Skip to content

1.5 Cisco Integrations

Describe the integration between Cisco technologies, such as ThousandEyes, vManage Cisco Catalyst Manager, Webex Control Hub, Meraki, and Endpoint Agent deployment through Secure Client

Overview

ThousandEyes integration complements Cisco's network management capabilities, offering deeper insights into performance issues across various environments, from SD-WAN to cloud services.

The way in which ThousandEyes generally integrates with other Cisco technologies is by installing agents on them, usually an endpoint agent or an enterprise agent. In some cases, Cisco devices contain embedded license units to facilitate installation.

Describing these integrations helps you gain a solid foundation of the ThousandEyes platform and its role in enhancing network monitoring within the Cisco ecosystem. This knowledge is useful for those looking to leverage the full potential of their network monitoring solutions.

Cisco Catalyst SD-WAN Integration

Cisco Catalyst SD-WAN Manager (formerly vManage) is a centralized network management platform for SD-WAN deployments. ThousandEyes integration with vManage involves installing ThousandEyes Enterprise agents into Cisco SD-WAN devices and leveraging the ThousandEyes global network of cloud agents.

These Enterprise Agents are managed through the vManage console, allowing network administrators to deploy and configure ThousandEyes tests across the SD-WAN.

The way ThousandEyes Enterprise Agents are installed in vManage is described in the ThousandEyes documentation: Installing Enterprise Agents on Cisco Routers with vManage

This integration provides visibility into both internal network segments and external paths, including internet and cloud environments.

To review the supported Cisco routers and hardware requirements, see the Support Matrix.

Webex Control Hub Integration

Cisco's Webex Control Hub is the central interface to manage a Webex organization, add users, assign Webex services, view their usage analytics, and more.

Webex Control Hub Landing Page

Figure 1.5-1: Webex Control Hub Landing Page

When ThousandEyes integrates with Webex Control Hub, you get direct access to ThousandEyes path visualization data within Webex Control Hub in the Troubleshooting section, selecting a user and looking in Network Path.

Network Path after integrating ThousandEyes

Figure 1.5-2: Network Path after integrating ThousandEyes

The Network Path is pulled from ThousandEyes data and can show whether the network path quality is poor during specific sections of the meeting. It can show the hops that the user took to reach the Webex services, loss, latency, jitter, location, device name and device IP address of the end-to-end path and from each hop.

Detailed Network Path

Figure 1.5-3: Detailed Network Path

From Network Path, you can launch ThousandEyes Dashboard and get more details from the endpoint agent.

Launching ThousandEyes Dashboard from Network Path

Figure 1.5-4: Launching ThousandEyes Dashboard from Network Path

The information provided in Network Path helps network administrators identify root causes for negative participant experiences.

Besides Network Path, different observation points can be monitored with this integration since endpoint agents, enterprise agents and cloud agents can be used, therefore different tests can be configured. For example:

  • Webex Desktop Client can be monitored if an endpoint agent is installed on the computer (Mac or Windows)
  • RoomOS devices registered to Control Hub already have the Endpoint Agent units built into the firmware.
  • Performance of Webex Meetings can be monitored with Cloud and Enterprise Agents

Meraki

The integration between ThousandEyes and Meraki MX devices empowers distributed organizations to monitor external applications and services effectively.

This solution leverages the Meraki Insight (MI) feature which is designed to give Meraki customers an easy way to monitor the performance of web applications and WAN Links on their network and easily identify if any issues are likely caused by the network (LAN or WAN) or the application server. The data used by MI is based on end-user HTTP/S data that are already traversing the MX appliance and does not need synthetic probing.

With the ThousandEyes integration, customers can create customized network and application testing for critical applications inside or outside their infrastructure. For example, customers can monitor their internal DNS server response time and availability and measure the average resolution time for a specific domain.

Example of critical application that can be monitored

Figure 1.5-5: Example of critical applications that can be monitored

The ThousandEyes Agent is embedded in the MX architecture and does not require external hardware or out-of-band activation. It uses ThousandEyes Enterprise Agents deployed on the MX via Meraki Dashboard as the vantage point monitoring customers' data centers, cloud VPCs/VNETs, branch offices, and other internal or Internet-based network assets.

After the Enterprise Agent is deployed on the MX Appliance, it will register with the Meraki and ThousandEyes backend cloud to download all the test and management configurations using encrypted communication.

The ThousandEyes Test template feature uses predefined protocols, probing intervals, and alerts templates that simplify the monitoring configuration for the target applications. The Enterprise Agent behaves as a service inside the MX Appliance and uses the Appliance hardware and firmware as a base platform to perform the Agent monitoring tasks.

Example of monitored applications after ThousandEyes was integrated

Figure 1.5-6: Example of monitored applications after ThousandEyes was integrated

Cisco Secure Client

The ThousandEyes Endpoint Agent can be deployed as a module within the Cisco Secure Client bundle.

These Endpoint Agents can be deployed across devices that connect to the corporate network remotely, allowing them to monitor network conditions from the user's perspective, both before and after the VPN connection is established.

The Cisco Secure Client installer can be deployed using various methods, such as pre-deployment package, a web deployment package, or by loading it directly onto the headend (ASA Firewall, FTD, or ISE server). Additionally, deployment can be facilitated through SecureX and within an XDR environment.

Once an Endpoint Agent is active, it attempts to register with the ThousandEyes service using a secret key and a unique machine ID. Upon successful registration, the Endpoint Agent downloads the latest configuration. When the configuration is up-to-date, the data collection begins with browser-based data and periodic local network probes. The endpoint agent can then measure application performance with scheduled tests, automated session tests, browser sessions, or network access. All of the collected data and metrics are displayed in one expansive view.

Cisco Secure Access

You can think of Secure Access as your one-stop SASE provider for securing the end-user with multiple layers of defense. The ThousandEyes Endpoint Agent can also be registered with this platform in order to provide visibility of the end user perspective to the Security Service Edge (SSE).

Example of Cisco Secure Experience Insights powered by ThousandEyes Endpoint Agents

Figure 1.5-7: Cisco Secure Experience Insights

Instead of installing the Endpoint Agent as a standalone application, you can now enable it as a module for environments with existing Cisco Secure Client deployments. Keep in mind that only one of the installers can be used: either the ThousandEyes Endpoint Agent or the Endpoint Agent as a module in the Cisco Secure Client bundle, but not both.

The integration allows IT teams to monitor network performance directly from the endpoint, ensuring that remote users experience consistent connectivity and service quality.

By monitoring network performance on devices using Cisco Secure Client, IT can better diagnose issues related to remote connectivity, including VPN performance.

DNA

ThousandEyes integration with Cisco DNA Center involves the deployment of ThousandEyes Enterprise Agents throughout the network infrastructure managed by DNA Center.

These agents can be installed on Cisco Catalyst 9000 series, more specifically 9300 and 9400 switches.

The integration enables Cisco DNA Center to leverage the network performance monitoring and analytics capabilities of ThousandEyes, providing IT teams with extended visibility into the network.

Cisco DNA Center uses these agents to collect various types of telemetry data, including Internet and cloud performance metrics, and integrates this data into its assurance and analytics dashboard. This allows network operators to correlate internal network performance data gathered by DNA Center with external network data collected by ThousandEyes, creating a comprehensive view of network health and performance.

Other benefits that this integration provides are:

  • Enhanced Troubleshooting: Quickly identify and troubleshoot network issues that originate beyond the enterprise perimeter, such as ISP or cloud provider problems.
  • Proactive Monitoring: Proactively monitor user experience for cloud applications, allowing IT to anticipate performance degradation and resolve issues before users are affected.
  • Data-Driven Decision-Making: Leverage combined insights from DNA Center and ThousandEyes to make informed decisions regarding network and application performance improvements.

The integration process consists of installing an enterprise agent on a Catalyst 9000 Series switch using DNA center. In general, the process is as follows:

  1. Add a new Enterprise Agent and select Cisco Application Hosting tab to download the correct image for Catalyst 9000 switches. Copy the account group token.
  2. Log into the DNA Center and navigate to App Hosting for Switches. Use the "New Application" button to upload the Enterprise Agent image.
  3. Configure the application.

Example of Enterprise Agent in DNA Center

Figure 1.5-7: Example of Enterprise Agent in DNA Center

Summary

The tables below will help you remember concepts described before.

Table 1.5-1: Integration focus and objectives
Integration Primary Purpose or Focus
Cisco Catalyst SD-WAN Manager Network performance insights across the SD-WAN
Webex Control Hub Performance monitoring for Webex services
Meraki Monitoring external applications from SD-WAN sites
Cisco Secure Client Network performance data from user devices (VPN clients)
Cisco DNA End-to-end network visibility and analytics
Table 1.5-2: Agent types and pre-installation status
Integration Pre-installed Agent Units Type of Agent Used to Monitor
Cisco Catalyst SD-WAN Manager No Enterprise Agents
Webex Control Hub No Endpoint, Cloud, Enterprise Agent depending on the observation point.
Meraki Yes Enterprise Agents
Cisco Secure Client Yes Endpoint Agents
Cisco DNA Yes Enterprise Agents

Notes:

  • Cisco Catalyst SD-WAN Manager: ThousandEyes agents are not pre-installed; they must be deployed on the SD-WAN devices.
  • Webex Control Hub: Performance monitoring is done through Network Path, therefore there are no pre-installed agent units. Except for RoomOS devices that contain embedded Endpoint Agent units.
  • Meraki: Some Meraki MX models have support for ThousandEyes Enterprise Agents pre-installed, allowing for direct activation and use.
  • Cisco Secure Client: The Endpoint Agent component of ThousandEyes is integrated as a module within the Secure Client.
  • Cisco DNA: Select Cisco Catalyst 9000 series switches and other devices managed by DNA Center come with embedded ThousandEyes Enterprise Agent units.

Resources

Sample Questions

1.5 Question 1

What type of agent is typically installed on Cisco SD-WAN devices as part of the ThousandEyes integration with vManage?

  • A) Cloud Agent
  • B) Browser Agent
  • C) Enterprise Agent
  • D) Endpoint Agent

1.5 Question 2

What is the primary purpose of integrating ThousandEyes with Meraki?

  • A) To deploy Endpoint Agents for VPN connectivity monitoring
  • B) To monitor external applications and services from SD-WAN sites
  • C) To enhance cloud security and compliance
  • D) To manage user access policies and permissions

1.5 Question 3

What type of data does ThousandEyes use to diagnose when integrated with Cisco Secure Client?

  • A) Data related to network hardware configurations
  • B) Data related to user activity and behavior
  • C) Network performance data from the user's device
  • D) Data related to secure web gateway performance

1.5 Question 4

What advantage does the integration of ThousandEyes with Cisco technologies offer for troubleshooting?

  • A) It eliminates the need for manual data entry.
  • B) It provides real-time virtual assistance to end-users.
  • C) It automates network configuration changes based on user feedback.
  • D) It allows for quick identification and resolution of performance issues.

1.5 Question 5

The network team has deployed Webex RoomOS Endpoint Agents and integrated Webex Control Hub with ThousandEyes. The VoIP team wants to know which metrics they can collect from the Webex Control Hub view. Where does the VoIP team find the network data?

  • A) Devices
  • B) Network Path
  • C) Users
  • D) Settings