* Admin State
|
The management state of the device. Options are
-
UNMANAGED—Crosswork Network Controller is not monitoring the device.
-
DOWN—The device is being managed and is down.
-
UP—The device is being managed and is up.
|
* Reachability Check
|
Determines whether Crosswork Network Controller performs reachability checks on the device. Options are:
-
ENABLE (In CSV: REACH_CHECK_ENABLE)—Checks for reachability and then updates the Reachability State in the user interface automatically.
-
DISABLE (In CSV: REACH_CHECK_DISABLE)—The device reachability check is disabled.
Cisco recommends that you always set this to ENABLE. This field is optional if Configured State is marked as UNMANAGED.
|
* Credential Profile
|
The name of the credential profile to be used to access the device for data collection and configuration changes. For example:
nso23 or srpce123.
This field is optional if Administration State is marked as UNMANAGED.
|
Host Name
|
The hostname of the device.
|
Inventory ID
|
Inventory ID value for the device. The value can contain a maximum of 128 alphanumeric characters, and can include dots (.),
underscores ("_"), colons (":"), or hyphens ("-"). No other special characters are allowed.
Choose the device host name or an easily identifiable name for Inventory ID as this will be used to sync the device to Crosswork
Network Controller with the Inventory ID used as the device name.
|
Software Type
|
Software type of the device.
Note
|
Some third-party vendor devices require a specific string to be entered as part of the Software Type field. These are the required strings for different vendors:
-
Juniper devices: JUNOS
-
Huawei devices: VRP
-
Nokia devices: TIMOS
|
|
Software Version
|
Software version of the operating system.
|
UUID
|
Universally unique identifier (UUID) for the device.
|
Serial Number
|
Serial number for the device.
|
MAC Address
|
MAC address of the device.
|
* Capability
|
The capabilities that allow collection of device data and that are configured on the device. You must select at least SNMP as this is a required capability. The device will not be onboarded if SNMP is not configured. Other options are YANG_MDT, YANG_CLI, TL1, and GNMI. The capabilities that you select will depend on the device software type and version.
Note
|
-
For devices with MDT capability, do not select YANG_MDT at this stage.
-
To enable Crosswork Network Controller to receive the syslog-based data, select YANG_CLI.
|
|
Tags
|
The available tags to assign to the device for identification and grouping purposes.
Use device tags to group devices for monitoring, and to provide additional information that might be of interest to other
users, such as the device’s physical location or its administrator’s email ID.
|
Product Type
|
Product type of the device.
|
Syslog Format
|
The format in which syslog events received from the device should be parsed by the syslog collector. The options are:
-
UNKNOWN - Choose this option if you are uncertain or if you do not want any parsing to be done by the syslog collector. The Syslog
Collection Job output contains syslog events as received from the device.
-
RFC5424 - Choose this option to parse syslog events received from the device in RFC5424 format.
-
RFC3164 - Choose this option to parse syslog events received from the device in RFC3164 format.
Refer to Section: Syslog Collection Job Output for more details
|
Connectivity Details
|
Protocol
|
The connectivity protocols used by the device. Choices are: SNMP, NETCONF, TELNET, HTTP, HTTPS, GNMI, TL1, and GRPC.
Note
|
Toggle the Secure Connection slider to secure the GNMI protocol that you have selected.
In this documentation, the secured gNMI protocol is referred to as GNMI_Secure.
|
To add more connectivity protocols for this device, click at the end of the first row in the Connectivity Details panel. To delete a protocol you have entered, click shown next to that row in the panel.
You can enter as many sets of connectivity details as you want, including multiple sets for the same protocol. You must enter
details for at least SSH and SNMP. If you do not configure SNMP, the device will not be added. If you want to manage the device (or you are managing XR devices), you must enter details
for NETCONF. TELNET connectivity is optional.
|
* IP Address / Subnet Mask
|
Enter the device's IP address (IPv4 or IPv6) and subnet mask.
Note
|
Please ensure that the subnets chosen for the IP networks (including devices and destinations) do not have overlapping address
space (subnets/supernets) as it may result in unpredictable connectivity issues.
|
Note
|
If you have multiple protocols with the same IP address and subnet mask, you can instruct Crosswork Network Controller to
autofill the details in the other fields.
|
|
* Port
|
The port used for this connectivity protocol. Each protocol is mapped to a port, so be sure to enter the port number that
corresponds to the protocol you chose. The standard port assignments for each protocol are:
-
SSH: 22
-
SNMP: 161
-
NETCONF: 830
-
TELNET: 23
-
HTTP: 80
-
HTTPS: 443
GNMI and GNMI_SECURE: The port values range between 57344 to 57999. Ensure that the port number you enter here matches with
the port number configured on the device.
|
Timeout
|
The elapsed time (in seconds) before communication attempts using this protocol will time out. The default value is 30 seconds.
For XE devices using NETCONF, the recommended minimum timeout value is 90 seconds. For all other devices and protocols, the
recommended minimum timeout value is 60 seconds.
|
Encoding Type
|
This field is only applicable for GNMI and GNMI_SECURE protocols. The options are JSON, BYTES, PROTO, ASCII, and JSON IETF.
Based on device capability, only one encoding format is supported at a time in a device.
|
Encryption
|
This field is applicable only to the SNMP protocol. From the drop-down list, choose the appropriate SNMPv3 protocol supported
by the device. The default value is "NONE."
The drop-down menu presents several Advanced Encryption Standard (AES) options, including Counter mode (CTR), Galois/Counter
mode (GCM), and Cipher Block Chaining mode (CBC), each supporting various key lengths (128-bit, 192-bit, and 256-bit).
The credential profile supports the generic privacy types such as AES-192 and AES-256. For Cisco devices, these are specified
as CiscoAES192 and CiscoAES256 protocols.
On Cisco devices, the protocols appear as aes256-ctr, aes256-gcm@openssh.com, aes256-cbc, aes192-ctr, and aes192-cbc. To ensure
compatibility with Crosswork Network Controller polling, Cisco devices must use these updated protocol variations.
For non-Cisco devices, select "None" in the Encryption field.
|
SNMP Disable Trap Check
|
This check box appears when the protocol field is set to SNMP. Selecting this check box disables the SNMPv2 community string validation between the network device and data gateway.
Disabling the SNMPv2 community string validation might be a requirement when you want to use a different community string
for traps than the one in the credential profile.
|
Routing Info
|
ISIS System ID
|
The device's IS-IS system ID. This ID identifies the router in an IS-IS topology, and is required for SR-PCE integration.
|
OSPF Router ID
|
The device's OSPF router ID. This ID identifies the router in an OSPF topology, and is required for SR-PCE integration.
|
*TE Router ID
|
The traffic engineering router ID for the respective IGP.
Note
|
For visualizing L3 links in topology, devices should be onboarded to Crosswork Network Controller with the TE Router ID field populated.
|
|
IPv6 Router ID
|
IPv6 router ID for the device. This field is a configurable parameter, and cannot be autodiscovered by Crosswork Network Controller.
|
Streaming Telemetry Config
|
Vrf
|
Name of the VRF within which Model Driven Telemetry (MDT) traffic is routed.
|
Source Interface
|
The range of loopback in the device type. This field is optional.
Note
|
This field can be edited only when the device is in DOWN or UNMANAGED state.
|
|
Opt Out MDT Config
|
When enabled, Crosswork Network Controller will not push telemetry configuration to the device via NSO. The default setting
state is Disabled (which allows Crosswork Network Controller to push telemetry configuration to the device via NSO).
The device must be in ADMIN DOWN state to toggle this setting. Any out of band configuration setup needs to be cleared before
moving the setting from Enabled to Disabled.
|
Location
Provide location information if you want to see your devices on the geographical map.
|
Longitude, Latitude
|
Longitude and latitude values are required so that the geographical map can present the correct geographical location of the
device and its links to other devices. Enter the longitude and latitude in Decimal Degrees (DD) format.
|
Altitude
|
The altitude at which the device is located. For example, 123.
|
Providers and Access
Provide the provider information.
|
Provider Family
|
Provider type used for topology computation. Choose a provider from the list.
|
Provider Name
|
Provider name used for topology computation. Choose a provider from the list.
Note
|
For Cisco NSO LSA deployment, select the resource-facing service (RFS) node to which you want to assign the device.
|
|
Credential
|
The credential profile used for the provider. This field is read-only and is autopopulated based on the provider you select.
|
Device Key
|
The host name used for the provider.
|