Skip to content

Device configuration

Andrea Dainese edited this page Aug 23, 2023 · 7 revisions

NetDoc requires login credentials with read-only privileges to access discoverable devices. This chapter provides instructions on how to configure minimal access to supported devices.

In production environments, it is recommended to implement the AAA new model.

Cisco IOS and IOX XE

NetDoc utilizes SSH to establish connections with Cisco IOS and IOS XE devices. The login is performed using a username and password.

hostname switch1
ip domain-name example.com
crypto key generate rsa modulus 2048
ip ssh version 2
privilege exec level 5 show
username netdoc privilege 5 password netdoc
line vty 0 15
 transport input ssh

Security considerations:

  • Users with read-only privileges do not have the capability to view the running configuration. Higher privileges are necessary for such access.
  • In production environments, it is recommended to implement the AAA new model.

Cisco NXOS

NetDoc access to Cisco NXOS via SSH using username and password.

role name read-only
  rule 1 permit read
username netdoc password netdoc
username netdoc role read-only
hostname spine1
ip domain-name example.com
ssh key rsa 2048

Cisco XR

NetDoc access to Cisco XR devices via SSH using username and password.

username netdoc password netdoc
username netdoc group read-only-tg
hostname router1
domain name example.com
line default
 timestamp disable
 transport input ssh
ssh server v2

Generate host keys using:

crypto key generate rsa

Linux

NetDoc access to Linux devices via SSH using username and password. sudo is used to get administrative privileges.

If sudo needs a password, set the secret password in the asociated credential object.

Palo Alto Networks NGFW (PAN-OS)

Pleas refers to FWAdmin Wiki page.

Clone this wiki locally