Cisco Prime Network Services Controller Release Notes
This document describes the features, limitations, and bugs for the Prime Network Services Controller, Release 3.5.1a.
Cisco Prime Network Services Controller Overview
The dynamic nature of cloud environments requires organizations to apply and enforce frequent changes to networks. These networks can consist of thousands of virtual services elements, such as firewalls, load balancers, routers, and switches. Cisco Prime Network Services Controller (PNSC) simplifies operations with centralized, automated multi-device and policy management for Cisco network virtual services. For the latest PNSC release updates and overview, see the corresponding Cisco PNSC data sheet.
Cisco PNSC is the primary management element for Cisco Nexus 1000V and Cisco Nexus 1000VE Switches and Services that can enable a transparent, scalable, and automation-centric network management solution for virtualized data center and hybrid cloud environments. Cisco Nexus 1000V and Cisco Nexus 1000VE switches and services deliver a highly secure multitenant environment by adding virtualization intelligence to the data center network. These virtual switches are built to scale for cloud networks. Support for Virtual Extensible LAN (VXLAN) helps enable a highly scalable LAN segmentation and broader virtual machine (VM) mobility.
Cisco PNSC enables the centralized management of Cisco virtual services to be performed by an administrator, through its GUI, or programmatically through its XML API. Cisco PNSC is built on an information-model architecture in which each managed device is represented by its subcomponents (or objects), which are parametrically defined. This model-centric approach enables a flexible and simple mechanism for provisioning and securing virtualized infrastructure using Cisco VSG security services.
Note |
Starting with Cisco PNSC Release 3.4.2a, Cisco Adaptive Security Appliance (ASA 1000V), Cisco Cloud Services Router (CSR), Citrix NetScaler VPX, Citrix NetScaler, and KVM Hypervisor, and Microsoft HyperV platforms are not supported. |
-
Security administrators can author and manage security profiles and manage Cisco VSG instances. Security profiles are referenced in Cisco Nexus 1000V and Cisco Nexus 1000VE port profiles.
-
Network administrators can author and manage port profiles, and manage Cisco Nexus 1000V and Cisco Nexus 1000VE switches. Port profiles with referenced security profiles are available in VMware vCenter through the Cisco Nexus 1000V and Cisco Nexus 1000VE VSM programmatic interface with VMware vCenter.
-
Server administrators can select an appropriate port profile in VMware vCenter when instantiating a virtual machine.
-
Stateless managed devices—Security policies (security templates) and object configurations are abstracted into a centralized repository and used as templates against any virtual device type.
-
Dynamic device allocation—A centralized resource management function manages pools of devices that are commissioned (deployed) in service and a pool of devices that are available for commissioning. This approach simplifies large-scale deployments because managed devices can be preinstantiated and then configured on demand, and devices can be allocated and deallocated dynamically across commissioned and noncommissioned pools.
-
Scalable management—A distributed management-plane function is implemented using an embedded agent on each managed device that helps enable greater scalability.
New Features and Enhancements
No new features were introduced in Cisco Prime Network Services Controller, release 3.5.1a.
Requirements Overview
The following topics identify the primary requirements for installing and using Cisco PNSC.
System Requirements
Requirement | Description |
---|---|
Prime Network Services Controller Virtual Appliance |
|
Four virtual CPUs |
1.8 GHz |
Memory |
4 GB RAM |
Disk space |
220 GB on shared NFS or SAN, configured on two disks as follows:
|
Management interface |
One management network interface |
Processor |
x86 Intel or AMD server with 64-bit processor listed in the VMware compatibility matrix |
Hypervisor Requirements
Prime Network Services Controller is a multi-hypervisor virtual appliance that can be deployed on VMware vSphere.
See the VMware Compatibility Guide to confirm that VMware supports your hardware platform.
Requirement | Description |
---|---|
VMware |
|
VMware vSphere |
5.5, 6.0, and 6.5a with VMware ESXi (English only) |
VMware vCenter |
5.5, 6.0, and 6.5a (English only) |
Note |
Prime Network Services Controller running as a virtual machine with version 3.4.1b and later can be hosted on VMware vSphere ESXi 6.0 hosts that are managed by VMware vCenter Server 6.0. |
Note |
Prime Network Services Controller running as a virtual machine with version 3.4.2b or later can be hosted on VMware vSphere ESXi 6.5a hosts that are managed by VMware vCenter Server version 6.5a. |
Web-Based GUI Client Requirements
Requirement | Description |
---|---|
Operating system |
Either of the following:
|
Browser |
Any of the following:
|
Flash player |
Adobe Flash Player plugin 11.9 or later |
Firewall Ports Requiring Access
If Cisco PNSC is protected by a firewall, the following ports on the firewall must be open so that clients can contact Csco PNSC.
Port | Description |
---|---|
22 |
TCP/SSH |
80 |
HTTP |
443 |
HTTPS |
843 |
Adobe Flash |
Performance and Scalability
The following table lists the performance and scalability data for Cisco ONSC when using VMware.
Item | Scalability Numbers |
---|---|
Endpoints VSGs |
511 |
Hypervisors |
600 |
Locales |
256 |
Object groups |
65536 |
Orgs |
2048 |
Policies |
4096 |
Policy sets |
2048 |
Rules |
16384 |
Security profiles |
2048 |
Tenants |
256 |
Managed VMs |
6000 |
Users |
260 |
Zones |
8192 |
Hypervisor Support
The following table identifies features that differ with regard to hypervisor support in Cisco PNSC Release 3.5.1a. Features that are not listed are supported by all hypervisors.
Feature and Device Support |
VMware vSphere ESXi 5.5, 6.0, and 6.5a |
||
---|---|---|---|
Feature Support |
|||
Automatic deployment of network services |
Supported |
||
VM Attribute support |
Supported:
|
||
Device Support For detailed information about device support, see Cisco Prime Network Services Controller Supported Devices. |
|||
VSG |
Supported |
Cisco PNSC Upgrade Matrix
The following table lists the supported upgrade paths for Cisco PNSC.
Note |
Please make sure to have 5GB of space free in bootflash directory before proceeding with upgrade process. |
Initial Version |
Intermediate State(s) |
Final Version |
---|---|---|
2.0.3 |
2.1 to 3.0.2g to 3.2.2a to 3.4.1d to 3.4.2b to 3.4.2c |
3.5.1a |
2.0.3 |
2.1 to 3.0.2g to 3.2.2a to 3.4.1d to 3.4.2b to 3.4.2c |
3.5.1a |
2.1 |
3.0.2 to 3.2.2a to 3.4.1d to 3.4.2b to 3.4.2c |
3.5.1a |
3.0.2 |
3.2.2a to 3.4.1d to 3.4.2b to 3.4.2c |
3.5.1a |
3.2.1d |
3.4.1d to 3.4.2b to 3.4.2c |
3.5.1a |
3.2.2b |
3.4.1d to 3.4.2b to 3.4.2c |
3.5.1a |
3.4.1b |
3.4.1d to 3.4.2b to 3.4.2c |
3.5.1a |
3.4.1c |
3.4.1d to 3.4.2b to 3.4.2c |
3.5.1a |
3.4.1d |
3.4.2b to 3.4.2c |
3.5.1a |
3.4.2a |
3.4.2b to 3.4.2c |
3.5.1a |
3.4.2b |
3.4.2b to 3.4.2c |
3.5.1a |
3.4.2c |
NA |
3.5.1a |
3.4.2d |
NA |
3.5.1a |
Important Notes
The following topics provide important information for using Cisco PNSC .
Cloned Linux Virtual Machines
When Linux virtual machines are cloned, new MAC addresses are assigned. This causes a MAC address mismatch between the VM settings and the Linux Guest OS. If you encounter this situation, the following message is displayed:
The Guest OS either does not contain interface configuration for the VM NICs or the
interfaces are explictly disabled.
For information on how to resolve the MAC address mismatch, see the VMware Knowledge Base.
Editing Firewall Interfaces
We recommend that you do not edit the data interfaces of compute or edge firewalls. Changing the data interface via the Cisco PNSC GUI stops communication between the Cisco Nexus 1000V and Cisco Nexus 1000VE VEM link and the firewall, and thereby stops vPath traffic.
If you change the data interfaces of compute or edge firewalls via the Cisco PNSC GUI, make the appropriate configuration changes on the Cisco Nexus 1000V and Cisco Nexus 1000VE.
Searching with Special Characters
Searching for organization names does not work if the organization names include special characters, such as $.
User Account Password Expiration
When adding a user account, the administrator can choose to expire the account password and select the date on which it expires. When the expiration date is reached, the account is disabled and the user cannot log in to Cisco PNSC until a user with administrator privileges extends the expiration date.
Workflow for Automatically Deploying Network Services
Cisco PNSC enables you to automatically deploy compute firewall and load balancer network services by preparing the required networks, defining organizational profiles by configuring service automation policies, and assigning the organizational profiles to the required organization in the tenant hierarchy.
The following table identifies the tasks required to configure Cisco PNSC for automatic network service deployment, the related documentation, and the minimum role required for each task.
Task | Related Documentation | Role Required |
---|---|---|
1. Confirm that the following prerequisites are met:
|
admin |
|
2. Import service images. Supported service devices are VSG compute firewalls . |
admin |
|
3. Configure Management, HA, and vPath networks and subnetworks at root. |
admin |
|
4. Create the policies and profiles for the network services. |
admin |
|
5. Create organizational (Org) profiles and add service automation definitions to each profile. |
admin |
|
6. In Tenant Management, create the organization where the network services will be deployed and assign an Org profile. |
admin or tenant-admin |
|
7. Add a network to the organization to deploy the network service. |
tenant-admin |
|
8. Configure additional policies and profiles as needed. |
Configuring Additional Policies and Profiles for Network Services |
tenant-admin |
9. Removing an automatically deployed compute firewall network service. |
tenant-admin |
Importing Service Images
Before you begin
Procedure
Step 1 |
Choose Resource Management > Resources > Images. |
Step 2 |
Click Import Service Image. |
Step 3 |
In the Importing Service Image Dialog box: |
Configuring Networks for Network Service Deployment
To automatically deploy network services, you must configure the following networks with subnetworks at the root level:
-
A management network—This network provides IP addresses for the automatically deployed services.
-
A vPath service network—This network is required for deploying compute firewall network services.
-
An HA network—This network is required for deploying compute firewall network services in HA mode.
The following guidelines apply when creating networks for automated network service deployment:
-
You must use the same Distributed Virtual Switch (DVS) port group for all networks.
-
The port group must be accessible from Prime Network Services Controller.
Procedure
Step 1 |
Choose Resource Management > Managed Resources > root. |
Step 2 |
In the Networks tab, click Add. |
Step 3 |
To add a management network, provide the following information and click OK:
|
Step 4 |
To add an HA network to support compute firewall services in HA mode, provide the following information and click OK:
|
Step 5 |
To add a vPath service network, provide the following information and click OK:
|
Step 6 |
For each management and vPath network, add a subnetwork as follows:
|
Adding a Device Profile
A device profile is a set of custom security attributes and device policies. Adding a device profile enables you to specify the DNS and NTP servers that the service device is to use in addition to SNMP, syslog, and authentication policies.
Procedure
Step 1 |
Choose Policy Management > Device Configurations > root > Device Profiles. |
Step 2 |
Click Add Device Profile. |
Step 3 |
In the General tab in the Add Device Profile dialog box:
|
Step 4 |
In the Advanced tab, specify the fault, core file, and log file policies to use for the for the Cisco PNSC policy agent, and then click OK. |
NTP Behavior Post PNSC Upgrade
NTP service does not come up on the terminal when PNSC is upgraded from the previous releases to Release 3.4.1d or later. To access the NTP service, you need to re-login into the same terminal or start a new terminal.
Configuring an Org Profile for Automatic Service Deployment
A network service automation policy specifies the profiles, image, and credentials to be used when deploying a network service. Depending on the type of service, different options are available. For each Org profile, you can create a definition for each network service type: compute firewall and load balancer.
Procedure
Step 1 |
Choose Tenant Management > root > Profile Name > Create and enter a name for the Org profile. |
||||||||||||||||||||||||||||||||
Step 2 |
Choose Resource Management > Managed Resources > root > Service Deployment > Org Profile > profile where profile is the profile you created in the first step. |
||||||||||||||||||||||||||||||||
Step 3 |
To enable automatic deployment of the service, check the Enable Automation check box. |
||||||||||||||||||||||||||||||||
Step 4 |
Click Compute Firewall Service or Load Balancer Service to deploy that service using this Org profile. |
||||||||||||||||||||||||||||||||
Step 5 |
In the Network Service dialog box, provide the information as described in the following table, and then click OK. Different fields are available depending on the type of service.
|
Creating an Organization and Assigning an Org Profile
After you configure the service automation policies for an Org profile, create the tenant or other organization on which you want to deploy the network service. Creating the organization includes assigning the Org profile that will be used to automatically deploy network services.
Before you begin
Determine the level in the hierarchy where the organization that will be configured to automatically deploy network services will reside.
Procedure
Step 1 |
Choose Tenant Management > root and navigate to the level where you want to add the organization that will deploy network services using the Org profile. For example, to assign an Org profile to a tenant, click Create Tenant at the root level. Similarly, to assign an Org profile at the Application level, navigate to the VDC and click Create Application. |
Step 2 |
In the Create dialog box, enter a name for the organization and, from the Profile drop-down list, choose the Org profile to assign to the organization. |
Step 3 |
Click OK. |
Deploying a Network Service
After you create the organization where network services will be deployed and assign an Org profile, you can deploy the network service. To deploy the network service, create a network on the organization.
The following guidelines apply when deploying a network service:
-
Only one compute firewall service can be automatically instantiated for an organization by adding a Layer 2 network with any role.
-
Only one load balancer service can be automatically instantiated for an organization by adding a Layer 2 network with the role Service_LB.
Before you begin
-
For a compute firewall network service, confirm that Management and vPath networks have been configured at root.
Procedure
Step 1 |
Choose Resource Management > Managed Resources > root > tenant or tenant > org. |
Step 2 |
In the Networks tab, create the network for the service to be deployed, being sure to choose the correct role for the service. The network service is then automatically deployed. To monitor progress, choose Resource Management > Managed Resources > root > tenant or tenant > org and click the Network Services tab.
|
Configuring Additional Policies and Profiles for Network Services
After deploying a network service, you might need to apply new policies and profiles to the network service. To apply new policies and profiles to a specific, deployed network service, create the policies and profiles at the same organizational level as the deployed service. For example, if a compute firewall network service has been deployed for a VDC, create the new policies and profiles at the VDC level.
Deleting an Automatically Deployed Compute Firewall Service
You cannot delete an automatically deployed compute firewall by deleting the network of a specific client. However, you can delete an automatically deployed compute firewall service from the Managed Resources Network Services tab in Cisco PNSC.
Note |
If you delete the vPath network from root, it will remove all compute firewalls from all tenants and subordinate organizations. |
Procedure
Step 1 |
Choose the organization in which the network service has been deployed (Resource Management > Managed Resources > root > tenant > org). |
Step 2 |
Click the Network Services tab. |
Step 3 |
Choose the automatically deployed compute firewall service and click Delete. |
Using the Bug Search Tool
This topic explains how to use the Bug Search Tool to search for a specific bug or to search for all bugs in a release.
Procedure
Step 1 | |||
Step 2 |
In the Log In screen, enter your registered Cisco.com username and password, and then click Log In. The Bug Search page opens.
|
||
Step 3 |
To search for a specific bug, enter the bug ID in the Search For field and press Enter. |
||
Step 4 |
To search for bugs in the current release: |
Open Bugs
The following table lists the open bugs in the Cisco PNSC, Release 3.5.1a.
Bug ID | Description |
---|---|
PNSC: VSM role shows as standalone mode even when VSM is in primary HA mode. |
|
VSM goes to Failed to Apply state in PNSC on upgrade. |
|
Cleanup or modification of authorization methods on PNSC are not updated on VSG. |
|
VSM going to Failed to Apply state on changing the service path from PNSC. |
Related Documenation
Prime Network Services Controller
The Prime Network Controller documentation is available on Cisco.com at the following URL:
Cisco Nexus 1000V Series Switch Documentation
The Cisco Nexus 1000V Series switch documentation is available on Cisco.com at the following URL:
Cisco Nexus 1000VE Series Switch Documentation
The Cisco Nexus 1000V Series switch documentation is available on Cisco.com at the following URL:
https://www.cisco.com/c/en/us/support/switches/nexus-1000ve/tsd-products-support-series-home.html
Cisco Prime Data Center Network Manager Documentation
The Cisco Prime Data Center Network Manager (DCNM) documentation is available on Cisco.com at the following URL:
Cisco Virtual Security Gateway Documentation
The Cisco VSG documentation is available on Cisco.com at the following URL:
Accessibility Features in Cisco Prime Network Services Controller
All product documents are accessible except for images, graphics, and some charts. If you would like to receive the product documentation in audio format, braille, or large print, contact accessibility@cisco.com.
Obtaining Documentation and Submitting a Service Request
For information on obtaining documentation, using the Cisco Bug Search Tool (BST), submitting a service request, and gathering additional information, see What's New in Cisco Product Documentation.
To receive new and revised Cisco technical content directly to your desktop, you can subscribe to the RSS feeds are a free service.