11-10-2019 10:24 AM - edited 11-10-2019 10:25 AM
Cisco Digital Network Architecture Center Modules
(Design Module)Part.2
Cisco DNA Center gives us the flexibility and availability to configure multiple fabric sites and manage all of them through DNAC (Centralization Point).
https://www.linkedin.com/pulse/cisco-digital-network-architecture-center-modules-design-alhenawy/
The Device credentials are used to log in to the CLI of the devices in your network, Also Snmp Credentials, Https Credentials.
Configure Global CLI Credentials:
Design ----> Network Setting ----> Devices Credentials ----> Click Add ----> Write Name or description ----> Username to login CLI of the Network Devices ----> Password for the username of the CLI ----> Enable Password ----> SAVE.
Design--- > Network Setting --- > Devices Credentials --- > SNMP read--- > Click Add --- > Write Name or description--- > read community string password [to read only the information of the network device] --- > SAVE.
Design--- > Network Setting --- > Devices Credentials--- > SNMP Write--- > Click Add --- > Write Name or description--- > Write community string password [ to make the change on the network device ]---- > SAVE.
Design ---> Network Setting --->Devices Credentials--->HTTPs read --->Click Add---> Write Name or description --->Username of Https Auth ---> Password of Https Auth---> Port Number by default is 443--->SAVE.
Design ---> Network Setting --->Devices Credentials--->HTTPs Write--->Click Add --->Write Name or description --->Username of Https Auth--->Password of Https Auth--->Port Number by default is 443--->SAVE.
*** I hope that has been informative for you and thank you ***
Mohamed Alhenawy
CCIE#60453
*** I hope that has been informative for you and thank you ***
not really, this doesn't answer
Oh , Long time @Gioacchino
you can check these options --> Instead of using individual user credentials, you can create a dedicated service account with a fixed password on the switches. This service account should have appropriate privileges to perform the necessary operations within Cisco DNA Center. This way, you can configure the CLI credentials on DNA Center using the fixed password of the service account also Consider using RADIUS or TACACS+ authentication for your switches instead of RSA token-based authentication. RADIUS and TACACS+ provide centralized authentication and authorization, allowing you to use fixed credentials for authentication. You can configure the RADIUS or TACACS+ server (e.g., Cisco ISE) to handle the authentication and authorization process for your switches, and then configure DNA Center to use RADIUS or TACACS+ for device authentication.
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: