25-88
Cisco Prime Network 4.0 User Guide
OL-29343-01
Chapter 25 Monitoring Mobile Technologies
LTE Networks
Step 1 Right-click the required device in Prime Network Vision and choose Inventory.
Step 2 In the logical inventory window, choose Logical
Inventory > Context > Security Association > EAP Profile. The list of profiles are displayed in the
content pane.
Step 3 In the EAP Profile node, choose the profile. The profile details are displayed in the content pane.
Table 25-53 displays the EAP Profile details.
Viewing the Transform Set Details
To view the Transform Set details for IKEv2 IPSec/IKEv2:
Step 1 Right-click the required device in Prime Network Vision and choose Inventory.
Step 2 In the logical inventory window, choose Logical
Inventory > Context > Security Association > Transform Set > IKEv2 IPSec Transform Set or
IKEv2 Transform set. The list of profiles are displayed in the content pane.
Step 3 In the IKEv2 IPSec Transform Set or IKEv2 Transform set node, choose the transform set. The
relevant details are displayed in the content pane.
Table 25-54 displays the IKEv2 IPSec Transform set or IKEv2 Transform set details.
Table 25-53 EAP Profile Details
Field Description
Name The unique name of the EAP Profile.
Mode The operative mode of the EAP profile, which can be any one of the
following:
Authenticator Pass Through—Indicates that the EAP Authentication
Requests must be passed to an external EAP Server.
Authenticator Terminate—Indicates that the EAP must act as an EAP
Authentication Server.
Authentication Method The EAP Authentication method to be used for the profile, which can be any
one of the following:
If the Mode is Authenticator Pass Through:
eap-aka
eap-gtc
eap-md5
eap-sim
eap-tls
If the Mode is Authenticator Terminate:
eap-gtc
eap-md5