OmniVista Cirrus Production Notes 1.0.2
OmniVista® Cirrus is a cloud-based Network Management System (NMS). This cloud-based approach eliminates the need for purchasing and maintaining a physical server and installing the NMS on premise, since everything resides in the cloud. Network Operators can access OmniVista Cirrus from anywhere, using any approved browser and device (e.g., workstation, tablet).
Access to OmniVista Cirrus is supported on the following browsers: Internet Explorer 10+ (on Windows client PCs), Firefox 26+ (on Windows and Redhat/SuSE Linux client PCs), Chrome 26+ (on Windows and Redhat/SuSE Linux client PCs).
These Production Notes detail new features and functions, network/device configuration prerequisites, supported devices, and known issues/workarounds in OmniVista Cirrus. Please read the Production Notes in their entirety as they contain important operational information that may impact successful use of the application.
- New Features and Functions
- Network and Device Prerequisites
- Supported Devices
- Issues Fixed
- Additional Documentation
An overview of new features and functions is provided below. Details are provided in the Production Notes.
New Account Types
- Trial Account - The Premium-Trial Account has been renamed to Trial Account. Account features and support remain unchanged from previous releases.
- Paid Account - The Premium Account has been renamed to Paid Account. There are three (3) levels of Paid Accounts:
- Base - Includes all previous Premium Account features and support.
- Business - Includes all previous Premium Account features and support, plus TAC Device Support, AVR Service, and Support Portal Access for Business Partners.
- Premium - Includes all previous Premium Account features and support, plus TAC Device Support, AVR Service, and Support Portal Access for End Customers.
- IP Address - DHCP Server IP address.
- Option 1 - Subnet Mask.
- Option 2 - Gateway.
- Option 6 - Domain Name Servers - Required for FQDN resolution of OmniVista Cirrus connection points.
- Option 28 - Broadcast Address.
- Option 42 - NTP Server(s) - Required for Certificate validation (start date and duration), and all related encryption functions.
ALE Specific Requirements
- Option 43 (required only for OS6350, OS6450 Switches)
- Sub-Option 1 - Vendor ID. Required to validate the DHCP response (alenterprise).
The following Sub-Options are only required if you are using a Proxy to connect to the Internet.
- Sub-Option 129 - Proxy URL. It can be either an IP address or a URL (e.g., "IP-address=126.96.36.199", "URL=http://server.name").
- Sub-Option 130 - Proxy Port.
- Sub-Option 131 - Proxy User Name. If the customer proxy access requires authentication, both 131 and 132 can be supplied via these sub-options.
- Sub-Option 132 - Proxy Password.
- Option 138 - Remove any existing configuration (required for all ALE Devices).
Note: If you are accessing https via a proxy, the proxy server must be specified in DHCP Option 43, Sub-option 129 (Server) and Sub-Option 130 (Port). The server may be specified in 1 of 2 formats: 1) “URL=http://server.domain”, or 2) “IP-address=188.8.131.52”. The port is specified as a number (8080).
Note: To enable statistics data transfer, status queries, configuration commands, and other requests/responses between devices and OmniVista Cirrus, a minimum of 1 Mbps end-to-end network throughput is recommended between the customer premise and the OmniVista Cirrus hosting infrastructure.
The following ports must be configured to allow outbound traffic from your local network if you are not using a Proxy to connect to the Internet, or if your DNS or NTP Servers are outside of your network:
- 443 - If you are not using a Proxy to connect to the Internet. Either your firewall must allow outbound access to this port; or if you have one, you may access the port via your local proxy.
- 80 - If you are not using a Proxy to connect to the Internet. Either your firewall must allow outbound access to this port; or if you have one, you may access the port via your local proxy.
- 123 - If you are using an NTP Server that is outside of your network. If External, you must ensure that your firewall allows outbound access to port 123 udp. This access cannot be mediated by a proxy, it must be direct (NAT is allowed).
- 53 - If you are using a DNS Server that is outside of your network. If External, you must ensure that your firewall allows outbound access to both port 53 tcp and port 53 udp. This access cannot be mediated by a proxy, it must be direct (NAT is allowed).
An NTP Server(s) is required for Certificate validation (start date and duration), and all related encryption functions. ALE Devices must have access to at least one NTP Server, whether local or external.
Devices must be running the specified OS below for management by OmniVista Cirrus.
- LAN Devices - AOS 6.7.2.R03 (Build 112 or higher), AOS 8.4.1.R03 (Build 141 or higher).
- APs - AWOS 184.108.40.206
A link to the latest software images is included in the Verification E-Mail you receive when you create your account. If necessary, click on the link and download the required AOS software. Release Notes, containing detailed upgrade instructions for each device type, are available on the ALE Business Portal.
A full list of ALE supported devices/AOS releases can be found here.
Analytics Line Chart Does not Display Date in X-Axis (OVC-461)
Summary: The Analytics - Network Health line chart does not display the date in the x-axis when configured to display weekly or monthly data.
Workaround: No workaround at this time.
Upgrade Workflow Should Be Changed When Device Is Loaded From Certified Directory (OVC-435)
Summary: When an AOS 6.x Switch with "Set to Software Version" set to "Latest Version" contacts the OmniVista Server, the server checks the Working Directory to see if it is running the latest AOS software. If the Working Directory contains the latest software version, an upgrade will not be triggered, even if the Certified Directory is running on an older software version. To upgrade the Certified Directory to the latest software, reboot the switch from the Working Directory.
Workaround: NA - Informational.
Status of All AOS Devices Changed from “OV Managed” to “Pre-Provisioning" in Device Catalog (OVC-145)
Summary: AOS Device Status in the Device Catalog changes from “OV Managed” to “Pre-Provisioning" in the Device Catalog. This also affects applications throughout OmniVista Cirrus (e.g., Discovery - polling problems, Notifications - unable to configure traps, Analytics - unable to collect data, Resource Manager - unable to perform backup/restore).
Workaround: OmniVista Framework Server (ovclient) must be restarted by ALE Customer Support.
OS6560 Does Not Support Policy List (OVCLOUD-1384)
Summary: You cannot apply a Policy List to an OS6560 Switch running AOS 8.4.1.R03.
Workaround: No workaround at this time. This will be supported in the AOS 8.5 Release.
Error When Applying Access Role Profile with Policy List to 6x Device (OVC-459)
Summary: A Failure error may occur when applying an Access Role Profile with a Policy List containing a large number of policies to 6x Devices. This may be due to network latency.
Workaround: Reduce the number of Policies in the Policy List and retry (e.g., reduce the number of policies in the list from 10 to 5).
BYOD Access Strategy "Go to initial URL" Option Does Not Work on AOS 6x and AOS 8x Switches (OVCLOUD-2411)
Summary: The "Go to Initial URL" option for successful login does not work on AOS 6x and AOS 8x Switches. It does work on APs.
Workaround: There is no workaround at this time.
External LDAP Server Requires Direct Connection (OVCLOUD-2832)
Summary: If you are using an external LDAP Server, you must have a direct connection to the server using a public IP address.
Workaround: NA - Informational.
Cannot Remove a BYOD/Guest Online Device From Device List on AOS 8x Switches (OVC-419)
Summary: User is unable to remove a device from the BYOD/Guest Online Device List using the "Kick Off" button.
Workaround:There is no workaround at this time.
Cannot Apply Policy List from RADIUS Attribute "Alcatel-Policy-List" in UPAM on AOS 6.x Switches (OVC-463)
Summary: On 6x Switches, if a RADIUS-based user authentication results in an Access Role Profile and a Policy List, the Policy List is not applied to the authenticated user.
Workaround: If you want to apply a Policy List to the authenticated user, you must configure the Policy List as part of the Access Role Profile itself in Unified Access, and rely only on the Access Role Profile in the RADIUS response.
Cannot Find Audit Logs in OmniVista Cirrus (OVC-456)
Summary: Access to Audit Logs is not available in the OmniVista Cirrus UI.
Workaround: Contact Customer Support to review Audit Logs.
Issues Fixed Since Release 1.0.1
- Device Added to Data Lake Is Not Added to Device Catalog Even Though "Call Home" Was Successful (OVC-146)
- VC of 2 OS6900-X20 Disappeared from the List of Managed Devices (OVC-147)
Online help is available in OmniVista Cirrus and can be access by clicking on the Help Link (?) in the upper-right corner of any screen. You can also search through the online help on the OmniVista Cirrus Home Page. An overview of OV Cirrus as well as Getting Started Guides for Freemium, Trial, and Paid Accounts is available here.