select the dashboard elements to display from the main Dashboard page by clicking the Dashboard Settings icon and then clicking Chart Selections in the Dashboard Settings dialog. Clicking the link opens the Chart Selection page (see Figure 10: Selecting Dashboard Elements, on page 32).
Configuring Server Chart Types
You can set the default chart types on the main dashboard view. You can customize the server charts in the dashboard to display only the specific chart types as default. To set up default chart type, check the check box corresponding to the Metrics chart that you want to display and choose a chart type from the Type drop-down list. The default chart types are consistent and shared across different user sessions (see the image below).
Note You can see either the CDNS or DNS Metrics in the Dashboard Settings > Chart Selection page based on the service configured on the server.
Tip The order in which the dashboard elements appear in the Chart Selection list does not necessarily determine the order in which the elements will appear on the page. An algorithm that considers the available space determines the order and size in a grid layout. The layout might be different each time you submit the dashboard element selections. To change selections, check the check box next to the dashboard element that you want to display.
Figure 10: Selecting Dashboard Elements

Cisco Prime Network Registrar 11.1 Administration Guide 32

Getting Started

Host Metrics

The above image displays the Charts Selection table in the regional web UI. The Clusters column is available only in regional dashboard and it displays the list of local clusters configured. You can add the local cluster by clicking the Edit icon and then by selecting the local cluster name from the Local Cluster List dialog box. To change selections, check the check box next to the dashboard element that you want to display. Specific group controls are available in the Change Chart Selection drop-down list, at the top of the page (see the image above). To:
· Uncheck all check boxes, choose None.
· Revert to the preset selections, choose Default. The preset dashboard elements for administrator roles supporting DHCP and DNS are: · Host Metrics: System Metrics
· DHCP Metrics: General Indicators
· DNS Metrics: General Indicators
· Select the DHCP metrics only, choose DHCP (see the “DHCP Metrics” section in Cisco Prime Network Registrar 11.1 DHCP User Guide).
· Select the DNS metrics only, choose DNS (see the “Authoritative DNS Metrics” section in Cisco Prime Network Registrar 11.1 Authoritative and Caching DNS User Guide).
· Select the DNS metrics only, choose CDNS (see the “Caching DNS Metrics” section in Cisco Prime Network Registrar 11.1 Authoritative and Caching DNS User Guide)
· Select all the dashboard elements, choose All.
Click OK at the bottom of the page to save your choices, or Cancel to cancel the changes. You can change the chart type by clicking the Chart Type icon at the bottom of the panel chart and then by selecting the required chart type (see the image below). The different types of chart available are: Line Chart, Column Chart, Area Chart, and Scatter Chart.
Figure 11: Selecting the Chart Type

Host Metrics
Host metrics comprise two charts: · System Metrics–See System Metrics, on page 34. · JVM Memory Utilization (available in Expert mode only)–See JVM Memory Utilization, on page 35.
Cisco Prime Network Registrar 11.1 Administration Guide 33

System Metrics

Getting Started

System Metrics
The System Metrics dashboard element shows the free space on the disk volumes where the Cisco Prime Network Registrar logs and database directories are located, the date and time of the last server backup, and CPU and memory usage for the various servers. System metrics are available if you choose Host Metrics: System Metrics in the Chart Selection list.
The resulting table shows:
· Logs Volume–Current free space out of the total space on the disk drive where the logs directory is located, with the equivalent percentage of free space.
· Database Volume–Current free space out of the total space on the disk drive where the data directory is located, with the equivalent percentage of free space.
· Last Good Backup–Date and time when the last successful shadow database backup occurred (or Not Done if it did not yet occur) since the server agent was last started.
· CPU Utilization (in seconds), Memory Utilization (in kilobytes), VM Utilization (in kilobytes), and Process ID (PID) for the:
· Cisco Prime Network Registrar server agent
· CCM server
· DNS server
· DHCP server
· Web server
· SNMP server
· DNS caching server
How to Interpret the Data
The System Metrics data shows how full your disk volumes are getting based on the available free space for the Cisco Prime Network Registrar logs and data volumes. It also shows if you had a last successful backup of the data files and when that occurred. Finally, it shows how much of the available CPU and memory the Cisco Prime Network Registrar servers are using. The difference in the memory and VM utilization values is:
· Memory Utilization–Physical memory that a process uses, or roughly equivalent to the Resident Set Size (RSS) value in UNIX ps command output: the number of pages the process has in real memory minus administrative usage. This value includes only the pages that count toward text, data, or stack space, but not those demand-loaded in or swapped out.
· VM Utilization–Virtual memory that a process uses, or roughly equivalent to the SZ value in UNIX ps command output: the in-memory pages plus the page files and demand-zero pages, but not usually the memory-mapped files. This value is useful in diagnosing how large a process is and if it continues to grow.

Cisco Prime Network Registrar 11.1 Administration Guide 34

Getting Started

Troubleshooting Based on the Results

Troubleshooting Based on the Results If you notice the free disk space decreasing for the logs or data directory, you might want to consider increasing the disk capacity or look at the programs you are running concurrently with Cisco Prime Network Registrar.
JVM Memory Utilization
The Java Virtual Machine (JVM) Memory Utilization dashboard element is available only when you are in Expert mode. It is rendered as a line trend chart that traces the Unused Maximum, Free, and Used bytes of JVM memory. The chart is available if you choose Host Metrics: JVM Memory Utilization in the Chart Selection list when you are in Expert mode.
How to Interpret the Data The JVM Memory Utilization data shows how much memory applies to running the dashboard in your browser. If you see the Used byte data spiking, dashboard elements might be using too much memory.
Troubleshooting Based on the Results If you see spikes in Used memory data, check your browser settings or adjust the polling interval to poll for data less frequently.

Cisco Prime Network Registrar 11.1 Administration Guide 35

Troubleshooting Based on the Results

Getting Started

Cisco Prime Network Registrar 11.1 Administration Guide 36

I I P A R T
Local and Regional Administration
· Managing Administrators, on page 39 · Managing Owners and Regions, on page 75 · Managing the Central Configuration, on page 79 · Managing Routers and Router Interfaces, on page 151 · Maintaining Servers and Databases, on page 155 · Backup and Recovery, on page 189 · Managing Reports, on page 207

4 C H A P T E R
Managing Administrators
This chapter explains how to set up network administrators at the local and regional clusters. The chapter also includes local and regional cluster tutorials for many of the administration features.
· Administrators, Groups, Roles, and Tenants, on page 39 · External Authentication Servers, on page 44 · Managing Tenants, on page 48 · Managing Administrators, on page 53 · Managing Passwords, on page 55 · Managing Groups, on page 56 · Managing Roles, on page 57 · Granular Administration, on page 58 · Centrally Managing Administrators, on page 61 · Session Management, on page 71
Administrators, Groups, Roles, and Tenants
The types of functions that network administrators can perform in Cisco Prime Network Registrar are based on the roles assigned to them. Local and regional administrators can define these roles to provide granularity for the network administration functions. Cisco Prime Network Registrar predefines a set of base roles that segment the administrative functions. From these base roles you can define further constrained roles that are limited to administering particular addresses, zones, and other network objects. The mechanism to associate administrators with their roles is to place the administrators in groups that include these roles. The data and configuration that can be viewed by an administrator can also be restricted by tenant. When an administrator is assigned a tenant tag, access is further restricted to configuration objects that are assigned to the tenant or made available for tenant use as read-only core configuration objects.
How Administrators Relate to Groups, Roles, and Tenants
There are four administrator objects in Cisco Prime Network Registrar–administrator, group, role, and tenant: · Administrator–An account that logs in and that, through its association with one or more administrator groups, can perform certain functions based on its assigned role or roles. At the local cluster, these functions are administering the local Central Configuration Management (CCM) server and databases,
Cisco Prime Network Registrar 11.1 Administration Guide 39

Administrator Types

Local and Regional Administration

hosts, zones, address space, and DHCP. At the regional cluster, these functions administer the regional CCM server and databases, central configuration, and regional address space. An administrator must be assigned to at least one group to be effective. Adding administrators is described in Managing Administrators, on page 53.
· Group–A grouping of roles. You must associate one or more groups with an administrator, and a group must be assigned at least one role to be usable. The predefined groups that Cisco Prime Network Registrar provides map each role to a unique group. Adding groups is described in Managing Groups, on page 56.
· Role–Defines the network objects that an administrator can manage and the functions that an administrator can perform. A set of predefined roles are created at installation, and you can define additional constrained roles. Some of the roles include subroles that provide further functional constraints. Adding roles is described in Managing Roles, on page 57.
· Tenant–Identifies a tenant organization or group that is associated with a set of administrators. When you create tenants, the data stored on both regional and local clusters is segmented by tenant. A tenant cannot access the data of another tenant. Adding tenants is described in Managing Tenants, on page 48.
Administrator Types
There are two basic types of administrators: superusers and specialized administrators: · Superuser–Administrator with unrestricted access to the web UI, CLI, and all features. This administrator type should be restricted to a few individuals. The superuser privileges of an administrator override all its other roles.
Tip You have to create the superuser and password at installation, or when you first log in to the web UI.
When a superuser is assigned a tenant tag, unrestricted access is only granted for corresponding tenant data. Data of other tenants cannot be viewed, and core objects are restricted to read-only access.
· Specialized–Administrator created by name to fulfill specialized functions, for example, to administer a specific DNS forward or reverse zone, based on the administrator assigned role (and subrole, if applicable). Specialized administrators, like the superuser, require a password, but must also be assigned at least one administrator group that defines the relevant roles. The CLI provides the admin command. For an example of creating a local zone or host administrator, see Create the Administrators, on page 136. A specialized user that is assigned a tenant tag can only access corresponding tenant or core data that also matches the relevant roles. Core data is further restricted to read-only access.

Cisco Prime Network Registrar 11.1 Administration Guide 40

Local and Regional Administration

Roles, Subroles, and Constraints

Roles, Subroles, and Constraints
A license type is associated with each role-subrole combination. A role- subrole is enabled only if that license is available in that cluster.
You can limit an administrator role by applying constraints. For example, you can use the host-admin base role to create a host administrator, named 192.168.50-host-admin, who is constrained to the 192.168.50.0 subnet. The administrator assigned a group that includes this role then logs in with this constraint in effect. Adding roles and subroles is described in Managing Roles, on page 57.
You can further limit the constraints on roles to read-only access. An administrator can be allowed to read any of the data for that role, but not modify it. However, if the constrained data is also associated with a read- write role, the read-write privilege supersedes the read-only constraints.

Tip An example of adding role constraints is in Create a Host Administrator Role with Constraints, on page 140.

The interplay between DNS and host administrator role assignments is such that you can combine an unconstrained dns-admin role with any host-admin role in a group. For example, combining the dns-admin-readonly role and a host-admin role in a group (and naming the group host-rw-dns-ro) provides full host access and read-only access to zones and RRs. However, if you assign a constrained dns-admin role along with a host-admin role to a group and then to an administrator, the constrained dns-admin role takes precedence, and the administrator privileges at login will preclude any host administration.
Certain roles provide subroles with which you can further limit the role functionality. For example, the local ccm-admin or regional-admin, with just the owner-region subrole applied, can manage only owners and regions. By default, all the possible subroles apply when you create a constrained role.
The predefined roles are described in Table 4: Local Cluster Administrator Predefined and Base Roles , on page 41 (local), and Table 5: Regional Cluster Administrator Predefined and Base Roles , on page 43 (regional).
Table 4: Local Cluster Administrator Predefined and Base Roles

Local Role addrblock-admin
ccm-admin

Subroles and Active Functionality
Core functionality: Manage address block, subnets, and reverse DNS zones (also requires dns-admin); and notify of scope activity.
· ric-management: Push to, and reclaim subnets from, DHCP failover pairs and routers.
· ipv6-management: Manage IPv6 prefixes, links, options, leases, and reservations.
· lease-history: Query, poll, and trim lease history data.
Core functionality: Manage access control lists (ACLs), and encryption keys.
· authentication: Manage administrators. · authorization: Manage roles and groups. · owner-region: Manage owners and regions. · database: View database change entries and trim the CCM change
sets. · security-management: Manage ACLs and DNSSEC configuration.

Cisco Prime Network Registrar 11.1 Administration Guide 41

Roles, Subroles, and Constraints
Local Role cdns-admin cfg-admin
dhcp-admin dns-admin
host-admin

Local and Regional Administration
Subroles and Active Functionality
Core functionality: Manage in-memory cache (flush cache and flush cache name).
· security-management: Manage ACLs and DNSSEC configuration. · server- management: Manage DNSSEC configuration, as well as
forwarders, exceptions, DNS64, and scheduled tasks, and stop, start, or reload the server.
Core functionality: Manage clusters.
· ccm-management: Manage the CCM server configuration. · dhcp-management: Manage the DHCP server configuration. · dns-management: Manage the DNS server configuration. · cdns-management: Manage Caching DNS server configuration. · ric-management: Manage routers. · snmp-management: Manage the SNMP server configuration. · tftp-management: Manage the TFTP server configuration.
Core functionality: Manage DHCP scopes and templates, policies, clients, client-classes, options, leases, and reservations.
· lease-history: Query, poll, and trim lease history data. · ipv6-management: Manage IPv6 prefixes, links, options, leases,
and reservations. · server-management: Manage the DHCP server configuration,
failover pairs, LDAP servers, extensions, and statistics.
Core functionality: Manage DNS zones and templates, resource records, secondary servers, and hosts.
· security-management: Manage DNS update policies, ACLs, and encryption keys.
· server-management: Manage DNS server configurations and zone distributions, synchronize zones and HA server pairs, and push update maps.
· ipv6-management: Manage IPv6 zones and hosts. · enum-management: Manage DNS ENUM domains and numbers.
Core functionality: Manage DNS hosts. (Note that if an administrator is also assigned a constrained dns-admin role that overrides the host-admin definition, the administrator is not assigned the host-admin role.)

Cisco Prime Network Registrar 11.1 Administration Guide 42

Local and Regional Administration

Roles, Subroles, and Constraints

Table 5: Regional Cluster Administrator Predefined and Base Roles

Regional Role central-cfg-admin

Subroles and Active Functionality
Core functionality: Manage clusters and view replica data.
· dhcp-management: Manage DHCP scope templates, policies, client-classes, failover pairs, virtual private networks (VPNs), and options; modify subnets; and replicate data.
· ric-management: Manage routers and router interfaces, and pull replica router data.
· ccm-management: Manage CCM Server configuration · snmp-management: Manage SNMP Server configuration.
· ipv6-management: Manage IPv6 prefixes, links, options, leases and reservations.
· cdns-management: Manage CDNS Server configuration.

central-dns-admin
central-host-admin regional-admin

Core functionality: Manage DNS zones and templates, hosts, resource records, and secondary servers; and create subzones and reverse zones.
· security-management: Manage DNS update policies, ACLs, and encryption keys.
· server-management: Synchronize DNS zones and HA server pairs, manage zone distributions, pull replica zone data, and push update maps.
· ipv6-management: Manage IPv6 zones and hosts. · enum-management: Manage DNS ENUM domains and numbers.
Core functionality: Manage DNS hosts. (Note that if an administrator is also assigned a constrained central-dns-admin role that overrides the central-host- admin definition, the administrator is not assigned the central-host-admin role.)
Core functionality: Manage licenses and encryption keys.
· authentication: Manage administrators. · authorization: Manage roles and groups. · owner-region: Manage owners and regions. · database: View database change entries and trim the CCM change
sets. · security-management: Manage ACLs and DNSSEC configuration.

Cisco Prime Network Registrar 11.1 Administration Guide 43

Groups

Local and Regional Administration

Regional Role regional-addr-admin

Subroles and Active Functionality
Core functionality: Manage address blocks, subnets, and address ranges; generate allocation reports; and pull replica address space data.
· dhcp-management: Push and reclaim subnets; and add subnets to, and remove subnets from, DHCP failover pairs.
· lease-history: Query, poll, and trim lease history data. · subnet- utilization: Query, poll, trim, and compact subnet and prefix
utilization data. · ipv6-management: Manage IPv6 prefixes, links, options, leases and
reservations.

Groups

Administrator groups are the mechanism used to assign roles to administrators. Hence, a group must consist of one or more administrator roles to be usable. When you first install Cisco Prime Network Registrar, a predefined group is created to correspond to each predefined role.
Roles with the same base role are combined. A group with an unconstrained dhcp-admin role and a constrained dns-admin role, does not change the privileges assigned to the dns-admin role. For example, if one of the roles is assigned unconstrained read-write privileges, the group is assigned unconstrained read-write privileges, even though other roles might be assigned read-only privileges. Therefore, to limit the read-write privileges of a user while allowing read-only access to all data, create a group that includes the unconstrained read-only role along with a constrained read-write role. (See Roles, Subroles, and Constraints, on page 41 for the implementation of host- admin and dns-admin roles combined in a group.)

External Authentication Servers
Cisco Prime Network Registrar includes a RADIUS client component and Active Directory (AD) client component, which are integrated with the authentication and authorization modules of the CCM server. To enable external authentication, you must configure a list of external RADIUS or an AD server at local and regional clusters, and ensure all authorized users are appropriately configured on the respective servers.
When external authentication is enabled, the CCM server handles attempts to log in via the web UI, SDK, or CLI, by issuing a RADIUS request to a RADIUS server or a LDAP request to a AD server that is selected from the configured list. If the corresponding server validates the login request, access is granted, and the CCM server creates an authorized session with the group assignments specified by the RADIUS or the AD server.

Note Any administrators defined in the CCM server’s database are ignored when external authentication is enabled. Attempting to log in with these usernames and passwords will fail. To disable external authentication, you must remove or disable all the configured external servers or change the auth-type attribute value to Local.

Cisco Prime Network Registrar 11.1 Administration Guide 44

Local and Regional Administration

Configuring a RADIUS External Authentication Server

Tip If all logins fail because the external authentication servers are inaccessible or misconfigured, use alternative method to login and resolve the issues. See Managing Administrators, on page 53 for more details.
Configuring a RADIUS External Authentication Server
Once you have your RADIUS server up and running and have created a user, there are some specific groups and vendor specific attributes (VSA) needed for RADIUS user to login to Cisco Prime Network Registrar. Using the Cisco vendor id (9), create the Cisco Prime Network Registrar groups attribute for each administrator, using the format cnr:groups=group1, group2, group3. For example, to assign an administrator to the built-in groups dhcp-admin-group and dns-admin-group, enter:
cnr:groups=dhcp-admin-group,dns-admin-group
To assign superuser access privileges, the reserved group name superusers is used. To provide superuser privileges to an administrator, enter:
cnr:groups=superusers
The superuser privileges override all other groups. The VSA name used for Cisco Prime Network Registrar is cisco-avpair. Below is an example configuration of FreeRadius server for Cisco Prime Network Registrar: For the user: (this contains default info from the server)
ciscoprime Cleartext-Password := “Cisco123” -> CPNR Username/Password Service- Type = Framed-User, cisco-avpair += “cnr:groups=superusers”, -> CPNR group for CNR. This is the VSA. Framed-Protocol = PPP, Framed-IP-Address = 192.168.1.2, -> CPNR IP Framed-Filter-Id = “std.ppp”, Framed-MTU = 1500,
For the Client:
client CNR-HOST { ipaddr = 192.168.1.2 -> IP of CPNR server secret = P@$$W0rd! -> Password for CPNR Radius
Once you save and reload your RADIUS server (assuming all configuration is correct), you can then login to Cisco Prime Network Registrar using the user created in RADIUS and it will allow authentication.
Note You cannot add, delete, or modify external user names and their passwords or groups using Cisco Prime Network Registrar. You must use the RADIUS server to perform this configuration.
Adding a RADIUS External Configuration Server
To add an external configuration server, do the following:

Cisco Prime Network Registrar 11.1 Administration Guide 45

Local Advanced and Regional Advanced Web UI

Local and Regional Administration

Local Advanced and Regional Advanced Web UI

Step 1 Step 2
Step 3 Step 4

From the Administration menu, choose Radius under the External Authentication submenu. The List/Add Radius Server page is displayed.
Click the Add Radius icon in the Radius pane, enter the name, IPv4 and/or IPv6 address of the server you want to configure as the external authentication server, and you can set the key attribute which will be used for communicating with this server in the Add External Authentication Server dialog box, and click Add External Authentication Server. The CCM server uses the key to set the key-secret attribute which is the secret key shared by client and the server.
To enable the external authentication server, check the enabled check box of the ext-auth attribute in the Edit Radius Server page, and then click Save.
Change the auth-type attribute to RADIUS in the Manage Servers page, click Save, and then restart Cisco Prime Network Registrar.

Note

At this point, if you are not able to login to Cisco Prime Network Registrar since local authentication is

disabled, you need to create a backdoor account under /var/nwreg2/{local | regional}/conf/priv and create a

file name “local.superusers” with a username and password.

CLI Commands

To create an external authentication server, use auth-server name create <address | ip6address> [attribute=value …] (see the auth-server command in the CLIGuide.html file in the /docs directory for syntax and attribute descriptions).

Deleting a RADIUS External Authentication Server
To delete a RADIUS external authentication server, select the server in the Radius pane, click the Delete Radius icon, and then confirm the deletion. You can also cancel the deletion by clicking the Close button.

Configuring an AD External Authentication Server
Cisco Prime Network Registrar administrators must be assigned to one or more administrator groups to perform management functions. When using an AD server for external authentication, these are set as a vendor specific attribute for each user. Using the Cisco vendor id (9), create the Cisco Prime Network Registrar groups attribute for each administrator, using the format cnr:groups=group1, group2, group3.
For example, to assign an administrator to the built-in groups dhcp-admin- group and dns-admin-group, enter:
cnr:groups=dhcp-admin-group,dns-admin-group
To assign superuser access privileges, the reserved group name superusers is used. To provide superuser privileges to an administrator, enter:
cnr:groups=superusers
The superuser privileges override all other groups.
A group needs to be created to access Cisco Prime Network Registrar and users need to be added to that group. Select an user attribute and provide the group information in the format cnr:group1,group2,..
To configure an Active Directory (AD) external authentication server:

Cisco Prime Network Registrar 11.1 Administration Guide 46

Local and Regional Administration

Configuring Kerbero’s Realm and KDC

Step 1 Step 2 Step 3 Step 4

In AD server, create a new group, for example CPNR, with the group scope Domain Local. Select a user and click Add to a group. In Enter the Object Names window, select CPNR and click OK. In AD Server Object windows, select CPNR for the ad-group-name attribute and info for the ad-user-attr-map attribute.

Note

You cannot add, delete, or modify external user names and their passwords or groups using Cisco Prime

Network Registrar. You must use the AD server to perform this configuration.

Configuring Kerbero’s Realm and KDC
For the Cisco Prime Network Registrar to communicate with the AD server, the Kerbero’s Realm and KDC servers are required. The changes need to be configured in krb5.conf (/etc/krb5.conf) file as shown below:
default = FILE:/var/log/krb5libs.log kdc = FILE:/var/log/krb5kdc.log admin_server = FILE:/var/log/kadmind.log
[libdefaults] ticket_lifetime = 1d default_realm = ECNR.COM default_tkt_enctypes = rc4-hmac default_tgs_enctypes = rc4-hmac dns_lookup_realm = false dns_lookup_kdc = false forwardable = true
[realms] ECNR.COM = { kdc =
admin_server = }
[domain_realm] .ecnr.com = ECNR.COM ecnr.com = ECNR.COM
Adding an AD External Configuration Server
To add an external configuration server, do the following:
Local Advanced and Regional Advanced Web UI

Step 1 Step 2
Step 3

From the Administration menu, choose Active Directory under the External Authentication submenu. The List/Add Active Directory Server page is displayed.
Click the Add Active Directory Server icon in the Active Directory pane, enter the name, hostname of the server, and domain you want to configure as the external authentication server. You can set the base domain, LDAP user attribute map, and AD group name which will be used for communicating with this server in the Add Active Directory Server dialog box. Click Add Active Directory Server.
Change the auth-type attribute to Active Directory in the Manage Servers page, click Save, and then restart Cisco Prime Network Registrar.

Cisco Prime Network Registrar 11.1 Administration Guide 47

CLI Commands

Local and Regional Administration

CLI Commands

To create an external authentication server, use auth-server name create <address | ip6address> [attribute=value …].

Deleting an AD External Authentication Server
To delete an AD external authentication server, select the server in the Active Directory pane, click the Delete Active Directory Server icon, and then confirm the deletion. You can also cancel the deletion by clicking the Close button.

Managing Tenants
The multi-tenant architecture of Cisco Prime Network Registrar provides the ability to segment the data stored on both regional and local clusters by tenant. When tenants are defined, data is partitioned by tenant in the embedded databases of each cluster. This provides data security and privacy for each tenant, while allowing cloud or managed service providers the flexibility to consolidate many smaller customer configurations on a set of infrastructure servers, or distribute a larger customer configuration across several dedicated servers.
Any given local cluster may be associated with one or more tenants, but within a local cluster, the address pools and domain names assigned to a given tenant must not overlap.
For larger customers, clusters may be explicitly assigned to a tenant. In this case, all data on the local cluster will be associated with the tenant, and may include customized server settings. Alternatively, infrastructure servers may service many tenants. With this model, the tenants can maintain their own address space and domain names, but share common server settings that would be administered by the service provider. Their use of public or private network addresses needs to be managed by the service provider, to ensure that the tenants are assigned non-overlapping addresses.
The following are the key points you should know while configuring tenants:
· Tenant administrators are linked to their data by a tenant object that defines their tenant tag and identifier. · Tenant objects should be consistent and unique across all clusters. · You should not reuse tags or identifiers for different tenants. · You can configure multiple tenants on a single cluster. · A tenant administrator cannot create, modify, or remove tenant objects. · A tenant administrator cannot view or modify the data of another tenant. · Objects that are not assigned to a tenant are defined as core data, and are visible to all tenants in read-only
mode.

Adding a Tenant
To add a tenant, do the following: Local and Regional Web UI

Step 1 Step 2

From the Administration menu, choose Tenants under the User Access submenu. This opens the List/Add Tenants page.
Click the Add Tenants icon in the Tenants pane, enter the tenant tag and tenant ID and click Add Tenant. The Name and Description attributes are optional.

Note

You cannot create more than one tenant with the same tenant ID or tenant tag.

Cisco Prime Network Registrar 11.1 Administration Guide 48

Local and Regional Administration

CLI Commands

Step 3

Click Save. The Settings drop-down list on the toolbar at the top of the page will display the tenant under the Tenant submenu. You can use this drop-down list to select a tenant when you have to do tenant specific configurations.

CLI Commands

To add a tenant, use tenant tag create tenant-id [attribute=value] (see the tenant command in the CLIGuide.html file in the /docs directory for syntax and attribute descriptions).

Editing a Tenant
To edit a tenant, do the following: Local and Regional Web UI

Step 1 Step 2

On the List/Add Tenants page, click the name of the desired tenant in the Tenants pane and the Edit Tenant page appears with the details of the selected tenant.
You can modify the tenant tag, name, or description of the tenant on the Edit Tenant page and click Save. The tenant ID cannot be modified.

Deleting a Tenant

Warning Deleting the tenant will also delete all data for the tenant.
To delete a tenant, select the name of the desired tenant in the Tenants pane, click the Delete icon in the Tenants pane, and then confirm the deletion. You can also cancel the deletion by clicking the Close button.

Note A user constrained to a specific tenant cannot delete tenants.
Managing Tenant Data
You can create two types of data for tenants: · Tenant data, which is assigned to a specified tenant and cannot be viewed by other tenants · Core data, which is visible to all tenants in read-only mode
Local and Regional Web UI To create tenant data objects in the web UI, do the following:

Cisco Prime Network Registrar 11.1 Administration Guide 49

Local and Regional Web UI

Local and Regional Administration

Step 1 Step 2

To set the data for a desired tenant, click the Settings drop-down list on the toolbar at the top of the page and select the desired tenant under the Tenant submenu.
Create the object.

When creating tenant data, most object names are only required to be unique for the specified tenant. For example, tenants abc and xyz may both use their own scope test that is private to their configuration.

Note

Administrators (Admin), zones (CCMZone, CCMReverseZone, and CCMSecondaryZone), keys (Key), and

clients (ClientEntry) must be unique across all tenants.

Administrator names must be unique to perform initial login authentication and establish whether the user is a tenant. Zone and key classes must be unique because these require a DNS domain name that is expected to be unique across the internet. Client names must correspond to a unique client identifier that the DHCP server can use to match its incoming requests.

Local and Regional Web UI To create core data objects in the web UI, do the following:

Step 1 Step 2

Ensure that you select [all] from the Settings drop-down list on toolbar at the top of the page and select the desired tenant under the Tenant submenu.
Create the object, leaving the object tenant assignment set to none. By default none is selected in the Tenant drop-down list. Leave it as it is, so that the object is not constrained to any specific tenant.
Core data can be used to provide common configuration elements such as policies or client classes that you choose to offer to tenants. Tenants can view and reference these objects in their configuration, but cannot change or delete them. Because core data is visible to all tenants, objects names must be unique across all tenants.

CLI Commands

Use session set tenant=tag to set the selected tenant. Use session unset tenant to clear the tenant selection, if set (see the session command in the CLIGuide.html file in the /docs directory for syntax and attribute descriptions).

Note Once created, you cannot change the tenant or core designation for the object. You must delete and recreate the object to change its tenant assignment.

Tip You can use the cnr_exim tool to move a set of tenant data from one tenant to another.

Cisco Prime Network Registrar 11.1 Administration Guide 50

Local and Regional Administration

Assigning a Local Cluster to a Single Tenant

Assigning a Local Cluster to a Single Tenant
When assigned to a single tenant, core data on the local cluster is not restricted to read-only access. This means tenants may be given the ability to stop and start servers, modify defaults, and install custom extensions. After the cluster is assigned to a specific tenant, other tenants cannot log in to the cluster.

Note If synchronization with the local cluster fails, the cluster will not be assigned to the tenant. Resolve any connectivity issues and use the resynchronization icon to set the local cluster tenant.

Regional Web UI

To assign a local cluster to a single tenant, do the following:

Step 1
Step 2 Step 3
Step 4 Step 5

Add the tenant in the List/Add Tenant page if you want to assign the cluster to a new tenant (see the Adding a Tenant, on page 48).
From the Operate menu, Choose Manage Clusters under the Servers submenu. The List/Add Clusters page is displayed.
Choose the tenant you added in Step 1 from the Settings drop-down list on the toolbar at the top of the page and select the desired tenant under the Tenant submenu.
Click the Add Manage Clusters icon in the Manage Clusters pane. The Add Cluster dialog box appears.
Click Add Cluster to add the cluster. For information on adding the cluster, see the Create the Local Clusters, on page 144.

Note

Once a cluster is assigned to a particular tenant, it cannot be changed or unset.

Pushing and Pulling Tenant Data
In the regional web UI, list pages include push options that let you distribute objects to a list of local clusters, and pull options that let you merge local cluster objects from the Replica data into the central configuration. These operations can be performed on both tenant and core data, but only one set of data can be pushed or pulled in a single operation.
Use the Settings drop-down list on the toolbar at the top of the page and select the desired tenant under the Tenant submenu to specify the set of data to be pushed or pulled.

CLI Commands

Note To maintain a consistent view of tenant data, all related clusters should be configured with the same list of tenants. See Pushing and Pulling Tenants, on page 70 for steps that help you manage tenant lists.
When connected to a regional cluster, you can use the following pull, push, and reclaim commands. For push and reclaim, a list of clusters or “all” may be specified.
· tenant < tag | all > pull < ensure | replace | exact > cluster-name [-report-only | -report] · tenant < tag | all > push < ensure | replace | exact > cluster-list [-report-only | -report]

Cisco Prime Network Registrar 11.1 Administration Guide 51

Assigning Tenants When Using External Authentication

Local and Regional Administration

· tenant tag reclaim cluster-list [-report-only | -report] Assigning Tenants When Using External Authentication
When external RADIUS authentication is configured, the groups that are assigned in the RADIUS server configuration establish the access privileges of the user. The implicit group name ccm-tenant-tag or ccm-tenant-id must be added to the list of groups of tenant user to designate the tenant status. Other assigned groups must be core groups or groups assigned to the same tenant. Invalid groups will be ignored when building user credentials at login. For example, to assign superuser access for the tenant abc, specify the groups attribute as:
cnr:groups=superusers,ccm-tenant-abc
See External Authentication Servers, on page 44.
Using cnr_exim With Tenant Data
The cnr_exim tool lets you export tenant data, and optionally re-assign the data to a different tenant on import (See the Using the cnr_exim Data Import and Export Tool, on page 200). You can use these features to:
· Create a standard set of objects for each tenant · Move tenant data to a new tenant

Note A user constrained to a specific tenant can only export or import data for that tenant.
Creating a Standard Set of Tenant Objects You can use a standard set of tenant objects to provide common objects such as scope and zone templates, policies, and client classes. You can use these instead of core data objects to give tenants the option to customize their settings. To create a standard set of tenant objects, do the following:

Step 1 Step 2 Step 3

Create a template tenant user to use as a placeholder, with tag=template and id=9999, and create the set of objects to be reused for each tenant. Use the cnr_exim tool to export the template configuration:
cnr_exim -f template -x -e template.bin

Use the cnr_exim tool to import the template configuration for the tenant abc
cnr_exim -f template -g abc -i template.bin

Note

The template tenant user does not need to be present on the cluster to import the data, which lets you reuse

the template.bin export file on other clusters. Once you have created the export file, you can also delete the

placeholder tenant on the original cluster to remove all associated template data, if desired.

Cisco Prime Network Registrar 11.1 Administration Guide 52

Local and Regional Administration

Moving Tenant Data

Moving Tenant Data

The ID of a tenant can only be changed by deleting and re-creating the tenant. To retain the data of the tenant when this is required, do the following (assuming the tenant tag for the tenant is xyz):

Step 1
Step 2 Step 3 Step 4

Use the cnr_exim tool to export the configuration for the tenant xyz:
cnr_exim -f xyz -x -e xyz.bin
Delete the tenant xyz. Recreate the tenant with the corrected tenant id. Use the cnr_exim tool to re-import the configuration:
cnr_exim -f xyz -g xyz -i xyz.bin

Managing Administrators
When you first log in, Cisco Prime Network Registrar will have one administrator–the superuser account. This superuser can exercise all the functions of the web UI and usually adds the other key administrators. However, ccm-admin and regional-admin administrators can also add, edit, and delete administrators. Creating an administrator requires:
· Adding its name. · Adding a password. · Specifying if the administrator should have superuser privileges (usually assigned on an extremely limited
basis). · If not creating a superuser, specifying the group or groups to which the administrator should belong.
These groups should have the appropriate role (and possibly subrole) assignments, thereby setting the proper constraints.
If you accidentally delete all the roles by which you can log in to Cisco Prime Network Registrar (those having superuser, ccm-admin, or regional-admin privileges), you can recover by creating an admin name/password pair in the /var/nwreg2/{local | regional}/conf/priv/local.superusers file. You must create this file and include a line in it with the format admin password. Use this admin name and password for the next login session. All users in the local.superusers file must be prefixed with “local$”. This helps to identify when the local.superusers file is used, as all users are prefixed by local$. Users that start with local$ will be validated against the local.superusers file entries. They will neither be checked against users in the local CCM user database nor using external authentication.

Note

· As admin names are case blind, the local$ and internal$ prefixes are case blind as well.

· When using nrcmd -N admin with a local$ or internal$ user, one must escape the $ (so, use local$ or internal$). The alternative is to let nrcmd prompt one for the user, as then no escaping is needed.

Cisco Prime Network Registrar 11.1 Administration Guide 53

Adding Administrators

Local and Regional Administration

Important

Using the local.superusers file causes reduced security. Therefore, use this file only in emergencies such as when temporarily losing all login access. After you log in, create a superuser account in the usual way, then delete the local.superusers file or its contents. You must create a new administrator account for each individual, to track administrative changes.
If you want to keep this file in place, make sure it is protected against general read access (read access to it is only needed by ccmsrv).

If external authentication is enabled and login fails because the external authentication servers are inaccessible or misconfigured, you can log in using any administrators defined in the CCM server’s database. In this case, the username should be prefixed with “internal$” (during login) to specify that internal CCM server’s database should be used for authentication and authorization of administrator.

Adding Administrators
To add an administrator, do the following:

Local and Regional Web UI

Step 1 Step 2
Step 3

From the Administration menu, choose Administrators under the User Access submenu. This opens the List/Add Administrators page (see the Create the Administrators, on page 136 for an example).
Click the Add Administrators icon in the Administrators pane, enter the name in the Name field, enter the password in the Password field, retype the password in the Confirm Password field in the Add Admin dialog box, and then click Add Admin.
Choose one or more existing groups from the Groups Available list (or whether the administrator should be a superuser) and then click Save.

Editing Administrators
To edit an administrator, select the administrator in the Administrators pane, modify the name, password, superuser status, or group membership on the Edit Administrator page, and then click Save. The active group or groups should be in the Selected list.
You can select the Unlimited Sessions? checkbox to indicate that the administrator is permitted an unlimited number of concurrent token and user sessions, when a session limit has been configured. For more information, see Session Management, on page 71.

Note The web UI logs out whenever there is a change in user role for the currently logged in admins.
Deleting Administrators
To delete an administrator, select the administrator in the Administrators pane, click the Delete Administrators icon, and then confirm or cancel the deletion.

Cisco Prime Network Registrar 11.1 Administration Guide 54

Local and Regional Administration

Suspending/Reinstating Administrators

Suspending/Reinstating Administrators
To suspend login access for an administrator, select the administrator in the Administrators pane, click the Suspend button at the top of the Edit Administrator page on the right pane.

Note When administrator login is enabled, only the Suspend action will be available. When suspended, only the Reinstate action will be available.

CLI Commands

Use admin name create [attribute=value] to create an administrator. Use admin name delete to delete an administrator. Use admin name suspend to suspend login access for administrators. Use admin name reinstate to reinstate login access for administrators. When connected to a regional cluster, you can use the following pull, push, and reclaim commands. For push and reclaim, a list of clusters or “all” may be specified. For push, unless -omitrelated is specified, associated roles and groups are also pushed (using replace mode).
· admin < name | all > pull < ensure | replace | exact > cluster-name [-report-only | -report] · admin < name | all > push < ensure | replace | exact > cluster-list [-omitrelated] [-report-only | -report] · admin name reclaim cluster-list [-report-only | -report]

Managing Passwords
Passwords are key to administrator access to the web UI and CLI. In the web UI, you enter the password on the Login page. In the CLI, you enter the password when you first invoke the nrcmd program. The local or regional CCM administrator or superuser can change any administrator password.
You can prevent exposing a password on entry. In the web UI, logging in or adding a password never exposes it on the page, except as asterisks. In the CLI, you can prevent exposing the password by creating an administrator, omitting the password, then using admin name enterPassword, where the prompt displays the password as asterisks. You can do this instead of the usual admin name set password command that exposes the password as plain text.
Administrators can change their own passwords on clusters. If you want the password change propagated from the regional server to all local clusters, log in to the regional cluster. First ensure that your session admin-edit-mode is set to synchronous, and then update your password.

Note The password should not be more than 255 characters long.

Cisco Prime Network Registrar 11.1 Administration Guide 55

Managing Groups

Local and Regional Administration

Managing Groups
A superuser, ccm-admin, or regional-admin can create, edit, and delete administrator groups. Creating an administrator group involves:
· Adding its name. · Adding an optional description. · Choosing associated roles.
Adding Groups
To add a group, do the following:
Local Advanced and Regional Web UI

Step 1 Step 2 Step 3

From the Administration menu, choose Groups under the User Access submenu. This opens the List/Add Administrator Groups page (see the Create a Group to Assign to the Host Administrator, on page 141 for an example).
Click the Add Groups icon in the Groups pane, enter a name and an optional description in the Add CCMAdminGroup dialog box, and then click Add CCMAdminGroup.
Choose one or more existing roles from the Roles Available list and then click Save.

Editing Groups

To edit a group, click the name of the group that you want to edit in the Groups pane to open the Edit Administrator Group page. You can modify the name, description, or role membership in this page. You can view the active roles in the Selected list.

Deleting Groups
To delete a group, select the group in the Groups pane, click the Delete Groups icon, and then confirm the deletion. You can also cancel the deletion by clicking the Close button.

CLI Commands
Use group name create [attribute=value] to create a group.
Use group name delete to delete a group.
When connected to a regional cluster, you can use the following pull, push, and reclaim commands. For push and reclaim, a list of clusters or “all” may be specified. The push operation will also push the related roles (using replace mode) and related owners and regions (using ensure mode) unless -omitrelated is specified to prevent this.
· group < name | all > pull < ensure | replace > cluster-name [-report-only | -report] · group < name | all > push < ensure | replace | exact > cluster-list [-omitrelated] [-report-only | -report] · group name reclaim cluster-list [-report-only | -report]

Cisco Prime Network Registrar 11.1 Administration Guide 56

Local and Regional Administration

Managing Roles

Managing Roles

A superuser, ccm-admin, or regional-admin administrator can create, edit, and delete administrator roles. Creating an administrator role involves:
· Adding its name. · Choosing a base role. · Possibly specifying if the role should be unconstrained, or read-only. · Possibly adding constraints. · Possibly assigning groups.

Adding Roles

To add a role, do the following:

Local Advanced and Regional Advanced Web UI

Step 1 Step 2 Step 3

From the Administration menu, choose Roles under the User Access submenu. This opens the List/Add Administrator Roles page.
Click the Add Role icon in the Roles pane, enter a name, and choose a tenant and a base role in the Add Roles dialog box, and then click Add Role.
On the List/Add Administrator Roles page, specify any role constraints, subrole restrictions, or group selections, then click Save.

Editing Roles

To edit a role, select the role in the Roles pane, then modify the name or any constraints, subrole restrictions, or group selections on the Edit Administrator Role page. The active subroles or groups should be in the Selected list. Click Save.

Deleting Roles
To delete a role, select the role in the Roles pane, click the Delete Role icon, and then confirm the deletion.

Note You cannot delete the default roles.
CLI Commands
To add and edit administrator roles, use role name create base-role [attribute=value] (see the role command in the CLIGuide.html file in the /docs directory for syntax and attribute descriptions). The base roles have default groups associated with them. To add other groups, set the groups attribute (a comma-separated string value).
When connected to a regional cluster, you can use the following pull, push, and reclaim commands. The push and reclaim commands allow a list of clusters or “all”. The push operation will also push the related groups (using replace mode) and related owners and regions (using ensure mode). The pull operation will pull the

Cisco Prime Network Registrar 11.1 Administration Guide 57

Granular Administration

Local and Regional Administration

related owners and regions (using ensure mode). For either operation, specify -omitrelated to prevent this and just push or pull the role.
· role < name | all > pull < ensure | replace | exact > cluster-name [-report- only | -report] · role < name | all > push < ensure | replace | exact > cluster-list [-omitrelated] [-report-only | -report] · role name reclaim cluster-list [-report-only | -report]

Granular Administration
Granular administration prevents unauthorized users from accidentally making a change on zones, address blocks, subnets, and router interfaces. It also ensures that only authorized users view or modify specific scopes, prefixes, and links. Granular administration constraints administrators to specific set of scopes, prefixes, and links. A constrained administrator can view or make changes to authorized scope, prefix, and link objects only. The CCM server uses owner and region constraints to authorize and filter IPv4 address space objects, and DNS zone related objects (CCMZone, CCMReverseZone, CCMSecondaryZone, CCMRRSet, and CCMHost). The zones are constrained by owners and regions. Owner or region attributes on the CCMSubnet control access to scopes. Also, owner or region attributes on the Prefix and Link objects control access to prefixes and links.
Local Advanced and Regional Advanced Web UI

Step 1 Step 2 Step 3 Step 4 Step 5
Step 6

From the Administration menu, choose Roles to open the List/Add Administrator Roles page. Click the Add Role icon in the Roles pane, enter a name for the custom role, for example, my-dhcp, choose a tenant, and choose dhcp-admin

Read User Manual Online (PDF format)

Read User Manual Online (PDF format)  >>

Download This Manual (PDF format)

Download this manual  >>

Related Manuals