-
-
Notifications
You must be signed in to change notification settings - Fork 14
Device configuration
NetDoc requires login credentials with read-only privileges to access discoverable devices. This chapter provides instructions on how to configure minimal access to supported devices.
In production environments, it is recommended to implement the AAA new model.
NetDoc utilizes SSH to establish connections with Cisco IOS and IOS XE devices. The login is performed using a username and password.
hostname switch1
ip domain-name example.com
crypto key generate rsa modulus 2048
ip ssh version 2
privilege exec level 5 show
username netdoc privilege 5 password netdoc
line vty 0 15
transport input ssh
Security considerations:
- Users with read-only privileges do not have the capability to view the running configuration. Higher privileges are necessary for such access.
- In production environments, it is recommended to implement the AAA new model.
NetDoc access to Cisco NXOS via SSH using username and password.
role name read-only
rule 1 permit read
username netdoc password netdoc
username netdoc role read-only
hostname spine1
ip domain-name example.com
ssh key rsa 2048
NetDoc access to Cisco XR devices via SSH using username and password.
username netdoc password netdoc
username netdoc group read-only-tg
hostname router1
domain name example.com
line default
timestamp disable
transport input ssh
ssh server v2
Generate host keys using:
crypto key generate rsa
NetDoc access to Linux devices via SSH using username and password. sudo
is used to get administrative privileges.
If sudo
needs a password, set the secret password in the asociated credential object.
Pleas refers to FWAdmin Wiki page.