Vous êtes sur la page 1sur 46

Lab Guide

Lab Guide

Cisco Remote and Mobile Asset (Kinetic


GMM + Industrial Router) Lab v2

Created in Partnership with IOT Technical Marketing Engineer Team.


Last Updated: 24-February-2020

About This Demonstration


This guide for the preconfigured lab includes:

About This Demonstration

About This Lab

Limitations

Requirements

About This Solution

Topology

Get Started

Scenario 1. Get Your Account Ready

Scenario 2. GMM Getting Started

Scenario 3. Gateway Configuration

Scenario 4. Gateway Deployment

Scenario 5. Application Deployment

Scenario 6. Gateway Administration

Scenario 7. Gateway Diagnostics

Appendix A. Resend Email

Appendix B. Reset Password

© 2020 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 46
Lab Guide
Lab Guide

About This Lab


This is a lab that allows the user to access a temporary Kinetic organization with an admin privilege account. Using
this admin account, the lab user can now perform admin privilege tasks such as building templates and deploying
gateways.

Limitations
The Kinetic organization in this lab will be permanently deleted after the dCloud session is ended.

This lab is the companion to the Cisco Remote and Mobile Asset (Kinetic GMM + Industrial Router) Demo v2 -
Instant Demo. Unlike the instant demo which offers a quick way do demo as read-only, this lab is designed to
allow the user to interact with the Kinetic GMM portal with full admin privileges.

This lab does not have preconfigured real cellular gateways with GPS data as is available in the demo version.
Users must provide their own real gateways or use dummy gateways which have limited demo capability.

This lab focuses on how to use GMM to manage the IoT gateways, such as IR829/IR809/IR807/IR1101.

Requirements
The table below outlines the requirements for this preconfigured lab.

Requirements

Required Optional

Laptop with Chrome Browser Cisco AnyConnect®

© 2020 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 2 of 46
Lab Guide
Lab Guide

About This Solution


The Cisco Remote and Mobile Assets (RaMA) offering is the combination of Cisco Industrial Routers (IRs) and
Cisco Kinetic Gateway Management Module (GMM) to provide a powerful solution and value for customers. With
the combination of these products it is possible to easily and securely connect Remote and Mobile Assets.

Remote Assets
Valuable or critical equipment remotely located in an isolated or unsupervised area:

• Example: diesel generator, speed camera, sea buoy, wind turbine, ATM, GSM, cell site, traffic cabinet, pipeline,
military equipment, etc.

Mobile Assets
Valuable or critical equipment on the move:

• Example: truck, car, construction machine, container, lab equipment, boat, public safety vehicle, public transit,
service fleet, etc.

Cisco Kinetic
Cisco Kinetic is an IoT data fabric—a distributed system of software designed specifically to extract, compute,
and move data from the things that make up the Internet of Things (IoT) to the various applications where it can
provide value.

The core Cisco Kinetic platform includes three software modules that provide the functionality customers need to
extract, compute, and move data to achieve desired business outcomes.

• Gateway Management Module


• Edge & Fog Processing Module
• Data Control Module

© 2020 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 3 of 46
Lab Guide
Lab Guide

The Gateway Management Module (GMM) is a cloud-based management platform that provides GUI configuration,
zero touch deployment, and a centralized management console for the Cisco Industrial IoT gateways
(IR807/IR809/IR829). With GMM, gateways can be configured and brought online in minutes. Administrative tasks
are reduced to a few clicks.

• Graphical and Intuitive configuration

• Zero-touch or near zero-touch gateway deployment


• Simple at a glance monitor and management of gateway
• Configuration management

• Alerts and reports


• Diagnostics and troubleshooting tools
This lab focuses on the use of Kinetic GMM. For the other Cisco Kinetic components, DCM and EFM, please visit
dCloud and search for those demos in the Catalog.

Cisco Industrial Routers

© 2020 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 4 of 46
Lab Guide
Lab Guide

Topology
A typical RaMA deployment has an IR807/809/829/1101 gateway at a remote location. The gateway provides
secure IPSEC connectivity to corporate resources as well as Internet connectivity using LTE or Gigabit Ethernet.
Remote devices can connect to the gateway as Serial, Gigabit Ethernet, or WiFi. The gateway connects to Kinetic
via a separate IPSEC connection. Kinetic GMM provides management of the gateway through a Management
Console.

RaMA Deployment

dCloud Topology

Equipment Details

Name Description Host Name (FQDN) IP Address Username Password

AD/DNS/ADFS Active Directory, DNS, AD FS ad1.dcloud.cisco.com 198.18.133.1 administrator C1sco12345

Microsoft Microsoft Exchange 2010 mail1.dcloud.cisco.com 198.18.133.2 administrator C1sco12345


Exchange

Kinetic-wkst Windows 7 Kinetic- 198.18.33.36 dcloud\cholland C1sco12345


wkst.dcloud.cisco.com

© 2020 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 5 of 46
Lab Guide
Lab Guide

Get Started

Follow these steps to schedule a session of the content and configure your presentation environment.

1. Initiate your dCloud session. [Show Me How]

NOTE: It may take up to 30 minutes for your session to become active. Please schedule your demo as early as
possible.

2. Choose one of two methods to access the lab:

• Lab Access Option 1: Click the Remote Desktop to access the workstation by WebRDP client

• Lab Access Option 2: Connect to the workstation with Cisco AnyConnect VPN [Show Me How] and the
local RDP client on your laptop [Show Me How]
Kinetic-wkst: 198.18.133.36, Username: dcloud\cholland, Password: C1sco12345

© 2020 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 6 of 46
Lab Guide
Lab Guide

Scenario 1. Get Your Account Ready

STORYLINE:
dCloud will create a dedicated Kinetic organization for the user and add the user as administrator. Users need to
access the Kinetic with the a dcloud email account which is configured in the session.

The Demo Automation Flow diagram shows the demo automation flow overview. Make sure you follow the proper
process to initialize your demo account.

NOTE: There is only a finite number of dCloud email accounts for this lab and they are assigned to users randomly.
That is why the user will receive different types of emails.

Demo Automation Flow

Steps
1. Log in to the kinetic-wkst with Remote Desktop, either with WebRDP or RDP client after VPN.

2. Launch Outlook client by clicking at the bottom of the screen.

© 2020 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 7 of 46
Lab Guide
Lab Guide

3. Enter Charles Holland for the profile name and then click OK.

4. Once Outlook launches, a new email was received in this demo account cholland@kineticXXX.dc-XX.com
5. Once the Outlook initialization is done, check if there is a new email in the inbox.
6. Please follow Appendix A to request Kinetic resending the email if the inbox is empty.

7. There are two different types of email notification that may receive such as these examples. Follow the
corresponding instructions to access your Kinetic organization based on the email type received.

Email Screenshot Remark Steps


Type

A This email account was registered to Type A: Step 1 - 9


Kinetic for the first time.
User needs to set the initial credential
for this account.

B This email account was registered to Type B: Step 1 - 5


Kinetic before, but it was assigned to
this new demo organization as
administrator.
User doesn’t need to set the initial
credential for this account.

© 2020 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 8 of 46
Lab Guide
Lab Guide

Email Type A
1. An email Cisco Kinetic Confirmation Instructions was received in this mailbox.

2. Click the email from Kinetic to view. Click Confirm in the email to complete the registration of your dCloud
generated demo organization. Note the name of your dCloud generated organization name is the combination
of dCloud DC + Username + dCloud Session ID. In the email below the name is sjc-jiewei-154366.

3. Clicking Confirm will take you to Kinetic portal to create your own password for the demo account. Be aware
that your password needs to meet the requirement.
4. Click the check box to accept terms, and then click Accept.

NOTE: Zoom out your browser if you cannot see the Terms pop-up.

© 2020 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 9 of 46
Lab Guide
Lab Guide

5. You are now logged into the dCloud generated demo organization. Note the name of the organization in the
upper-left corner. See the example below.

6. This organization will be used in the demo and will be referenced as dCloud generated demo organization.
7. To see your dCloud generated user ID, click Admin > Users. Note that the user has admin privilege.

8. You can now proceed to Scenario 2.

Email Type B
1. An email from Cisco Kinetic was received in this mailbox.

2. Open the Chrome browser on the desktop and be redirected to the Cisco Kinetic homepage.
3. Follow Appendix B to reset the password to your own password.
4. After resetting your password, you are now able to log into the dCloud generated demo organization. Note the
name of the organization in the upper-left corner. See the example below.

5. This organization will be used in the demo and will be referenced as dCloud generated demo organization.
6. To see your dCloud generated user ID, click Admin > Users. Note that the user has admin privilege.

© 2020 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 10 of 46
Lab Guide
Lab Guide

Scenario 2. GMM Getting Started

STORYLINE:
Jesse is the Operations Manager for Department of Transportations of a city. His challenge is to maintain safe
driving conditions for a city prone to icy conditions in the winter. To battle the icy roads and snow, Jesse manages
a fleet of 200 snow plows and salt trucks. To optimize the use of his fleet, he needs a solution that gives him
visibility to road conditions as well as his fleet.

A solution is offered to deploy Road Side Units (RSU) that monitor vehicle Dedicated Short-Range
Communications (DSRC) and provide feedback on the road and driving conditions. When Loss of Traction DSRC
messages are detected from multiple vehicles, an alert is sent to the Traffic Management Center (TMC) where the
traffic operations personnel receive the alert and view the camera. Based on what the operator sees, they can
determine whether to dispatch the nearest salt truck or snow plow.

Cisco Remote and Mobile Assets (RaMA) solution is able to meet the requirements by providing:

• Easy GUI based configuration of the gateway (see Scenario 3)


• Simple Zero/Low-Touch Deployment (see Scenario 4)
• High-speed connectivity LTE to the RSU

• Reliable connectivity with Dual LTE for the fleet


• Low power consumption and ignition sense for the fleet
• Wi-Fi Hotspot that allows for Wi-Fi connection for service crew and mobile devices

• Site-to-Site VPN to allow secure connection to enterprise resources


• GPS tracking of service vehicle locations

Connections of RSU and Salt Truck

Road Side Unit Salt Truck

With RaMA, the solution can be quickly configured and deployed.

© 2020 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 11 of 46
Lab Guide
Lab Guide

Steps
1. After successful login, the landing page is the new organization that was just created as we see here:

2. Navigate the UI. The UI has a Navigation Panel on the left that separates the Kinetic functions:

• Dashboard – organization overview, maps of gateway locations, and cellular data usage

• Gateway – gateway configuration and management actions

• Asset – asset Inventory

• Application – manage fog application and fog application functions

• Data – data control related functions - used for Kinetic Data Control Module (DCM)

• Admin – organizational administrative functions

• Tools – reports, alerts and other GMM tools

3. Help, online documentation, and support is available through the Help button [ ] in the upper-right corner.

© 2020 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 12 of 46
Lab Guide
Lab Guide

NOTE: Contact Us, is for general questions about GMM. However, if you run into an issue, you will need to “Open A
TAC Case”

4. To contact Kinetic directly for general technical support requests, click Contact Us.

NOTE: You will get support from the Cisco Kinetic Support team, not the dCloud Support team. For dCloud support,
please log in to dCloud, and then click Support on the menu.

© 2020 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 13 of 46
Lab Guide
Lab Guide

Scenario 3. Gateway Configuration

STORYLINE:
The first task for Jesse’s team is to bring a gateway into service. They need to build a configuration template that
can be applied to the gateway during the onboarding (claiming) process.

One of the key features of GMM is the simplification of gateway configuration and deployment. Without the need for
any Cisco IOS knowledge, Jesse’s team can easily and quickly configure the gateway’s graphical template.
Complex gateway configurations such as WGB and site-to-site VPN can be configured with a few clicks using the
GMM gateway configuration template.

Steps
1. Create a gateway configuration template. From the Navigation Panel, select Gateway, Templates, and then
click + Add Template.

2. Complete the template as shown below. Input any value for the Site-to-Site VPN Pre-shared Key. The site-to-
site VPN configuration is just for example (the tunnel won’t be up). If you have a site-to-site VPN head end
router such as an ISR or ASR, use the link below to configure your VPN head end router.

https://developer.cisco.com/docs/kinetic/#!network-settings/vpn

NOTE: In the screenshot below, the Site-To-Site VPN Router #1 IP address is an example. Input any value for the
Pre-shared Key #1.

© 2020 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 14 of 46
Lab Guide
Lab Guide

3. Click Save.

Note the simplicity to configure a Cisco IR807/IR809/IR829/IR1101 gateway. What previously took many lines
of CLI commands and in-depth knowledge of IOS has been reduced to an intuitive GUI template.

For details on the configuration, see the following documentation:


https://developer.cisco.com/docs/kinetic/#!network-settings

© 2020 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 15 of 46
Lab Guide
Lab Guide

4. Repeat steps 2 and 3 to create another two gateway templates for RSU and Snow Plow. Please pay attention
that choosing IR809 for RSU as below:

5. Now there are three different gateways templates created.

© 2020 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 16 of 46
Lab Guide
Lab Guide

Scenario 4. Gateway Deployment

STORYLINE:
After configuration templates are created, Jesse’s team needs an easy way to provision the gateways.

GMM offers a zero/low touch deployment method. What this means for Jesse is little or no staging and a reduction
in delays and costs. For gateways on public cellular APN or a LAN with connectivity to Kinetic, deploying a gateway
is as simple as claiming the gateway on the Kinetic Console and then selecting a configuration template.

Optionally, a Claim Policy can be created. Installation techs can use a mobile policy (iOS or Android based) to
onboard the gateway by scanning in the serial number of the gateway.

The gateway can be deployed from the Kinetic UI or by using a smartphone app (Android and iOS). The first section
will walk through using the Kinetic UI. The later section is informational only, and we will walk through using a
smartphone app. The smartphone app is designed for ease of deployment by a field tech or OT team. By scanning
the serial number of the device, the app will allow the onsite operator to deploy a gateway. See the Requirements
section to install the application.

For gateways with private cellular APN, there are options for Ethernet provisioning to set the cellular APN value or to
use our GPT tool.

https://developer.cisco.com/docs/kinetic/#!provision-a-gateway-cisco-gpt

https://developer.cisco.com/docs/kinetic/#!gmm-deployment-guide/cellular-network-options

Creating Custom Fields (Labels)


Custom fields can be created to further simplify the deployment process. These custom fields can be used to label
gateways for specific functions and associate the gateway to a desired configuration. There are five user
configurable custom fields that can be created. Inside these custom fields, labels can be created.

Note: Custom Fields are also inherited from the parent organization.

1. From the Navigation Panel, select Gateway > Custom Fields, and then click customer 1.

2. Enter Asset Type for Label and select Dropdown for Field Type.

© 2020 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 17 of 46
Lab Guide
Lab Guide

3. Add three asset types as show below (Road Side Unit, Snow Plow, Salt Truck) by clicking the .

4. Enable the Field by toggling the Enable/Disable button.

5. Click Save.

Creating a Claim Policy


Claim policy simplifies the deployment process and keeps deployments consistent to a policy. The policy will define
the template and other parameters that a gateway inherits based on its custom field (label) classification. For
example, a separate policy can be created for a salt truck that is different from a road side unit.

1. Navigate to the Claim Policy page. From the Navigation Panel, select Gateway → Claim Policies and then click

Add Claim Policy


2. Configure the Policy. Enter a Name for the Policy: Device Type.

3. Expand the drop-down, and then select your Custom Field: Asset Type.

4. Select a Value from the Custom Field and tie it to a configuration template. Example: Road Side Unit → rsu.

5. Select to add another asset.

6. Select a different value from the drop-down and tie it to a different configuration template. Example: Salt Truck
→ salt truck

7. Click Save.

© 2020 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 18 of 46
Lab Guide
Lab Guide

8. Click Activate to active the policy.

Claim a Gateway

Steps for using Kinetic UI


1. Navigate to the Gateways page.
2. From the Navigation Panel, select Gateway > Gateways to see gateway summary views and actions. At top
select the Monitor tab.

3. To deploy a gateway, Kinetic uses the term Claim. Claiming a gateway configures the gateway from Kinetic
using a specified configuration template to make the gateway operational. Kinetic gateways not yet claimed will
have a minimum base configuration that periodically calls home to Kinetic for instructions.

NOTE: Each organization is assigned two dummy gateways for each gateway model. We use them for demo
purposes in this lab.

NOTE: You can also claim a physical hardware gateway in this lab as well if you have a gateway ready for claim.
Refer to the Kinetic documentation for more details: https://developer.cisco.com/docs/kinetic/#!claim-gateways

4. To claim a Gateway, click + Claim Gateways.

© 2020 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 19 of 46
Lab Guide
Lab Guide

5. Enter the following for Serial Number (input the actual hardware serial number if you are claiming the hardware
gateway). In this lab, we should input the below format to claim the dummy gateways:
gateway-ir829-OrgID-1 (Replace OrgID with your organization ID; for example: gateway-ir829-9999-1)

6. In the drop-down, select the Model as IR829 and then select Salt Truck as the Asset Type.
7. Enter your current address or any address. This is the location for which the gateway will appear on the MAP if
GPS is not selected. This will be the case for gateways that are stationary or not in a location where they can
receive GPS signal such as indoors. Click Next.

8. Click Saved Templates, and the Salt Truck template was selected by default because we choose the Asset
Type in the previous step. Click Next.

9. In the Fog & Device section, leave it blank and then click Next.

© 2020 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 20 of 46
Lab Guide
Lab Guide

NOTE: During the claim process, the user has an option to also install an IOT Fog application and IOT devices to all
gateways being claimed. For this lab, we assume a GMM deployment without any IOT application or IOT devices.

NOTE: If desired, a Fog application can be installed at a later time from the Applications menu.

9. Review and then click Submit to confirm.

10. The gateway will be active in few seconds. Verify the gateway is Up.
11. Click Name the Gateway, enter a unique name Salt Truck 1 for the gateway, and then click Save to save your
changes.

© 2020 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 21 of 46
Lab Guide
Lab Guide

12. Repeat Step 1 – 11 to claim another 2 gateways for Snow Plow and Road Side Unit. Make sure you changed
the parameters accordingly. The final gateways list would look something like this:

Steps for using Mobile App – Informational Only


Cisco provides a mobile app to help you onboarding your gateway to Kinetic easily. It support both iOS and the
Android platform. Visit the App Store or Google Play to download the application, then follow the steps to onboard
your own hardware gateways.

1. From your smartphone launch the application.

© 2020 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 22 of 46
Lab Guide
Lab Guide

2. Select Cluster, login and select the organization to deploy the gateway.

3. Scan the barcode.

4. Select either Quick or Advance Claim.

5. If Advanced claim is selected, go to step 9.

© 2020 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 23 of 46
Lab Guide
Lab Guide

6. Quick Claim (Claim Policy).

7. Quick Claim uses the attributes from the claim policy created above to quickly onboard the gateway.

8. Skip step 9 and 10 below.


9. Advance Claim.

10. Walk through the advance template to claim the gateway. The steps are similar to claiming from the UI.

© 2020 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 24 of 46
Lab Guide
Lab Guide

Scenario 5. Application Deployment

STORYLINE:
Once the gateways have been claimed, Jesse’s team might have to install certain IoT Applications on them. These
applications can be small software packages running at the edge.

GMM offers an option to install applications on gateway(s), similar to what was done in claiming the gateways. What
this means for Jesse is little or no staging and a reduction in delays and costs. Applications can be installed on
gateway(s) using a template and deployment policy which is keyed off the labels (Custom Fields), such as Asset
Type, that we have already created in previous steps. Applications will automatically be pushed down to the
gateway and configured as defined in the application template and deployment policies.

Steps

Obtain and Upload Application to Kinetic


1. For the purpose of this lab, download a sample application. A sample application is available at this link:
https://developer.cisco.com/docs/kinetic/#!install-the-efm-broker/option-2-install-efm-on-a-gateway

2. Click Download the Cisco Kinetic GMM compatible EFM app on that page.

3. Save the file to a location on your computer.

4. From Navigation Panel select Applications.

5. Under Application, Jesse is able to add new applications and then define Templates and Deployment policies.
On this page, click to Add a new application to GMM.

6. Downloaded edge application can be uploaded on the pop-up window that shows up.

7. Select EFM161_IR8x9_v1.tar.gz from your folder where you stored the file.

8. Click Import.

9. The process will take 1-2 minutes. Wait until it has been completed.

© 2020 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 25 of 46
Lab Guide
Lab Guide

10. Verify the application after it was successfully uploaded.

Creating Application Templates

NOTE: Kinetic now offers Application Templates, where all application parameters and resource requirements are
defined. This section shows how to create a new application template.

1. Let’s create a new Application Template. From the Navigation Panel, go to Application and select Application

Templates under it.

2. On this page, click to add a new Application Template.

3. Fill in all the details and give a name to the new Template.

© 2020 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 26 of 46
Lab Guide
Lab Guide

4. Click Save.

5. The new Application Template would look like this:

© 2020 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 27 of 46
Lab Guide
Lab Guide

Creating Deployment Policies

NOTE: Kinetic now offers policy-based deployment of applications on all gateways. In our lab, Asset Type label is
used to define the policy. Thus, any gateway which is tagged with the value of the Asset Type in this policy will
automatically get the application deployed on it. This section shows how to create Deployment Policies.

1. Finally let’s create a new Deployment Policy. From the Navigation Panel, go to Application and select

Deployment Policies under it.

2. On this page, click to Add a new Deployment Policy.

3. Fill in all the details and give a name to the new Policy.

4. Click on Preview and the policy gets defined and becomes active.

5. Once a Deployment Policy has been created, the application will automatically be deployed to gateways that
match the policy, and support the properties defined by the associated application template.

© 2020 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 28 of 46
Lab Guide
Lab Guide

Scenario 6. Gateway Administration

STORYLINE:
Now that the gateways are deployed and operational, GMM provides powerful and convenient tools to enable bulk
management of gateways. This scenario demonstrates how Jesse can easily manage his gateways.

Steps

NOTE: Some of the features listed in this scenario are available for the real hardware gateways only.

Organizational Gateway View


1. From the Navigation Panel, select Dashboard.

2. On the Dashboard, Jesse is able to see a quick summary of the gateways and application health as well as
track the location of each gateway. There are now at least three gateways.

3. The Dashboard Map shows the geographical and status of gateways. Here, Jesse can track each of his assets.

4. To adjust the zoom, click the size adjustment icon [ ] on the lower-right corner of the map to get desired
view.

© 2020 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 29 of 46
Lab Guide
Lab Guide

5. Click on a gateway to get its specific details.

6. Click the drop-down on the map and then select Snow Plow 1 to zoom in.

7. There is no data for GPS History, but if you claimed a hardware gateway with GPS enabled, you will be able to
view the gateway GPS history on the map. Below screenshot is an example.

© 2020 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 30 of 46
Lab Guide
Lab Guide

8. Organizational cellular data usage for all gateways is displayed in the bottom section. This provides a summary
view of data usage for an organization, which is useful for organizations with a set data plan. There is no data
for the dummy gateways. The below screenshot is an example if you have hardware gateways with Cellular
connection enabled.

Gateway Summary View


In addition to the organizational view, gateway details can be viewed from the Gateway tab. At a glance, we can
see gateway health and information such as name, status, model, and the configuration template used.

To see the gateways that are in an organization, go to the Gateway tab.

1. The Gateway summary view shows all gateways in an organization and allows for quick management of
gateways at a glance.

2. From the Navigation Panel, select Gateway > Gateways.

3. On this page, you have two options to choose from, the Summary tab and the Monitor tab.

© 2020 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 31 of 46
Lab Guide
Lab Guide

4. Under the Summary tab, you can view the combined gateway status, along with details such as Temperature
and Signal Strength.

5. Under the Monitor tab, you can view the list of all gateways, with more details about each one.

To aid with bulk gateway management, custom fields are a flexible labeling tool to organize and group
gateways for management tasks, as well as for data routing in DCM.

© 2020 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 32 of 46
Lab Guide
Lab Guide

6. From the Navigation Panel, select Gateway > Custom Fields. Click customer1. Note that an Asset Type custom
field has been created with three labels: Snow Plow, Road Side Unit, and Salt Track.

The gateways have been labeled with the appropriate fields.

7. Close the previous page and go back to the gateway list. Click the below icon to enable the custom field to be
shown in the gateway list.

8. Using Search

When managing a large number of gateways, the search capability is a useful tool to locate a specific gateway
or group of gateways.

From the Navigation Panel, select Gateway > Gateways. At top select the Monitor tab.

To search for gateways with the asset type label Snow Plow, type snow in the search field and hit Enter.

The search also keys to name, serial number, model, and other attributes in the gateway’s summary details
such as software version, cellular information, and so on.

© 2020 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 33 of 46
Lab Guide
Lab Guide

9. Gateway Actions

Gateway actions can be applied to one or many gateways at the same time by selecting one or many gateways.
These actions require admin privileges. This step is informational only.

Actions buttons are as follows:

• Networking – Select/change configuration template, configure custom template configurations


• Grouping – Group gateways based on custom fields
• VPN – Information and credentials to remote VPN down to a gateway, or to devices connected to the
gateway
• Delete – Unclaim a gateway from the organization

Gateway Detail View


Gateway details are viewed by clicking on the gateway.

1. Summary

Select the gateway Road Side Unit 1 to see details for the gateway. Summary is the default menu.

© 2020 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 34 of 46
Lab Guide
Lab Guide

2. Cellular Monitor

The Monitor tab provides cellular usage and signal strength. The data is collected on 30-minute poll intervals.
Below screenshot is an example for a hardware gateways with cellular connection enabled.

3. Current Config

This tab provides details on what is currently configured for the gateway. There is no need to scan through
pages of CLI configurations to see what is configured.

If a gateway configuration is recently pushed but not yet applied to the gateway, that information will be shown
on this page with the status configuring.

© 2020 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 35 of 46
Lab Guide
Lab Guide

4. Apps

The gateway Apps tab provides information on applications currently running on the gateway. This screenshot
is an example for a hardware gateway with IOX application was installed.

5. Devices

The Devices tab shows which IOT devices are configured for the gateway. This field could be used by
applications since the information for the device is pushed down when the application is installed. The
application may use this information to communicate to the device.

The Discover Device feature is used to find the device based on the DHCP binding table.

NOTE: There is no Device connected to the dummy gateway. The below screenshot is an example hardware
gateway with an IP camera connected.

To see the MAC and IP details for the camera, click the Device tab and then choose Camera.

NOTE: The IP Address of the camera may be different from the screenshot below because the device uses DHCP.

6. Event Logs

The Event Log tab is a useful tool for viewing gateway activity. From here we can see useful information such
as when a gateway rebooted, lost connectivity to Kinetic, or if a configuration was changed, claimed, deleted,
etc.

© 2020 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 36 of 46
Lab Guide
Lab Guide

Click the date range to select a range. Select a range from one week back.

To select the date range, click the Date field and then confirm by clicking OK.

Events can be further defined by selecting the event type. To select a type, click Search by Event Type.

© 2020 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 37 of 46
Lab Guide
Lab Guide

Scenario 7. Gateway Diagnostics

STORYLINE:
All the gateways are distributed in the field. An efficient way of troubleshooting and diagnostics is critical for
Jesse’s team. GMM offers several ways for them to perform diagnostics and troubleshooting for the gateway.

The Gateway Diagnostic Tab on the Kinetic UI makes it convenient to get diagnostic information from one location
on the gateway without the need to log directly into the gateway. A user can also directly log into the gateway from
the console or by using the remote access feature as operator. The gateway presents a user-friendly diagnostic
menu.

NOTE: The hands-on lab was completed by Scenario 6 if you did not claim a hardware gateway. Scenario 7 can be
performed on hardware gateways only. Otherwise Scenario 7 is informational only.

You can practice it in the Kinetic Remote & Mobile Asset (Kinetic GMM + Industrial Router) Demo v1 – Instant
Demo instead.

Steps

Diagnostics from UI
1. From the Navigation Panel, select Gateway > Gateways.

2. Select the RSU gateway to see details for the gateway.


3. Click the Diagnostics tab.

4. The Connectivity with Kinetic allows for verification of connection to the gateway or guest OS from Kinetic.
Since Kinetic polls status every 30 minutes, this is useful to get the current status.

Click the Connectivity to Kinetic [ ] and then choose either Gateway or App Infra.

© 2020 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 38 of 46
Lab Guide
Lab Guide

5. The Test Network allows for ping and traceroute from the gateway.
A good use case for Test Network is to verify connectivity to a local device connected to the router. The
diagnostic can show if the device is up and communicating to the network.

If deployed a hardware gateway and connected a local IOT device, you can find the IP address under the
Devices menu and ping that IP address according.

Click the Test Network button [ ] and then click Ping. Enter the IP address and then click Run.

© 2020 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 39 of 46
Lab Guide
Lab Guide

6. The Show Commands button executes a list of useful show commands. Currently it is show interface brief
and show IP route.

Click Show Commands [ ], and then click Run.

J#

As this is a shared demo, we will not enable the debugs or clear logs.

To view logs on the gateway, click Retrieve Logs.

Diagnostics from gateway


A diagnostic menu on the gateway is available. It can be accessed either by directly connecting to the console or
by SSH to the gateway via Remote Access. The menu is simple to use and does not require knowledge of IOS.

For example, the tool can be used by the operator to find information about cellular connectivity or VPN status.

NOTE: Since there is no direct console access to the gateway, we will use SSH to log in to the gateway.

Before a gateway was claimed to Kinetic GMM, there was a default credential configured for the operator:

• Username: operator
• Password: operator

After a gateway has been claimed by Kinetic, a random password is generated and displayed on the gateway
Detail: Summary page.

© 2020 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 40 of 46
Lab Guide
Lab Guide

In this demo, the below gateway’s credential has been updated to Road Side Unit 1:

• Username: operator
• Password: oper_xxxxxxx (Not a valid credential, your hardware gateway’s credential is different.)

Remote Access:

NOTE: The VPN credential is an example. Use your own credentials once your hardware gateway is claimed.

1. The Remote Access feature allows the administrator to remotely access the gateway through VPN. The
administrator can view the VPN credential by clicking the VPN button below:

© 2020 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 41 of 46
Lab Guide
Lab Guide

2. A pop-up window shows the VPN credential:

The demo account here is not an admin role, so you cannot view the VPN credentials in the UI. Use the credential
below for the VPN connection:

• Remote Access Server: rar0-us.ciscokinetic.io

• Username: jdkf-fefz-hxew-nrjx

• Password: xxxxxxxxxxxxxx

• Gateway IP Address: 10.8.149.65

3. Users can use Cisco AnyConnect VPN [Show Me How] client to establish the VPN connection. Once the VPN
is up, you can access the router by SSH. The below CLI is an example to access from MAC terminal but you
can also use another SSH client as well. Just make sure you log in with the correct operator credential:

• Username: operator

• Password: oper_xxxxxxxxx

ssh -l operator 10.8.149.65


Password: oper_xxxxxx

4. After successful login, you will see the Kinetic Diagnostics menu. You can now run diagnostics by selecting
from the menu.

5. Users can reach the IP address of any devices that are connected to the gateway as well.

© 2020 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 42 of 46
Lab Guide
Lab Guide

Appendix A. Resend Email

Steps
1. Open the Chrome browser on the desktop. You will land on the Cisco Kinetic login page.
2. Click I forgot my password. In the pop-up window, click Didn’t receive confirmation instructions?

3. In the next window, input your email address which is cholland@kineticXXX.dc-XX.com

4. Click Submit and then check the email inbox in about three minutes, go back to Scenario 1 to continue your
lab.

© 2020 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 43 of 46
Lab Guide
Lab Guide

Appendix B. Reset Password

Steps
1. Open the Chrome browser on the desktop. You will land on the Cisco Kinetic login page.
2. Enter the Email ID generated for this session, and then click Next.

3. Next screen will ask you for a Password. Instead, click the I forgot my password option.

4. In the next window, input your email address which is cholland@kineticXXX.dc-XX.com

5. Click Submit and then check the email inbox in about three minutes.

© 2020 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 44 of 46
Lab Guide
Lab Guide

6. An email from Cisco Kinetic was received in this mailbox.

7. Click Reset my Cisco Kinetic account in the email, and then input your own new password in the reset page in
browser. Pay attention that your password must meet the requirements.

8. Click the check box to accept terms and then click Accept.

NOTE: Zoom out your browser if you can’t see it.

9. You are now logged into the dCloud generated demo organization. Note the name of the organization in the
upper left-hand corner. See the example below.

10. This organization will be used in the demo and will be referenced as dCloud generated demo organization.
11. To see your dCloud generated user ID, click Admin > Users. Note that the user has admin privilege.

12. You can now proceed with Scenario 2.

© 2020 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 45 of 46
Lab Guide
Lab Guide

What’s Next?
Learn more! Check out the Remote and Mobile Assets Design and Implementation Guide on Cisco.com:
https://www.cisco.com/c/en/us/td/docs/solutions/Verticals/RaMA/RaMA-DIG/RaMA-DIG.html

© 2020 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 46 of 46

Vous aimerez peut-être aussi