2-3 2-2 12-2 2-3€¦defining 2-12 scheduling 2-12 viewing 2-12 bugs browse bug jobs , scheduling...

16
1 Using Resource Manager Essentials 78-11544-01 INDEX A access Contract Agent, checking for existing 12-2 privileges, configuration template, assigning to users (Configuration Management) 2-11 accessing CCO via modem xii via Telnet xii via world-wide web xii Software Management FAQ on A-13 advanced report, messages from selected VPN devices (Syslog Analysis) 3-4 approver lists, editing Job Approval 2-24 Software Management 2-26 audience for this document ix Availability device availability, monitoring 2-2 Offline Device report, viewing 2-3 overview 1-3 polling options, changing 2-2 views and options, setting 2-2 protocol distribution graph, viewing 2-3 Reachability dashboard, viewing 2-2 Reloads report, viewing 2-2 stack decoder analysis, viewing 2-3 starting 1-3 usage scenario, using, with Syslog Analysis 4-1 B batch configuration changes, making 2-11 reports in Network Show Commands defining 2-12 scheduling 2-12 viewing 2-12 bugs Browse Bug jobs, scheduling 2-27 browsing (Software Management) 2-27 by device 2-27 locating devices by 2-28 report (Software Management) 2-27

Upload: others

Post on 15-Oct-2019

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 2-3 2-2 12-2 2-3€¦defining 2-12 scheduling 2-12 viewing 2-12 bugs Browse Bug jobs , scheduling 2-27 browsing (Software Management) 2-27 by device 2-27 locating devices by 2-28 report

U78-11544-01

I N D E X

A

access

Contract Agent, checking for existing 12-2

privileges, configuration template, assigning to users (Configuration Management) 2-11

accessing

CCO

via modem xii

via Telnet xii

via world-wide web xii

Software Management FAQ on A-13

advanced report, messages from selected VPN devices (Syslog Analysis) 3-4

approver lists, editing

Job Approval 2-24

Software Management 2-26

audience for this document ix

Availability

device availability, monitoring 2-2

Offline Device report, viewing 2-3

overview 1-3

polling

options, changing 2-2

views and options, setting 2-2

protocol distribution graph, viewing 2-3

Reachability dashboard, viewing 2-2

Reloads report, viewing 2-2

stack decoder analysis, viewing 2-3

starting 1-3

usage scenario, using, with Syslog Analysis 4-1

B

batch

configuration changes, making 2-11

reports in Network Show Commands

defining 2-12

scheduling 2-12

viewing 2-12

bugs

Browse Bug jobs, scheduling 2-27

browsing (Software Management) 2-27

by device 2-27

locating devices by 2-28

report (Software Management) 2-27

1sing Resource Manager Essentials

Page 2: 2-3 2-2 12-2 2-3€¦defining 2-12 scheduling 2-12 viewing 2-12 bugs Browse Bug jobs , scheduling 2-27 browsing (Software Management) 2-27 by device 2-27 locating devices by 2-28 report

Index

C

cautions

regarding

deleting software images from the Essentials Server 6-3

NetConfig, and user and ad hoc templates 2-9

significance of xi

CCO (Cisco Connection Online)

acessing

via modem xii

via Telnet xii

via the world-wide web xii

features and services xi

retrieving software images from 5-3

software library upgrade 2-26

upgrade analysis, performing 5-2

username and password, when used 12-2

Change Audit

Change Audit logs

deleting records from 2-4

viewing 2-4

change records

converting to SNMP traps 2-4

viewing all 2-4

viewing those made during last 24 hours 2-4

changes during an exception period, viewing 2-4

exception periods, defining 2-4

FAQs on tracking

configuration changes A-1

who made what changes A-1

filtering options, setting up 2-4

overview 1-3

starting 1-3

usage scenarios

using with Configuration Management 10-1

using with multiple applications 6-1

using with Software Management 5-1

Cisco, contact when updating

contract status on network devices 12-3

your Contract Agent profile 12-2

Cisco Connection Online (see CCO) xi

CiscoWorks2000 Server, FAQs on

backing up data for a single application A-26

directory structure when backing up data A-25

which devices supported by particular applications A-26

command sets in Network Show Commands

assigning to users 2-12

creating 2-12

executing immediately 2-12

for more than 10 devices (FAQ) A-2

how many allowed per user (FAQ) A-2

comment lines, entering in Config Editor 2-14

comparing device configuration files

in Config Editor 2-14

2Using Resource Manager Essentials

78-11544-01

Page 3: 2-3 2-2 12-2 2-3€¦defining 2-12 scheduling 2-12 viewing 2-12 bugs Browse Bug jobs , scheduling 2-27 browsing (Software Management) 2-27 by device 2-27 locating devices by 2-28 report

Index

in Configuration Management 2-6

compression-decompression report (Syslog Analysis) 3-3

Config Editor (Configuration Management option) 2-13

checked-out files

listing 2-14

viewing changes to 2-14

comment lines, entering 2-14

Config Editor jobs

browsing and editing 2-15

details, editing 2-15

details, viewing 2-15

policies for, configuring 2-14

configuration files

comparing versions of 2-14

from the archives, editing 2-13

printing 2-13

download jobs, scheduling 2-13

editing preferences, setting up 2-14

configuration files, comparing versions of

in Config Editor 2-14

in Configuration Management 2-6

Configuration Management

archive, specifying criteria for purging 2-6

Cisco Netsys configurations, integrating 2-8

Config Editor (see Config Editor) 2-13

configuration archive

moving 2-6

protocol order used by, changing 2-7

retrieval criteria, modifying 2-7

shadow directory, locating 2-8

status, checking 2-7

updating 2-7

configuration files

comparing 2-6

searching for 2-5

configurations, importing from CiscoWorks 2-8

custom reports, creating, running, modifying, deleting 2-5

cwconfig command use 2-8

FAQs on

devices imported from NMS, comparing configurations A-2

finding out what devices are supported A-2

labels, configuring 2-7

NetConfig option (see NetConfig) 2-9

Network Show Commands option (see Network Show Commands) 2-12

out-of-sync configurations, finding 2-6

overview 1-4

starting 1-4

status of configuration import, viewing 2-8

usage scenarios

using alone 7-1

using with Change Audit 10-1

using with multiple other applications 6-1

configuring multiple devices 8-1

prerequisites 8-1

procedures 8-1

3Using Resource Manager Essentials

78-11544-01

Page 4: 2-3 2-2 12-2 2-3€¦defining 2-12 scheduling 2-12 viewing 2-12 bugs Browse Bug jobs , scheduling 2-27 browsing (Software Management) 2-27 by device 2-27 locating devices by 2-28 report

Index

NetConfig job, defining 8-3

template, creating 8-2

verifying 8-4

Contract Agent access

updating 12-2

when required 12-2

Contract Connection

contract status, checking 2-16

FAQs on serial numbers

different types A-7

out of sync A-8

why Electronic Serial Number field might be blank A-8

overview 1-4

starting 1-4

usage scenario, with Inventory 12-1

contract status of devices

checking (Contract Connection) 2-16

updating

procedures 12-1

verifying 12-2

conventions, typographical, used in this document x

custom reports

in Configuration Management

creating 2-5

deleting 2-5

running 2-5

in Inventory, creating and viewing 2-20

in Syslog Analysis

creating 11-1

defining 2-29

syslog report 2-30

verifying creation of 11-2

viewing 4-3

cwconfig, Configuration Management command 2-8

D

device configuration changes

checking 10-1

prerequisites 10-1

procedures 10-1

verifying 10-2

using a template 7-1

prerequisites 7-1, 8-1

procedures 7-2, 7-4

verifying 7-4

device configuration files, comparing

in Config Editor 2-14

in Configuration Management 2-6

devices

attributes, changing 2-20

availability, monitoring 2-2

browsing bugs by 2-27

classes, viewing information in 2-22

configuring multiple 8-1

prerequisites 8-1

procedures 8-1

4Using Resource Manager Essentials

78-11544-01

Page 5: 2-3 2-2 12-2 2-3€¦defining 2-12 scheduling 2-12 viewing 2-12 bugs Browse Bug jobs , scheduling 2-27 browsing (Software Management) 2-27 by device 2-27 locating devices by 2-28 report

Index

verifying 8-4

contract status on, updating 12-3

data, importing to Inventory 9-1

deleted, viewing status of 2-19

Device Serial Number field is blank, FAQ on A-10

exporting to a file 2-20

imported from NMS, comparing configurations A-2

importing

from a file 2-18

from a local host 2-18

from a remote host 2-19

information, viewing 2-21

by device class 2-22

within each class 2-21

locating by bug 2-28

managed

deleting 2-19

listing 2-18

migration from CiscoWorks classic to Essentials C-3

monitoring 4-1

prerequisites 4-1

procedures 4-2

verifying 4-3

network

checking contract status of 12-2

updating contract status on 12-3

Network Show command sets for more than 10 (FAQ) A-2

polling, scheduling 2-21

serial numbers

updating 12-3

verifying, FAQ on A-10

verifying update of 12-4

why they may not match shipment serial numbers 12-3

software, upgrading 5-1

prerequisites 5-1

procedures 5-2

verifying 5-7

software upgrade history

generating and browsing 2-27

searching by device 2-27

searching by user 2-27

support, adding incrementally 1-7

supported

by Essentials, determining 1-7

by Inventory, FAQ on determining A-9

by which applications, FAQ on determining A-26

supported by Configuration Management, FAQ on determining A-2

syslog messages for, not getting A-18

unmanaged

adding to Inventory 6-3

generating a report on 2-30

VPN

advanced report, messages from selected 3-4

search report 3-2

5Using Resource Manager Essentials

78-11544-01

Page 6: 2-3 2-2 12-2 2-3€¦defining 2-12 scheduling 2-12 viewing 2-12 bugs Browse Bug jobs , scheduling 2-27 browsing (Software Management) 2-27 by device 2-27 locating devices by 2-28 report

Index

Y2K compliance report, viewing 2-21

Device Views

device membership, browsing 2-17

dynamic views

adding 2-16

browsing 2-17

overview 1-4

starting 1-4

static views

adding 2-16

changing 2-16

views, deleting 2-16

directory

configuration archive shadow, locating 2-8

structure used by CiscoWorks2000 Server when backing up data (FAQ) A-25

documentation

feedback (reader comment) form, submitting electronically ix

obtaining updated

on the CD-ROM ix

on the world-wide web ix

related xi

E

editing

Config Editor

configuration files from the archives 2-13

job details 2-15

jobs 2-15

Job Approval approver list 2-24

NetConfig

jobs 2-10

user-defined configuration templates 2-11

Software Management approver lists 2-26

editing preferences, setting up in Config Editor 2-14

Essentials

application overviews 2-1

Availability 2-1

Change Audit 2-3

Configuration Management 2-5

Contract Connection 2-15

Device Views 2-16

Inventory 2-17

Job Approval 2-24

Software Management 2-24

Syslog Analysis 2-28

System Configuration 2-23

features 1-2

functionality, adding 1-7

incremental device support, adding 1-7

launching, from Configuration Management 2-11

overview 1-1

supported devices 1-7

time zone implementation 1-8

Essentials Server

deleting images from, caution regarding 6-3

6Using Resource Manager Essentials

78-11544-01

Page 7: 2-3 2-2 12-2 2-3€¦defining 2-12 scheduling 2-12 viewing 2-12 bugs Browse Bug jobs , scheduling 2-27 browsing (Software Management) 2-27 by device 2-27 locating devices by 2-28 report

Index

maintaining 6-1

configurations, removing from the archive 6-4

images, removing from the software library 6-3

old data, removing from the Job Control report 6-3

overall procedures 6-2

prerequisites for maintenance 6-1

records, removing from the Change Audit log 6-2

unmanaged devices, adding to Inventory 6-3

verifying maintenance 6-5

Change Audit log records removed 6-5

configurations removed from the archive 6-6

old data removed from the Job Control report 6-6

software images removed from the library 6-6

unmanaged devices added to Inventory 6-6

F

feedback (reader comment) form, submitting electronically ix

file import formats B-1

comma-separated values (CSV) file B-1

example B-2

device integration file (DIF) B-3

example B-4

H

hardware

encryption report (Inventory) 3-2

report (Inventory) 2-21

help

(see also troubleshooting) A-1

maintenance customers and partners (CCO) xi

network administrators (TAC) xii

online, using x

in NetConfig 2-11

I

IKE report (Syslog Analysis) 3-4

images (see software images) 3-2

importing device data to Inventory 9-1

prerequisites 9-1

procedures 9-2

verifying 9-3

Inventory

attribute check results, viewing 2-22

chassis slots

viewing a summary of 2-22

viewing details of 2-22

community strings, viewing 2-22

7Using Resource Manager Essentials

78-11544-01

Page 8: 2-3 2-2 12-2 2-3€¦defining 2-12 scheduling 2-12 viewing 2-12 bugs Browse Bug jobs , scheduling 2-27 browsing (Software Management) 2-27 by device 2-27 locating devices by 2-28 report

Index

custom reports, creating and viewing 2-20

device attributes, changing 2-20

device data

importing from a local host 2-18

importing from a remote host 2-19

device information

viewing 2-21

viewing within classes 2-21

device polling, scheduling 2-21

devices

deleted, viewing status of 2-19

exporting to a file 2-20

importing from a file 2-18

device Y2K compliance report, viewing 2-21

FAQ on

data collection methods A-9

device serial number, verifying and correcting A-10

Device Serial Number field blank A-10

Inventory Poller A-9

most recent changes A-10

Schedule Collection, how often to run A-9

Schedule Collection, when last performed A-10

time zones supported by Essentials A-9

what devices are supported A-9

filters for change reports, defining 2-20

hardware report, viewing 2-21

import status, checking 2-19

information in each device class, viewing 2-22

inventory 24-hour report, running 2-21

inventory collection

data history, viewing 2-22

running 2-21

scheduling 2-21

managed devices

deleting 2-19

listing 2-18

multiservice ports, vewing details of 2-22

overview 1-5

passwords, viewing 2-22

software

report, viewing 2-21

versions in each device class, viewing 2-22

starting 1-5

usage scenarios

using alone 9-1

using with Contract Connection 12-1

using with multiple applications 6-1

usernames, viewing 2-22

inventory information, maintaining 12-1

procedures 12-1

device serial numbers, updating 12-3

network devices, checking contract status of 12-2

verifying 12-2

contract status on network devices 12-3

device serial numbers updated 12-4

8Using Resource Manager Essentials

78-11544-01

Page 9: 2-3 2-2 12-2 2-3€¦defining 2-12 scheduling 2-12 viewing 2-12 bugs Browse Bug jobs , scheduling 2-27 browsing (Software Management) 2-27 by device 2-27 locating devices by 2-28 report

Index

J

Job Approval

approver list

creating 2-24

editing 2-24

job approval, setting up 2-24

jobs, approving or rejecting 2-24

overview 1-5

starting 1-5

L

library

adding images to 2-25

browsing 2-25

planning an upgrade to 2-26

searching 2-25

M

maintaining the Essentials Server (see Essentials Server) 6-1

migrating from CiscoWorks classic to Essentials C-1

data migration C-1

device and configuration file migration C-3

fully transitioned features C-4

application help C-4

Configuration Manager C-4

device management C-5

global command scheduler and manager C-5

login and logout C-5

Log Manager C-5

nmconfig C-5

show command C-6

Software Inventory Manager C-6

Software Library Manager C-6

Software Manager C-6

syslog message management (nmlogd) C-6

tool box C-6

nontransitioned features C-8

AutoInstall Manager C-8

CiscoWorks documentation C-9

Configuration SnapIn Manager C-8

device polling and polling summary C-9

Easy SQR (Report Writer) C-10

Health Monitor C-9

Publish Database Schema C-9

Report Writer (Easy SQR) C-10

TACACS Manager C-10

partially transitioned features C-7

Contacts C-7

device- and application-level security C-7

Device Monitor C-7

Domain Manager C-7

real-time graph C-8

Sync with Sybase C-8

modem, using to access CCO xii

9Using Resource Manager Essentials

78-11544-01

Page 10: 2-3 2-2 12-2 2-3€¦defining 2-12 scheduling 2-12 viewing 2-12 bugs Browse Bug jobs , scheduling 2-27 browsing (Software Management) 2-27 by device 2-27 locating devices by 2-28 report

Index

monitoring devices 4-1

prerequisites 4-1

procedures 4-2

custom report, viewing 4-3

network availability, determining current 4-2

syslog messages, viewing latest 4-3

verifying 4-3

N

NetConfig (Configuration Management option)

batch configuration changes, making 2-11

configuration template access privileges, assigning to users 2-11

default template policies, setting 2-11

Essentials, launching 2-11

NetConfig jobs

browsing and editing 2-10

defining and scheduling 2-10

viewing details of 2-10

online help for, viewing 2-11

usage scenarios, using alone 8-1

user-defined configuration templates, creating and editing 2-11

Network Show Commands (Configuration Management option)

batch reports

defining 2-12

scheduling 2-12

viewing 2-12

command sets

assigning users to 2-12

creating 2-12

executing immediately 2-12

FAQs on

commands, error messages A-3

commands, how many commands per set A-3

commands, inclusiveness A-3

command sets, executing for more than 10 devices A-2

command sets, how many allowed per user A-2

jobs

browsing 2-13

setting policies for 2-13

notes, significance of in documentation xi

O

Offline Device report, viewing 2-3

online help, using x

OSPF NOMEMORY errors, correcting 11-1

P

packet replay report (Syslog Analysis) 3-3

polling

device

10Using Resource Manager Essentials

78-11544-01

Page 11: 2-3 2-2 12-2 2-3€¦defining 2-12 scheduling 2-12 viewing 2-12 bugs Browse Bug jobs , scheduling 2-27 browsing (Software Management) 2-27 by device 2-27 locating devices by 2-28 report

Index

nontransitioned feature C-9

scheduling in Inventory 2-21

options, changing 2-2

views and options, setting 2-2

privileges

Contract Agent

updating 12-2

when required 12-2

NetConfig configuration template access, assigning to users 2-11

protocol distribution graph, viewing 2-3

R

Reachability dashboard, viewing 2-2

reader comment (feedback) form, submitting electronically ix

Reloads report, viewing 2-2

reports

24-hour

Inventory 2-21

Syslog Analysis 2-30

advanced, report of messages from selected VPN devices (Syslog Analysis) 3-4

attribute check results (Inventory) 2-22

batch report (Network Show Commands option) 2-12

scheduling 2-12

viewing 2-12

bugs (Software Management) 2-27

certificate report (Syslog Analysis) 3-3

change records, viewing

all (Change Audit) 2-4

those made during last 24 hours (Change Audit) 2-4

changes during an exception period (Change Audit) 2-4

chassis slots (Inventory)

details 2-22

summary 2-22

checked-out files (Config Editor) 2-14

community strings (Inventory) 2-22

compression-decompression (Syslog Analysis) 3-3

custom reports in Configuration Management

creating 2-5

deleting 2-5

modifying 2-5

running 2-5

custom reports in Inventory, creating and viewing 2-20

custom reports in Syslog Analysis

creating 11-1

defining 2-29

prerequisites to creating 11-1

syslog report, generating 2-30

verifying creation of 11-2

viewing 4-3

data collection history (Inventory) 2-22

de-encapsulation (Syslog Analysis) 3-3

device information (Inventory) 2-21

11Using Resource Manager Essentials

78-11544-01

Page 12: 2-3 2-2 12-2 2-3€¦defining 2-12 scheduling 2-12 viewing 2-12 bugs Browse Bug jobs , scheduling 2-27 browsing (Software Management) 2-27 by device 2-27 locating devices by 2-28 report

Index

by device classes 2-22

within each class 2-21

device software upgrade history (Software Management) 2-27

searching by device 2-27

searching by user 2-27

filters for change reports, defining (Inventory) 2-20

hardware (Inventory) 2-21

hardware encryption

Inventory 3-2

Syslog Analysis 3-3

IKE report (Syslog Analysis) 3-4

image upgrade (Inventory) 3-2

job information, consolidated (Software Management) 2-26

message reports, changing the URL for (Syslog Analysis) 2-29

multiservice ports (Inventory) 2-22

packet replay report (Syslog Analysis) 3-3

protocol distribution graph (Availability) 2-3

recent upgrade results (Software Management) 2-26

severity level summary (Syslog Analysis) 2-30

software report (Inventory) 2-21

in each device class 2-22

status of configuration import (Configuration Management) 2-8

Syslog Analysis 3-3

system message report (Syslog Analysis) 2-30

unmanaged devices, generating (Syslog Analysis) 2-30

VPM management solution (Inventory) 3-2

VPN configuration (Configuration Management) 3-2

Y2K compliance (Inventory) 2-21

S

Schedule Collection (Inventory)

how often to run (FAQ) A-9

when last performed A-10

scheduling

batch reports in Network Show Commands 2-12

Browse Bugs jobs 2-27

device polling 2-21

download jobs in Config Editor 2-13

Schedule Collection

how often to run, FAQ on A-9

when last performed, FAQ on A-10

scheduled jobs, reviewing 2-26

software image upgrade jobs 2-26

part of scenario 5-5

servers

CiscoWorks2000 (see CiscoWorks2000 Server) A-25

Essentials (see Essentials Server) 6-1

SNTP, defining server name 2-23

12Using Resource Manager Essentials

78-11544-01

Page 13: 2-3 2-2 12-2 2-3€¦defining 2-12 scheduling 2-12 viewing 2-12 bugs Browse Bug jobs , scheduling 2-27 browsing (Software Management) 2-27 by device 2-27 locating devices by 2-28 report

Index

SNMP

timeouts and retries, defining in System Configuration 2-23

traps, converting Change Audit change records to 2-4

SNTP server name, defining 2-23

software image library

adding images to 2-25

browsing 2-25

planning an upgrade to 2-26

searching 2-25

software images

caution regarding deleting 6-3

image upgrade jobs, scheduling 2-26

image upgrade report 3-2

removing from the software library 6-3

retrieving from CCO 5-3

Software Management

approver list, creating 2-26

approver lists, editing or deleting 2-26

Browse Bugs job, scheduling 2-27

bugs, browsing

by device 2-27

bugs browsing 2-27

consolidated job information, viewing 2-26

devices, locating by bug 2-28

device software upgrade history

generating and browsing 2-27

searching by device 2-27

searching by user 2-27

image upgrade jobs, scheduling 2-26

library

adding mages to 2-25

browsing 2-25

planning an upgrade to 2-26

searching 2-25

log files, mailing or copying 2-27

overview 1-6

recent upgrade results, viewing 2-26

scheduled jobs, reviewing 2-26

software management preferences, setting up 2-25

starting 1-6

synchronization

job, viewing 2-26

report, viewing 2-25

upgrade

from CCO, planning 2-26

information, updating 2-28

undoing 2-26

usage scenario

using with Change Audit 5-1

using with multiple other applications 6-1

stack decoder analysis, viewing 2-3

synchronization (Software Management) 2-25

jobs, viewing 2-26

report, viewing 2-25

Syslog Analysis

24-hour syslog report, generating 2-30

automated actions, defining 2-29

13Using Resource Manager Essentials

78-11544-01

Page 14: 2-3 2-2 12-2 2-3€¦defining 2-12 scheduling 2-12 viewing 2-12 bugs Browse Bug jobs , scheduling 2-27 browsing (Software Management) 2-27 by device 2-27 locating devices by 2-28 report

Index

custom syslog reports

defining 2-29

generating 2-30

data storage options, setting up 2-29

FAQs on

location of syslog messages A-19

not getting syslog messages for devices A-18

syslog window appears to lock up A-19

message filters, defining 2-29

overview 1-6

severity level summary, generating 2-30

starting 1-6

Syslog Collector, viewing status of 2-29

system message report, generating 2-30

unmanaged devices report, generating 2-30

URL for message reports, changing 2-29

usage scenarios

using alone 11-1

using with Availability 4-1

using with multiple other applications 6-1

syslog custom report (Syslog Analysis) 2-30

creating 2-29

generating 2-30

scenario 11-1

prerequisites 11-1

procedures 11-1

verifying 11-2

System Configuration

overview 1-6

proxy URL, setting up 2-23

RCP user names, defining 2-23

SMTP server name, defining 2-23

SNMP timeouts and retries, defining 2-23

starting 1-6

T

TAC (Technical Assistance Center) xii

technical support

(see also troubleshooting) A-1

maintenance customers and partners (CCO) xi

network administrators (TAC) xii

Telnet

accessing CCO via xii

passwords, changing (scenario) 7-1

templates

configuration, assigning users access privileges to 2-11

for configuring multiple devices, creating 8-2

for device configuration changes, using 7-4

NetConfig

configuration, assigning access privileges 2-11

default policies for 2-11

user-defined configuration, creating and editing 2-11

user and ad hoc, caution regarding 2-9

time zones

14Using Resource Manager Essentials

78-11544-01

Page 15: 2-3 2-2 12-2 2-3€¦defining 2-12 scheduling 2-12 viewing 2-12 bugs Browse Bug jobs , scheduling 2-27 browsing (Software Management) 2-27 by device 2-27 locating devices by 2-28 report

Index

implementation in Essentials 1-8

supported by Essentials, FAQ on A-9

troubleshooting A-1

Change Audit A-1

FAQs on A-1

CiscoWorks2000 Server A-25

FAQs on A-25

Configuration Management A-2

FAQs on A-2

troubleshooting A-3

Contract Connection A-7

FAQs on A-7

Inventory A-9

FAQs on A-9

troubleshooting A-10

Software Management A-13

FAQs, access to A-13

troubleshooting A-13

Syslog A-18

FAQs on A-18

troubleshooting A-19

U

undoing an upgrade (Software Management) 2-26

upgrade

analysis through CCO, performing 5-2

history report

generating and browsing 2-27

searching by device 2-27

searching by user 2-27

jobs, scheduling 2-26

library, planning 2-26

undoing (Software Management) 2-26

upgrading devices 5-1

prerequisites 5-1

procedures 5-2

verifying 5-7

upgrading device software 5-1

prerequisites 5-1

procedures 5-2

CCO upgrade analysis, performing 5-2

software images, retreiving from CCO 5-3

software image upgrade, scheduling 5-5

upgrade, tracking 5-7

verifying 5-7

URLs

changing, for Syslog Analysis message reports 2-29

for CCO xii

for updated documentation ix

proxy, setting up in System Configuration 2-23

usage conventions x

users

assigning configuration template access privileges to 2-11

device software upgrade history, searching by 2-27

Network Show command sets

15Using Resource Manager Essentials

78-11544-01

Page 16: 2-3 2-2 12-2 2-3€¦defining 2-12 scheduling 2-12 viewing 2-12 bugs Browse Bug jobs , scheduling 2-27 browsing (Software Management) 2-27 by device 2-27 locating devices by 2-28 report

Index

allowed per (FAQ) A-2

assigning to 2-12

templates, caution regarding 2-9

user-defined configuration templates, creating and editing in NetConfig 2-11

user names

RCP, defining 2-23

viewing (Inventory) 2-22

V

views (Device Views)

deleting 2-16

dynamic

adding 2-16

browing 2-17

static

adding 2-16

changing 2-16

VPN management solution 3-1

Configuration Management reports 3-1

search VPN devices 3-2

VPN configuration report 3-2

Inventory reports 3-2

hardware encryption reports 3-2

image upgrade reports 3-2

Syslog Analysis reports 3-3

advanced report, messages from selected VPN devices 3-4

certificate report 3-3

compression-decompression report 3-3

de-encapsulation report 3-3

hardware encryption reports 3-3

IKE report 3-4

packet replay report 3-3

W

when to contact Cisco (see Cisco) 12-3

world-wide web, using

to access CCO xii

to access updated documentation ix

Y

Y2K device compliance report (Inventory) 2-21

16Using Resource Manager Essentials

78-11544-01