Solution Overview

This guide serves as a validated reference for a Cisco Prime Infrastructure customer to migrate to Cisco DNA Center. This guide provides an end-to-end requirement checklist, readiness assessment, migration tool details, and postmigration day-n operations guidance.

The audience for this guide includes the technical staff responsible for migrating the enterprise network from Cisco Prime Infrastructure to Cisco DNA Center.


Note


If you are viewing this guide on cisco.com, click any of its figures to view a full-sized version.


Migrate from Cisco Prime Infrastructure to Cisco DNA Center

Cisco Prime Infrastructure has served as a vital management platform for customers, enabling them to oversee their campus networks effectively. However, the advantages presented by Cisco DNA Center and its approach of orchestrating campuses and branches with intent, security and assurance, and third-party device integration surpass the capabilities of Cisco Prime Infrastructure.

Cisco has created a solution called the Prime Data Migration Tool (PDMT) to streamline the process of migrating sites, devices, maps, configuration, CLI templates, Cisco ISE, and Cisco Connected Mobile Experiences (CMX) from Cisco Prime Infrastructure to Cisco DNA Center. The PDMT enables seamless coexistence between Cisco Prime Infrastructure and Cisco DNA Center, granting the flexibility to transition gradually to Cisco DNA Center.

This guide focuses on coexistence model between Cisco Prime Infrastructure and Cisco DNA Center. In the coexistence model, network devices are managed by both Cisco Prime Infrastructure and Cisco DNA Center. Cisco Prime infrastructure is used for device automation, and Cisco DNA Center is used primarily for assurance and other nonintent-based automation. Wireless controller automation is done from Cisco Prime Infrastructure, which is a temporary solution until Cisco DNA Center brownfield learning of wireless controllers is available.

The following sections describe the end-to-end flow to complete the Cisco Prime Infrastructure to Cisco DNA Center migration.

Procedure


Step 1

Assess Cisco Prime Infrastructure deployment usage and Cisco DNA Center capability.

The Cisco Prime Infrastructure Cisco DNA Center Assessment & Readiness Tool (PDART) analyzes Cisco Prime Infrastructure and provides details such as:

  • a comprehensive summary of Cisco Prime Infrastructure usage

  • Cisco DNA Center compatibility of network devices

  • use case

  • reports

  • wireless template

  • network scale

  • recommended appliance

Step 2

Prepare for data migration.

Follow recommendations from the Cisco PDART report. If required, upgrade Cisco Prime Infrastructure to the latest version, optimize network hierarchy, onboard Cisco DNA Center appliance, and so on.

Step 3

Initiate and complete data migration.

Use the data migration tool (coexistence tool) within Cisco Prime Infrastructure to port your network easily and securely Cisco DNA Center.

Step 4

Adopt Cisco DNA Center.

Cisco DNA Center offers superior automation, greater visibility, artificial intelligence (AI)-driven analytics to help keep the network healthy and reduce operation expenditures.

Cisco DNA Center is a powerful management system that leverages AI to connect, secure, and automate network operations. Cisco DNA Center simplifies the management of the Cisco Catalyst network infrastructure, ensuring a consistent user experience across wired and wireless networks. It delivers enterprise-scale, secure, seamless, and reliable connectivity among users and applications.


Comparison of Cisco Prime Infrastructure and Cisco DNA Center Use Cases

The following table shows the use case summary comparison of Cisco Prime Infrastructure and Cisco DNA Center.

Feature Cisco Prime Infrastructure Cisco DNA Center

Cisco Prime Infrastructure monitoring of alarms and incidents; Cisco DNA Assurance for monitoring and troubleshooting

Supported

Supported

Device 360, Client 360, App 360

Supported

Supported

Maps

Supported

Supported

User CLI Templates

Supported

Supported

Note

 

The wireless template configuration push is done from Cisco Prime Infrastructure. The migrated wired user CLI can be used from Cisco DNA Center.

Compliance

Supported

Supported

Reports

Supported

Supported

SWIM

Supported

Supported

Cisco Prime Lightweight Access Points/Cisco DNA Center AP Configuration workflow

Supported

Supported

Rogue AP

Supported

Supported

aWIPS

Supported

Supported

Configuration Archive

Supported

Supported

Cisco ISE and CMX integration

Supported

Supported

Configure HA

Supported

Supported

Configure Mobility Tunnel

Supported

Supported

Intelligent Capture

Not Supported

Supported

Machine Reasoning Engine

Not Supported

Supported

Hardware and Software Specifications

The solution is validated with the hardware and software listed in the following table.

Role Model Name Hardware Platform Software Version

Cisco DNA Center

DN2-HW-APL

Cisco DNA Center Appliance

Cisco DNA Center 2.3.5.5

Identity Management, RADIUS Server

ISE-VM-K9

Cisco Identity Services Engine Virtual Appliance

Cisco Identity Services Engine 3.1 Patch 6

Cisco Prime Infrastructure

Prime Infrastructure

Cisco Prime Infrastructure Virtual Appliance

3.10.4

PDMT

Prime Data Migration Tool

Cisco Prime Infrastructure Virtual Appliance

PI 3.10.4 Prime Data Migration Tool Update 05.x

Cisco Collapsed Core Node

C9500-32C

C9500-24Q

9500 Series Switches

17.9.4a

Cisco Access Node

C9300-48P

C9300-24P

C9407R

C9200-48P

3850-48U

Cisco Catalyst 9300/3850 Series Switches

17.9.4a

Cisco Wireless Controller

C9800-40-K9

C9800-L-K9

Cisco Catalyst 9800 Wireless Controller

17.9.4a

Cisco AireOS Wireless Controller

AIR-CT5520-K9

Cisco 5520 Wireless Controller

AireOS 8.10.162.0

Cisco Access Points

9120-AXI

9130-AXI

2800

3800

Cisco Catalyst/Cisco Aironet Access Points

17.9.4a

CMX

10.6.3

Solution Topology

The following figure shows the solution topology.

Solution Use Cases

The following table shows the solution use cases.

Category Functions Use Case

PDART

Migration Tool

Install, run, verify use case, scale, reports, device compatibility

PDMT

Migration Tool

Install, verify location group, maps, inventory, device credential, CLI template, CMX and Cisco ISE are migrated to Cisco DNA Center

Assurance

Assurance

Device 360

Client 360

App 360

Network services like AAA, DHCP

Maps

Floor map view with APs overlaid

Heatmap wireless coverage

Interferers using maps

MRE

MRE for wired network events

MRE for wireless client like AAA events

Rogue and aWIPS

Threat detection and mitigation on WLAN

Template

User CLI Template

User CLI template for configuration push

Compliance

Compliance

Compliance startup versus running configuration for any configuration change

Reports

Reports

AP summary and AP utilization

Client session and count

Client traffic and traffic stream metrics

Radio performance and AP RF quality

Inventory

Wireless uptime

SWIM

SWIM

Image upgrade or downgrade of network switch, wireless controller

AP Configuration Workflow

AP Workflow

Perform AP workflow to configure AP name, radio parameter change, schedule radio task, and so on

Cisco ISE and CMX Migration

Cisco ISE Migration

Configure and integrate with Cisco ISE and CMX

CMX Migration

Wireless Controller HA and Mobility

Wireless Controller HA and Mobility

Configure C9800 HA and mobility from Cisco DNA Center automation

Intelligent Capture

ICAP

Perform AP, client capture for AP and client troubleshooting

Configuration Archive

Configuration Archive

View, schedule network device archive configuration

Remove the Device from Cisco Prime

Cisco Prime Infrastructure Migration

Remove the device from Cisco Prime Infrastructure after migration

Scale Matrix

Solution testing has verified the scale numbers that are listed in the following table. To view the scale numbers for the Cisco DNA Center appliance, see the Cisco DNA Center Data Sheet.

Category Value

Device inventory

1000

Number of sites with maps

450 sites with 5 floors

Cisco DNA Center appliances

1

Number of buildings and floors

450

Number of wireless controllers

4

Number of APs in inventory

2500

Number of endpoints

(10,000 wireless) + (1000 wired)

Number of SSIDs

10

Number of user CLI templates

100

Solution Keynotes

Cisco Prime Infrastructure Cisco DNA Center Assessment and Readiness Tool

The Cisco PDART analyzes a Cisco Prime Infrastructure deployment and assesses whether Cisco DNA Center supports the current deployment.

For more information on Cisco PDART, see Use PDART - a Cisco DNA Center Readiness Tool.

  • Copy the Cisco PDART file to Cisco Prime Infrastructure:

    (base) USER-M-32NQ:Downloads USER$ scp pdart_3_10_4 root@209.165.201.0:/
    root@209.165.201.0's password: 
    pdart_3_10_4                                                                                    100%   14MB 945.3KB/s   00:15    
    (base) USER-M-32NQ:Downloads USER$
    
  • Change the file to an executable:

    [root@USER-prime /]# chmod  755 pdart_3_10_4 
  • Run the following command:

    [root@USER-prime /]# ./pdart_3_10_4 
    
    
                  ####################################################
    ###                                              ###
    ###       Welcome to Cisco PDART                 ###
    ###             version: 3.02                    ###
    ###                                              ###
    ####################################################
    ### 
    
    ## 
    ##  Script Start Time: 2023-07-07_02:47:04 
    ## 
    
    
    ## 
    ##  Script End Time: 2023-07-07_02:51:30 
    ## 
    
    
    
    ******
    Cisco PDART Tool has successfully completed.
    

    After you run the PDART in CLI, the outputs-PDF report, run logs, and a JSON file are found at:

    PDART tarfile - /localdisk/defaultRepo/pdart.d/PDART_2023-07-07_02-47-04.tar.gz

    [root@USER-prime /]#

  • To go through the PDF report, copy it to a file server or to the desktop:

    [root@USER-prime ~]# scp /localdisk/defaultRepo/pdart.d/PDART_2023-07-07_02-47-04.tar.gz admin@209.165.201.0.247:/home/admin/
    admin@209.165.201.0.247's password: 
    PDART_2023-07-07_02-47-04.tar.gz                                                                                                                                            100%  704KB  11.0MB/s   00:00     
    [root@USER-prime ~]#
    

    Before initiating any migration, we recommend that you carefully evaluate the migration readiness and supported devices, use cases, and reports. A careful evaluation will help ensure that you have a holistic view of supported and unsupported features before migrating.

The following figure shows the Cisco PDART-generated PDF report.

Cisco Prime Data Migration Tool

Use the Cisco Prime Data Migration Tool (PDMT) or a coexistence tool within Cisco Prime Infrastructure to port your network from Cisco Prime Infrastructure to Cisco DNA Center easily and securely. When using the PDMT, data is sent from Cisco Prime Infrastructure to Cisco DNA Center, but not from Cisco DNA Center to Cisco Prime Infrastructure. This means that the network hierarchy, maps, and devices remain unchanged in Cisco Prime Infrastructure, even if changes are made within Cisco DNA Center.

You can migrate devices, location groups, associated site maps, user-defined CLI templates, and CMX data from Cisco Prime Infrastructure to Cisco DNA Center and manage your enterprise network over a centralized dashboard.

For more information on the PDMT, see Cisco Prime Infrastructure to Cisco Digital Network Architecture Center Prime Data Migration Guide.

Install the PDMT:

The following figure shows the PDMT launch point in Cisco Prime Infrastructure:

Key points:

  • Check the Enables automatic synchronization of data integrated with the Cisco DNA Center check box to synchronize the already migrated data set for the groups and devices from Cisco Prime Infrastructure to Cisco DNA Center automatically after modification.

  • Check the Include newly added data during dynamic synchronization check box to move the newly created groups and the newly added devices during dynamic synchronization, if any, from Cisco Prime Infrastructure to Cisco DNA Center automatically after addition.

    Dynamic synchronization does not support the add, update, or delete operations for the already migrated data and won’t synchronize the data automatically for the following components:

    • Maps

    • CLI templates

    • Cisco ISE Server

  • Check the Enable CMX settings check box to push the CMX with floor groups. If the Enable CMX settings check box is not checked, CMX data will not be pushed to the Cisco DNA Center server.


Note


  • Both the PDART and PDMT (coexistence) tools run on Cisco Prime Infrastructure and are nonintrusive.

  • During the migration over the sharing channel, Cisco Prime Infrastructure shares the following items with Cisco DNA Center:

    • Maps

    • Topology

    • Devices

    • Configurations

    • CLI templates

  • Gradual migration allows dynamic (incremental) changes that are made to the Cisco Prime Infrastructure to be synchronized with Cisco DNA Center. Note that this is a one-way synchronization. The changes made to Cisco DNA Center are not synchronized with Cisco Prime Infrastructure.

  • Cisco Prime Infrastructure does not enforce the civic locations for location/site groups. When you migrate a site/hierarchy without civic location information to Cisco DNA Center, the migration fails.

  • Before you begin the migration process, read the important notes in the Cisco Prime Infrastructure to Cisco Digital Network Architecture Center Prime Data Migration Guide.


Cisco DNA Assurance

Cisco DNA Assurance uses unique network graph technology developed by Cisco. This technology draws from a combination of data sources, such as NetFlow, Application Visibility and Control (AVC), DDI (DNS, DHCP, and IP address management), Cisco ISE, RADIUS information, topology data, CMX, and other device metrics to construct a real-time and historical capture of interrelationships among users, devices, applications, and network services across time and location.

Cisco Catalyst 9800 wireless controllers are managed by Cisco Prime Infrastructure for read/write and configuration push using Cisco Prime Infrastructure templates and monitoring. Cisco DNA Center is used for assurance purposes only. Currently, wireless controllers are monitored by both Cisco Prime Infrastructure and Cisco DNA Center in a coexistence model. The subscription channels established for C9800 wireless controllers to publish streaming telemetry data have peer addresses to both Cisco Prime Infrastructure and Cisco DNA Center.

NETCONF discovery in Cisco DNA Center inventory is mandatory for wired switches (access, core, and so on) for the telemetry subscription to be pushed to wired switches.

To enable wired telemetry, you must:

  • Postmigration: Discover the device with NETCONF, and edit the device with NETCONF port 830.

  • Repush/force telemetry pushes after NETCONF discovery.


Note


After migration, for Assurance to work correctly, ensure that:

  • Network devices have been added to sites correctly.

  • Devices are in managed state in the inventory.

  • Device controllability and telemetry configuration (such as syslog, SNMP, and NetFlow collection) are configured.

  • Devices are reachable from Cisco DNA Center and ports are open for SNMP, syslog, NetFlow, HTTPS, and so on.


Before migration to Cisco DNA Center:

After migration to Cisco DNA Center, 116 total subscriptions are migrated:

The following table compares the assurance use cases of Cisco Prime Infrastructure and Cisco DNA Center.

Feature Cisco Prime Infrastructure Cisco DNA Center

Health Dashboard

Supported

Supported

Historical Troubleshooting

Supported

Supported

Alarms and Events

Supported

Supported (Issue and Events)

Device 360

Supported

Supported

Client 360

Supported

Supported

Network Services

Not Supported

Supported (AAA, DHCP, and DNS)

Application Visibility

Not Supported

Supported

Maps

Supported

Supported

Rogue and aWIPS

Supported

Supported

MRE

Not Supported

Supported

Reports

Supported

Supported

CMX Integration

Supported

Supported

Intelligent Capture

Not Supported

Supported

Cisco DNA Assurance offers the following benefits:

  • Automatically detect and prioritize issues.

  • Instant guided remediation for quick resolution.

  • Increased performance and less time spent on troubleshooting.

Assurance Health Dashboards in Cisco DNA Center

Assurance dashboards give a high-level overview of the health of every network device and wired or wireless client in the network. Assurance dashboards provide the top 10 global issues and allow administrators to expand views by:

  • geographical site

  • device list

  • client list

  • topology

Any poorly connected devices or communication issues are highlighted, with suggested remediation. You can customize how the health score is computed.

To view the Assurance health dashboard, choose Assurance > Health > Select Overall.

To view the Cisco DNA Center Top 10 Global issues, choose Assurance > Health > Select Overall > Top 10 Issue.

To change the status of issues in Cisco DNA Center, choose Assurance > Dashboard > Issues & Events.

To create user-defined issues based on syslog, choose Assurance > Settings > Issue Settings.

Cisco DNA Center event notification allows you to associate multiple channels inside one notification that delivers the details of selected events that occur at multiple points.

To view the event notification channels, choose Platform > Developer toolkit > Event Notification.

To view the Cisco Prime Infrastructure Health Dashboard, choose Dashboard > Network Summary > Overview.

To view the Cisco Prime Infrastructure Alarms & Events, choose Monitor > Monitor Tools > Alarms and Events.

Historical Troubleshooting

Time-based filters are used to zoom in to a specific period of low health score to understand the cause of the reduced health. Information on the network health page is divided into the device roles, such as core, access, distribution, router, or wireless. Time ranges of 3 hours, 24 hours, and 7 days are supported to get an idea of the current and past health of the network.

For time-based filters, choose Dashboard > Assurance > Health > Network.

This window shows the site-specific health scores for network devices and clients and provides an indication of the health of devices by their role (access, core, distribution) with healthy percent.

To view the site-specific health scores, choose Dashboard > Assurance > Health > Network > Global > Site Details.

Device 360

The Network Health by Device Roles/Type dashlet contains health scores for the device category by role. For a 360-degree view of a specific network element, click the device name in the Network Devices table.

The Device 360 view provides the following information:

  • Device-critical KPIs such as CPU, memory, and so on

  • List of top issues

  • Physical neighbor topology of the device

  • Event Viewer

  • Path Trace

  • Application Experience

  • Connectivities and interface utilization information

For the Cisco DNA Center Device 360 view, choose Health > Network > Network Devices > Wireless Controller > Click Device Name.

The Cisco Prime Infrastructure Device 360 view provides the following information:

  • Device-critical KPIs such as CPU, memory, and so on

  • List of top alarms

For the Cisco Prime Infrastructure Device 360 view, choose Monitor > Managed Elements > Network Devices > Network Devices > Click information (i) icon adjacent to the IP Address for additional information.

Client 360

The Client Health Dashboard shows the client health score and has multiple filters to effectively drill down to specific clients of interest.

To view 360 views of client health in Cisco DNA Center, click the Client tab > Client devices.

The Details 360 view of the client helps to troubleshoot the client's issues.

The Client 360 view provides the following information:

  • Historical view of client traffic usage

  • Client details like MAC, IP, VLAN, SSID, AP, and controller

  • List of top issues

  • Client joining summary like onboarding, roaming, RF quality, and traffic

  • Path Trace

  • Device information

  • Connectivities and RF information

For the Cisco DNA Center Client 360 view, choose Assurance > Client > Client details > Click Client > Client 360.

For client device information, choose Assurance > Client > Client details > Click Client > Client 360 > Device Info.

For better client troubleshooting, client connectivity provides details of Tx (bytes), RX (bytes), data rate, retries, and Cisco DNA Center request and response.

For client connectivity information, choose Assurance > Client > Client details > Click Client > Client 360 > Detail Information > Connectivity.

Client RF information provides details of RSSI and SNR.

For client RF information, choose Assurance > Client > Client details > Click Client > Client 360 > Detail Information > RF.

View the Cisco Prime Infrastructure client overview to:

  • Monitor clients

  • View alerts and events

  • Configure controllers and client location

Attributes like ISE, endpoint type, posture, and authorization profile name are populated with Cisco ISE added to Cisco Prime Infrastructure.

The Cisco Prime Infrastructure User 360 view provides details about user IP, controller, alarm, session details, and so on.

For the Cisco Prime Infrastructure User 360 view, choose Monitor > Monitor Tools > Client and users. Click the information (i) icon on the username for additional information.

Application 360

Application 360 provides a general overview of the health of all applications on the network, including a special section on applications that have been tagged as business relevant. Business-relevant application issues are highlighted, with suggested remediation for any anomalies.

Application telemetry is enabled from Cisco DNA Center for the wireless controllers after migration. There might be a chance that the controllers already have NetFlow exporter, monitor, and records before migration. In that case, the NetFlow-related configuration is removed before enabling application telemetry from Cisco DNA Center.

Enable application telemetry to configure application telemetry for the selected devices.

To enable application telemetry, choose Inventory > Select device > Actions > Telemetry > Enable Application Telemetry.

Enable the SSID type before enabling application telemetry, as shown in the following figure.

The Application Telemetry column shows the telemetry configuration status. If you do not see the Application Telemetry column in the default column setting, click the ellipsis icon at the right end of the column headings and check the Application Telemetry check box.

To view the application dashboard, choose Assurance > Dashboard > Application.

For more information, see Criteria for Enabling Application Telemetry on Devices.

Network Service 360

The following capabilities include the overall health of the critical services all in one place:

  • View Authentication, Authorization, and Accounting (AAA)

  • Dynamic Host Configuration Protocol (DHCP) services for wireless devices across Cisco and all third-party servers in a global comprehensive view

These capabilities help network operators reduce overall issue-ticket resolution time and lead to lower ticket volume.

To view network services, choose Assurance > Dashboard > Network Services.

For more information, see Monitor Network Services.

Maps

There are several reasons to add floors with floor maps. One reason is to see your wireless network the way it exists today. Another reason is to help you plan and visualize future changes.

You can visualize your wireless network by creating or importing a floor map that contains various building components, like walls and windows, and then positioning your wireless devices on it. Using the floorplan, Cisco DNA Center computes 2D and 3D heatmaps that show the relative intensity of the RF signals in the coverage area. For 2D wireless maps, the heatmap is only an approximation of the actual RF signal intensity because it does not consider the attenuation of various building materials, such as drywall or metal objects, nor does it display the effects of RF signals bouncing off obstructions. 3D maps are primarily used to plan and analyze a wireless network on a floor. As such, there are minimal configurations and edit functions that you can perform in 3D maps. With 3D wireless maps, you can view a 3D representation of your wireless network. A near real-time predictive model dynamically updates the 3D map to show changes in RF coverage.

The data migration tool (PDMT) is used to migrate the maps along with groups, devices, and associated floor maps.

The following figure shows a Cisco DNA Center 2D floor map view with AP overlaid and heatmap coverage.

3D wireless maps offer the following features and functionalities:

  • Navigate through your wireless network in a 3D environment with a first-person view or third-person view.

  • Gain insights into the areas in your wireless network where service-level agreements (SLAs) are not being met.

  • Run an optimizer tool to compute the best AP layout to meet your SLAs.

  • View the RF coverage for different elevations and use the Scanner tool to view the RF coverage for specific elevations.

  • Crop the KPI heatmap with the clipping tools.

The following figure shows a Cisco DNA Center 3D map view.

The following figure shows the Cisco Prime Infrastructure floor with heatmap coverage after migration.

The following figure shows Cisco CMX for a wireless map (migrated from Cisco Prime Infrastructure using the PDMT).


Note


Dynamic synchronization of PDMT does not support add, update, or delete operations for the already migrated data and does not synchronize the data automation for maps. Maps migration is achieved only by force sync.

For more information, see Work with Wireless 2D and 3D Floor Maps.


Rogue and aWIPS

The Rogue Management application in Cisco DNA Center detects and classifies threats in the WLAN and enables the network administrator and operator to monitor these detected threats. The Rogue unauthorized access point (AP) is used to hack sensitive information in the WLAN.

The Cisco Adaptive Wireless Intrusion Prevention System (aWIPS) is a wireless intrusion threat detection and mitigation mechanism. With a fully infrastructure-integrated solution, you can continually monitor wireless traffic on both wired and wireless networks and use that network intelligence to analyze attacks from many sources to pinpoint accurately, and proactively prevent attacks, rather than wait until damage or exposure has occurred.

For more information on turning on Rogue and aWIPS, see Cisco DNA Center Rogue Management and aWIPS Application.

The Cisco DNA Center Rogue and aWIPS dashboard offers the following benefits:

  • Built on wireless telemetry that communicates based on more reliable transport protocol like HTTPS/TCP

  • Better classification engine

  • Reduce false positives when managed APs are reported as rogue due to different RF group name, compared with Cisco Prime Infrastructure

  • Reduce complexity by aggregating rogue AP with multiple SSIDs into a single threat

  • Contextual data on rogue AP (time and location) for users to consume

  • Better correlation algorithms to trace rogue APs on wire (multi-vendor algorithms with BSSID to Ethernet MAC address mapping)

To view the Cisco DNA Center Rogue and aWIPS dashboard, choose Assurance > Rogue and aWIPS.

To view the Cisco Prime Infrastructure Rogue and aWIPS dashboard, choose Dashboard > Wireless > Security.

This page displays all the rogue APs detected in the past hour and the past 24 hours. Click the rogue AP number to view the rogue AP alarms.

To view general information for the rogue AP, issue severity, and recent events for the rogue AP alarm, choose Monitor > Monitoring Tools > Alarms and Events > Rogue AP.

For more information, see the Cisco DNA Assurance User Guide.

Templates

User-defined CLI templates provide out-of-the-box configuration templates that you can use to make changes on your network devices. If you have sufficient privileges, you can also create new templates that meet the exact needs of your environment, and then make those templates available for others to use. You can make the templates as simple or as complex as needed, including grouping multiple templates together into a composite template. Finally, you can associate templates with particular devices by creating configuration groups.

Cisco DNA Center templates offer the following benefits:

  • Validate errors in the template

  • Simulate the template

  • Version control the template for tracking purposes

  • Day-0 onboarding and day-n templates

Template Features Cisco Prime Infrastructure Cisco DNA Center

Feature and technologies templates

Supported

Brownfield learning1

Create regular CLI template

Supported

Supported

Composite template

Supported

Supported

Import/export template

Supported

Supported

Tagging template

Supported

Not supported

1 We don't recommend using the learn device configuration workflow to learn the existing configuration from wireless devices. Cisco Prime Infrastructure can be used for wireless configuration management until the learn device configuration solution is complete and ready.

User-Defined CLI Templates

User-defined CLI templates provide customized configurations using CLI commands that you can use in your templates. You can use a blank CLI template to create new CLI commands.

User-defined CLI template created in Cisco Prime Infrastructure can be migrated using the PDMT. Migrated CLI templates are shown in the Cisco DNA Center Template Hub. Only user-defined templates are migrated by default.

To view the user-defined templates in Cisco Prime Infrastructure, choose Prime Data Migration Tool > Summary > CLI Templates.

Screenshot of the Cisco Prime Infrastructure Prime Data Migration Tool.

To view the migrated templates in the Cisco DNA Center Template Hub, choose Tools > Template Hub > Project Name > Prime Imported Templates.

Screenshot of the Template Hub window.

You must associate the template to a network profile before provisioning the template to network devices. To attach the template to a network profile, choose Tools > Template Hub > Project Name > Prime Imported Templates > Select Template > Attach to Network Profile.

Screenshot of the Template Hub window with the Attach to Network Profile pane displayed.

System-Defined CLI Templates

Use the Cisco Prime Infrastructure wireless Feature & Technologies templates and System CLI templates to push configurations to wireless controllers. By default, these templates can't be migrated with the PDMT.

However, you can save the System CLI templates under My Templates > CLI Templates (User Defined) > System Templates - CLI (User Defined), and then migrate them.

Screenshot of the Cisco Prime Infrastructure System Template window.

Then, use the PDMT to migrate the saved System CLI templates.

Screenshot showing the status of the template migration.

After migration, the templates are shown in the Cisco DNA Center Template Hub.

Screenshot of the Cisco DNA Center Template Hub window.

To view Cisco Prime Infrastructure built-in wireless templates, choose Configuration > Templates > Features & Technologies > Controller > WLANs > WLAN Configuration.

Screenshot of the WLAN Configuration window.

Note


Port-based templates of Cisco Prime Infrastructure require extra CLI modification on Cisco DNA Center before provisioning the template. Provisioned templates from the Template Hub can be used to provision templates.


For more information about the Cisco DNA Center Template Hub, see Create Templates to Automate Device Configuration Changes.

Compliance

Cisco Prime Infrastructure provides compliance features that you can use to audit whether device configurations comply with network requirements. Compliance policy defines how the system evaluates device configurations for compliance with network standards and expectations.

A compliance profile is a method of organizing custom and system compliance policies that the system uses to perform configuration audits.

Cisco DNA Center built-in compliance ensures that devices comply with business intent.

Compliance helps to identify any intent deviation or out-of-band changes in the network that can be injected or reconfigured without affecting the original content.

Cisco DNA Center compliance summary:

  • Network settings: Indicates that the device configuration complies with what was designed and provisioned from Cisco DNA Center.

  • End of life: Indicates that are no end-of-life alerts on the device.

  • Startup vs running configuration: Indicates that both the startup and running configuration are in sync.

  • Software image: Indicates that the device is running the golden image.

  • Critical security advisories: Indicates that there are no critical advisories for the device.

A network administrator can conveniently identify devices that do not meet compliance requirements in Cisco DNA Center. Compliance checks can be automated or performed on demand:

  • Automated compliance check: By default, a compliance check is triggered for any out-of-band change.

  • Manual compliance: Can be triggered from the Inventory window or a device-specific window.

  • Scheduled compliance check: Weekly trigger for all devices.

To view a compliance summary in Cisco DNA Center, choose Provision > Inventory > Select Device > View Device Details > Compliance > Summary.

In Cisco DNA Center, the Startup vs. Running Configuration compliance check identifies whether the startup and running configurations of a device are in sync. If the configurations are out of sync, a compliance check is triggered and a detailed report of the out-of-band changes is displayed. The check is triggered within 5 minutes of any out-of-band changes. To view the Startup vs. Running Configuration compliance check in Cisco DNA Center, choose Provision > Inventory > Select Device > View Device Details > Compliance > Summary > Startup vs. Running Configuration.

In Cisco DNA Center, you can view open violations after a template CLI push. You can acknowledge less-important device compliance violations. You can opt the violations in or out of the compliance status calculation.

To view rule-based compliance in Cisco Prime Infrastructure, choose Configuration > Compliance > Policies.

To view a compliance violation summary in Cisco Prime Infrastructure, choose Configuration > Compliance > Violation Summary.

For more information, see Compliance Audit for Network Devices.

Reports

Cisco Prime Infrastructure reports provide information about system and network health and fault information. You can customize and schedule reports to run on a regular basis. Reports can present data in a table, in a graph, or in a mixture of both formats. You can save reports in CSV or PDF format on the Cisco Prime Infrastructure server for download, or send reports to an email address.

Cisco Prime Infrastructure provide the following types of report data:

  • Current: Provides a snapshot of data that is not time dependent.

  • Historical: Periodically retrieves data from the device and stores it in the Cisco Prime Infrastructure database.

  • Trend: Generates a report using aggregated data, which is collected and summarized as minimums, maximums, and averages.

With Cisco Prime Infrastructure, you can filter reports based on specific criteria. You can export reports, sort reports into logical groups, and archive reports for long-term storage.

Cisco DNA Center uses data from the reports feature to derive insights from the network and its operation. Cisco DNA Center reports data in several formats, such as CSV and PDF. Cisco DNA Center provides flexible scheduling and configuration options to meet operational needs. For more information, see Reports.


Note


Not all Cisco DNA Center reports are supported in PDF file format.


The following table compares Cisco Prime Infrastructure and Cisco DNA Center reports.

Features Cisco Prime Infrastructure Cisco DNA Center

AP summary

Supported

Supported

AP utilization

Supported

Supported

Client session

Supported

Supported

Client count, client detail

Supported

Supported

Radio performance and AP RF quality/AP radio report in Cisco DNA Center

Supported

Supported

Inventory

Supported

Supported

Wireless uptime, AP summary

Supported

Supported

Composite report, flexible report

Supported

Supported

The following figure shows the Cisco DNA Center Reports window:

The following figure shows a Cisco DNA Center-generated report:

The following figure shows a Cisco Prime Infrastructure-generated report (Reports > Reports > Scheduled Run Results):

Software Image Management

The Cisco DNA Center software image management (SWIM) process manages software upgrades and controls the consistency of image versions and configurations across your network. SWIM speeds and simplifies the deployment of new software images and patches. Prechecks and postchecks help ensure that an upgrade has no adverse effects. SWIM provides an easy way to build a central repository of software images and apply them to devices. Administrators can mark software images as golden for a device family, and then upgrade devices to the software image and patch versions that follow the golden versions defined in the repository. Cisco DNA Center supports patches from intent to prechecks and postchecks in the same way that it manages regular images. SWIM tracks when software maintenance updates, subpackages, ROMMON, AP service pack, and AP device pack upgrades are applied to the base image.

Feature Cisco Prime Infrastructure Cisco DNA Center

SWIM preinstall check

Not Supported

Supported

Software image summary

Supported

Supported

Add/import image

Supported

Supported

Golden image

Not Supported

Supported

Distribute image

Supported

Supported

Activate image

Supported

Supported

Commit changes

Supported

Supported

Last n SWIM jobs

Supported

Supported

SMU support

Not Supported

Supported

ROMMON upgrade

Not Supported

Supported

SWIM postinstall check

Not Supported

Supported

Cisco DNA Center SWIM provides the following benefits:

  • Provides prechecks and postchecks as part of the SWIM workflow, comparing the difference before and after an upgrade.

  • Provides complete flexibility and simplicity to choose show commands based on your network requirement.

With the Cisco DNA Center software image upgrade, you import the image from cisco.com and then mark the image as golden. You can specify a golden software image for a device family or for a particular device role. The device role is used to identify and group devices according to their responsibilities and placement in the network.

The image displays the Image Family window.

To start the image upgrade, Cisco DNA Center compares each device software image with the image that you designate as golden for that specific device type. If the software image and the golden image differ, Cisco DNA Center specifies that the software image of the device is outdated. You can then update the outdated software image.

Before pushing a software image to a device, Cisco DNA Center performs upgrade readiness prechecks on the devices, such as checking the device management status, disk space, and so on. If any prechecks fail, you cannot perform the software image upgrade. You must correct any issues before you can upgrade the software image on the devices.

If all prechecks succeed, you can distribute (copy) the new image to the device and activate it (that is, make the new image the running image). The activation of the new image requires a reboot of the device. Because a reboot might interrupt the current network activity, you can schedule the process for a later time.

After the software image is successfully upgraded, Cisco DNA Center performs upgrade postchecks, such as checking the CPU usage, route summary, and so on, to ensure that the state of the network remains unchanged.

To start the image upgrade, choose Provision > Inventory > Select Device > Actions > Software Image > Image Update.

The image displays the Image Update setting.
The image displays the Image Update scheduling window.

The following figure shows the Cisco Prime Infrastructure SWIM landing page:

The image displays the SWIM landing page in Cisco Prime Infrastructure.

The following figure shows the Cisco Prime Infrastructure image upgrade:

The image illustrates the image upgrade process in Cisco Prime Infrastructure.

For more information about Cisco DNA Center SWIM, see Manage Software Images.

AP Configuration Workflow

The Configure Access Points workflow lets you configure and deploy AP-level parameters, such as the AP location, admin status, mode, and so on. You can also configure radio-level parameters, such as the radio power level, channel settings, and so on.

The Configure Access Points workflow in Cisco DNA Center is similar to the Lightweight Access Point feature in Cisco Prime Infrastructure.

The following settings configured using the Configure Access Points workflow aren't overwritten when the wireless controllers or APs are reprovisioned:

  • Admin status for radios (only applicable for Cisco AireOS wireless controllers)

  • AP primary controller

  • AP secondary controller

To launch the Configure Access Points workflow in Cisco DNA Center, choose Workflow > Configure Access Points:

The Configure Access Points workflow.

The following figure shows the AP-level parameters to configure:

An example of configurable AP-level parameters.

The following figure shows an AP primary controller name change for HA:

An example of how to change the name of the HP AP primary controller.

To launch the Cisco Prime Infrastructure Lightweight Access Point feature, choose Configuration > Template > Lightweight Access Points > AP Template Detail > LAP1:

The Lightweight Access Points window.

For more information, see AP Configuration in Cisco DNA Center.

Cisco ISE and CMX Migration

If you check the Enable ISE settings check box, the Cisco ISE server details are pushed. If you don't check the Enable ISE settings check box, Cisco ISE data isn't pushed to the Cisco DNA Center server.

If you check the Enable CMX settings check box, CMX is pushed with floor groups. If you don't check the Enable CMX settings check box, CMX data isn't pushed to the Cisco DNA Center server.

When the Cisco Prime Infrastructure – Cisco DNA Center migration tool is active and auto sync is enabled, CMX is pushed dynamically to Cisco DNA Center floor groups, and Cisco DNA Center tracks the location data for assigned groups.

After CMX is migrated to Cisco DNA Center, it is not managed by Cisco Prime Infrastructure.

The following figure shows how to enable the Cisco ISE setting in the PDMT for migration:

The Cisco ISE setting in the PDMT.

The following figure shows how to enable CMX settings in the PDMT for migration:

The CMX setting in the PDMT.

The following figure shows the dynamic synchronization and CMX settings enabled:

The dynamic sync and CMX settings.

The following figure shows CMX on Cisco Prime Infrastructure before migration:

CMX before migration.

The following figure shows CMX settings after migration to Cisco DNA Center:

CMX after migration.

The following figure shows a floor map on CMX:

A floor map on CMX.

When you migrate Cisco ISE from Cisco Prime Infrastructure to Cisco DNA Center, Cisco ISE is added to Cisco DNA Center in the failed state. To avoid this, you must:

  • Activate pxGrid on Cisco ISE.

  • Enable ERS on Cisco ISE.

  • Make sure that the Cisco ISE CLI and GUI passwords are the same.

Wireless Controller HA and Mobility

Cisco Catalyst 9800 Series wireless controllers support the ability to be configured in an active/standby high availability (HA) stateful switch-over (SSO) pair. Cisco DNA Center supports the ability to take two controllers of the same model, running the same OS version, and configure them into an HA SSO pair.

For Catalyst 9800 Series wireless controllers, the redundancy management IP and peer redundancy management IP addresses that need to be configured in Cisco DNA Center are actually the redundancy port and peer redundancy port IP addresses. These are referred to as the local IP and remote IP addresses in the web UI of the Catalyst 9800 Series wireless controllers. The IP subnet for the redundancy port must be a separate IP subnet from any other interface on the Catalyst 9800 Series wireless controller. Also, the primary and standby Catalyst 9800 Series wireless controllers must use the same IP subnet for the redundancy port, meaning the redundancy port connection must be a Layer 2 connection or back-to-back.

Using Cisco DNA Center base automation for wireless controller HA and mobility offers the following benefits:

  • Automated workflow to enable or disable wireless controller HA

  • Automated workflow to enable or disable mobility tunnels

Procedure


Step 1

To configure wireless controller HA or mobility tunnels in Cisco DNA Center, choose Provision > Inventory > Select Controller > Actions > Provision > Configure WLC HA.

The Configure WLC HA setting.

Step 2

To disable HA on the wireless controller (if HA is already provisioned), click Disable HA.

Disable HA on the wireless controller.

Step 3

To configure or reset the mobility group, choose Provision > Inventory > Select Controller > Actions > Provision > Configure WLC Mobility.

The Configure Mobility Group window.

Intelligent Capture

Intelligent Capture (ICAP) is Cisco’s state-of-the-art, intent-based networking solution. ICAP provides live technical insight into various wireless metrics from both the client and AP perspective, allowing you to easily resolve the most difficult wireless issues.

ICAP provides support for a direct communication link between Cisco DNA Center and APs. Using this channel, Cisco DNA Center can receive packet capture (PCAP) data, AP and client statistics, and spectrum data. With the direct link from the AP to Cisco DNA Center via gRPC, ICAP allows you to access data from APs that is not available from wireless controllers.

Cisco DNA Center ICAP supports the features listed in the following table.

Cisco DNA Center Feature Name Wireless Controller and AP Feature Name

Data Packet Capture

Full Packet Capture

Live Capture

Partial Packet Capture

Client Filtered

AP Stats Capture

AP WLAN Statistics

AP RF Statistic

Client RF Statistics

Anomaly Stats Capture

Anomaly Detection

Anomaly Packet Capture

Anomaly Individual Reports

Anomaly Summary Reports

Spectrum Analysis

Spectrum Analysis

For more information, see the Cisco Intelligent Capture Deployment Guide.

Procedure


Step 1

To enable AP stats capture using ICAP, choose Assurance > Settings > Intelligent Capture Settings > Access Points > AP Stats Capture > Enable AP.

The Intelligent Capture Settings window.

Step 2

Start the AP capture.

How to start the AP capture.

Step 3

Start the client ICAP capture.

How to start the client ICAP capture.

Configuration Archive

Cisco DNA Center uses configuration archive functionality to save the latest device configuration in its internal databases. The configuration of a device is archived when a new device is added to Cisco Prime Infrastructure and updated by periodic triggers or event-based triggers. Event-based triggers occur when there is a change in the configuration.

Cisco DNA Center exports the device configuration of the switch from the inventory and exports the CLI output.

The exported device configuration of the switch.

Cisco DNA Center uses Command Runner to export the running configuration for Catalyst 9800 wireless controllers.

Command Runner exports the running configuration.

Cisco DNA Center exports the wireless configuration.

Cisco DNA Center exports the wireless configuration.

Use config drift to check the configuration difference between drift versions.

Config drift compares the drift versions.

Archive the configuration to internal and external servers.

The Configuration Archive window.

Cisco Prime Infrastructure maintains an archive summary.

The Cisco Prime Infrastructure archive summary.

Cisco Prime Infrastructure exports the device configuration.

Cisco Prime Infrastructure exports the device config.

Remove a Device from Cisco Prime Infrastructure After Migration

If you aren't using Cisco Prime Infrastructure for wireless automation and Cisco DNA Center Assurance and you want to remove Cisco Prime Infrastructure permanently, review the following two workflows.

When Force Sync Is Enabled

When force sync is enabled and you initiate device deletion from the Cisco Prime Infrastructure, the device is removed from the Cisco Prime Infrastructure but not from the Cisco DNA Center inventory and Cisco DNA Center is used for Assurance.


Note


Make sure that dynamic sync is disabled in the PDMT before removing the device from Cisco Prime Infrastructure.


The device deletion initiates from Cisco Prime Infrastructure.

The device is intact in the Cisco DNA Center inventory.

When the device is removed from Cisco Prime Infrastructure after migration, the telemetry subscription for Cisco Prime Infrastructure is removed and the telemetry connection is up.

When Dynamic Sync Is Enabled

When dynamic sync is enabled and you initiate device deletion from Cisco Prime Infrastructure, the device is deleted from the Cisco Prime Infrastructure inventory and dynamic sync triggers removal of the device from the Cisco DNA Center inventory.


Note


Make sure all the telemetry subscriptions for Cisco Prime Infrastructure and Cisco DNA Center are cleared.


Removing the device from the Cisco Prime Infrastructure inventory initiates device deletion from Cisco DNA Center.

The following figure shows the deletion of the device from Cisco DNA Center.

Currently, device deletion from Cisco DNA Center doesn’t remove the telemetry subscription for Cisco DNA Center.

To delete all the telemetry subscriptions from the wireless controller configuration, enter the following commands:

WLC#term shell
            WLC#function removeall() {
            for id in `sh run | grep telemetry | cut -f4 -d' '`
            do
            conf t
            no telemetry ietf subscription $id
            exit
            done
            }
           WLC#removeall

For more information, see Delete All Telemetry Subscriptions from the WLC Configuration.

Scale and Performance

The following tables show the scale used in the PDMT migration.

Entity Amount

Sites with buildings and floor maps

450

Wired devices

1000

Templates

100

APs

2500

Wireless controllers

4

Wireless clients

10,000

Cisco Prime Infrastructure VM Footprint Cisco DNA Center Length of Time

16 vCPU

24 GB RAM

1.2 TB HDD

44-core appliance

DN2-HW-APL

1 hour, 48 minutes

Cisco Prime Infrastructure usage summary for migration:

Cisco Prime Infrastructure usage summary for migration.

Migration time taken:

Length of time to migrate.

Cisco DNA Center inventory after migration:

The Inventory window after migration.

Cisco DNA Center dashboard after migration:

The dashboards after migration.

Assurance dashboard after migration:

The Assurance dashboard after migration.

Roadmap and References

The current version of this guide focuses on the Cisco Prime coexistence model, where Cisco Prime Infrastructure is used for network automation and provisioning and Cisco DNA Center is used for assurance and monitoring. Future revisions of this guide will cover the use cases of learning device configurations in Cisco DNA Center and adapting the network automation functionality in Cisco DNA Center. These use cases will enable the complete migration from Cisco Prime Infrastructure to Cisco DNA Center, and eventually replace Cisco Prime Infrastructure with Cisco DNA Center for full management of the enterprise network.

To learn more about the Cisco Prime Infrastructure-to-Cisco DNA Center migration, consult the following references: