|
Device info
|
|
* Admin state
|
The management state of the device. Options are
-
UNMANAGED—Crosswork Network Controller is not monitoring the device.
-
DOWN—The device is being managed and is down.
-
UP—The device is being managed and is up.
|
|
* Reachability check
|
Determines whether Crosswork Network Controller performs reachability checks on the device. Options are:
-
ENABLE (In CSV: REACH_CHECK_ENABLE)—Checks for reachability and then updates the Reachability State in the user interface automatically.
-
DISABLE (In CSV: REACH_CHECK_DISABLE)—The device reachability check is disabled.
Cisco recommends that you always set this to ENABLE. This field is optional if Configured State is marked as UNMANAGED.
|
|
Serial number
|
Serial number for the device.
|
|
Host name
|
The hostname of the device.
|
|
Tags
|
The available tags to assign to the device for identification and grouping purposes.
Use device tags to group devices for monitoring, and to provide additional information that might be of interest to other
users, such as the device’s physical location or its administrator’s email ID.
|
|
Software type
|
Software type of the device.
|
Note
|
Some third-party vendor devices require a specific string to be entered as part of the Software Type field. These are the required strings for different vendors:
-
Juniper devices: JUNOS
-
Huawei devices: VRP
-
Nokia devices: TIMOS
|
|
|
Software version
|
Software version of the operating system.
|
|
UUID
|
Universally unique identifier (UUID) for the device.
|
|
MAC address
|
MAC address of the device.
|
|
Inventory ID
|
Inventory ID value for the device. The value can contain a maximum of 128 alphanumeric characters, and can include dots (.),
underscores ("_"), colons (":"), or hyphens ("-"). No other special characters are allowed.
Choose the device host name or an easily identifiable name for Inventory ID as this will be used to sync the device to Crosswork
Network Controller with the Inventory ID used as the device name.
|
|
Product type
|
Product type of the device.
|
|
Syslog format
|
The format in which syslog events received from the device should be parsed by the syslog collector. The options are:
-
UNKNOWN - Choose this option if you are uncertain or if you do not want any parsing to be done by the syslog collector. The Syslog
Collection Job output contains syslog events as received from the device.
-
RFC5424 - Choose this option to parse syslog events received from the device in RFC5424 format.
-
RFC3164 - Choose this option to parse syslog events received from the device in RFC3164 format.
Refer to Section: Syslog Collection Job Output for more details
|
|
CLI cache enabled
|
Click the checkbox if you wish to enable CLI cache.
|
|
Connectivity details
|
|
* Credential Profile
|
The name of the credential profile to be used to access the device for data collection and configuration changes. Select the
profile for which the device is configured from the dropdown list. For example: nso23 or srpce123.
This field is optional if Administration State is marked as UNMANAGED.
|
|
Protocol
|
The connectivity protocols used by the device. Choices are: SNMP, NETCONF, TELNET,HTTP, HTTPS, GNMI, TL1, and GRPC.
|
Note
|
Toggle the Secure Connection slider to secure the GNMI protocol that you have selected.
In this documentation, the secured gNMI protocol is referred to as GNMI_Secure.
|
To add more connectivity protocols for this device, click at the end of the first row in the Connectivity Details panel. To delete a protocol you have entered, click shown next to that row in the panel.
You can enter as many sets of connectivity details as you want, including multiple sets for the same protocol. Enter details
for at least SSH and SNMP. If you do not configure SNMP, the device will not be added. If you want to manage the device (or you are managing XR devices), you must enter details
for NETCONF. TELNET connectivity is optional.
|
|
* IP Address / Subnet Mask
|
Enter the device's IP address (IPv4 or IPv6) and subnet mask.
|
Note
|
If you have multiple protocols with the same IP address and subnet mask, you can instruct Crosswork Network Controller to
autofill the details in the other fields.
|
|
Note
|
Please ensure that the subnets chosen for the IP networks (including devices and destinations) do not have overlapping address
space (subnets/supernets) as it may result in unpredictable connectivity issues.
|
|
|
* Port
|
The port used for this connectivity protocol.
For each protocol enabled on the device, the default port is automatically provided. This default value works correctly in
most cases. However, if your network uses non-standard ports, you must update the port settings to match the ones configured
in your network.
GNMI and GNMI_SECURE: When using gNMI the value is not automatically populated. You must instead enter the value configured
on your network devices. The port values range between 57344 to 57999. Ensure that the port number you enter here matches
with the port number configured on the device.
|
|
Timeout
|
The elapsed time (in seconds) before communication attempts using this protocol times out. The default value is 30 seconds.
While the default value is 30 seconds, a minimum timeout value of 90 seconds is recommended for XE devices using NETCONF.
For all other devices and protocols, the recommended minimum timeout value is 60 seconds.
|
|
Encoding Type
|
This field is only applicable for GNMI and GNMI_SECURE protocols. The options are JSON, BYTES, PROTO, ASCII, and JSON IETF.
Based on device capability, only one encoding format is supported at a time in a device.
|
|
Encryption
|
This field is applicable only to the SNMP protocol. From the drop-down list, choose the appropriate SNMPv3 protocol supported
by the device. The default value is NONE.
The drop-down list presents several Advanced Encryption Standard (AES) options, including Counter mode (CTR), Galois/Counter
mode (GCM), and Cipher Block Chaining mode (CBC), each supporting various key lengths (128-bit, 192-bit, and 256-bit).
The credential profile supports the generic privacy types such as AES-192 and AES-256. For Cisco devices, these are specified
as CiscoAES192 and CiscoAES256 protocols.
On Cisco devices, the protocols appear as aes256-ctr, aes256-gcm@openssh.com, aes256-cbc, aes192-ctr, and aes192-cbc. To ensure
compatibility with Crosswork Network Controller polling, Cisco devices must use these updated protocol variations.
On non-Cisco devices, select the encryption that the device supports or use NONE if the device does not use encryption for
SNMP.
|
|
Trap source IP
|
This field is available only when the SNMP protocol is selected.
Use this field to specify the source IP address that the device will use to report SNMP traps if it differs from the default
management interface IP address.
For consistent trap collection, ensure that the IP address entered in the Trap source IP field matches the trap-source parameter configured on the network device to avoid any issues with SNMP trap handling.
|
Note
|
-
If the Trap source IP field is not specified, Crosswork defaults to using the management interface IP address. For devices added via CSV or API,
this field also defaults to the management interface IP address unless explicitly specified.
-
Ensure that the trap source uses the same IP stack (IPv4 or IPv6) as the device connectivity protocol to maintain consistent
communication and avoid mismatches.
|
|
|
SNMP Disable Trap Check
|
This check box appears when the protocol field is set to SNMP. Selecting this check box disables the SNMPv2 community string validation between the network device and Data Gateway.
Disabling the SNMPv2 community string validation might be a requirement when you want to use a different community string
for traps than the one in the credential profile.
|
|
* Capability
|
The capabilities that allow collection of device data and that are configured on the device. You must select at least SNMP as this is a required capability. The device will not be onboarded if SNMP is not configured. Other options are YANG_MDT, YANG_CLI, TL1, and GNMI. The capabilities that you select will depend on the device software type and version.
|
Note
|
-
For devices with MDT capability, do not select YANG_MDT at this stage.
-
To enable Crosswork Network Controller to receive the syslog-based data, select YANG_CLI.
|
|
|
Providers and access
Provide the provider information.
|
|
Provider family
|
Provider type used for topology computation. Choose a provider from the list.
|
|
Provider name
|
Provider name used for topology computation. Choose a provider from the list.
|
Note
|
For Cisco NSO LSA deployment, select the resource-facing service (RFS) node to which you want to assign the device.
|
|
|
Credential
|
The credential profile used for the provider. This field is read-only and is autopopulated based on the provider you select.
|
|
Device key
|
The hostname used to link this device record to its corresponding record on the provider. This is typically the device's full
hostname, including the domain.
|
|
Routing info
|
|
ISIS system ID
|
The device's IS-IS system ID. This ID identifies the router in an IS-IS topology, and is required for SR-PCE integration.
This field is a configurable parameter, and cannot be autodiscovered by Crosswork Network Controller.
|
|
OSPF router ID
|
The device's OSPF router ID. This ID identifies the router in an OSPF topology, and is required for SR-PCE integration.
This field is a configurable parameter, and cannot be autodiscovered by Crosswork Network Controller.
|
|
*TE router ID
|
The traffic engineering router ID for the respective IGP.
|
Note
|
For visualizing L3 links in topology, devices should be onboarded to Crosswork Network Controller with the TE Router ID field populated.
|
|
|
IPv6 router ID
|
IPv6 router ID for the device.
This field is a configurable parameter, and cannot be autodiscovered by Crosswork Network Controller.
|
|
Streaming telemetry config
|
|
VRF
|
Name of the VRF within which Model Driven Telemetry (MDT) traffic is routed.
|
|
Source interface
|
The range of loopback address for the device type. This field is optional. However, we recommend specifying the loopback associated
with the VRF by using the selector in the adjacent box.
|
Note
|
This field can be edited only when the device is in a DOWN or UNMANAGED state.
|
|
|
Opt out MDT config
|
When enabled, Crosswork Network Controller will not push telemetry configuration to the device via NSO. The default setting
state is Disabled (which allows Crosswork Network Controller to push telemetry configuration to the device via NSO).
The device must be in ADMIN DOWN state to toggle this setting. Any out of band configuration setup must be cleared before
moving the setting from Enabled to Disabled.
|
|
Location
Provide location information if you want to see your devices on the geographical map.
|
|
Building
|
Enter the name of the building.
|
|
Street
|
Enter the name of the street.
|
|
City
|
Enter the name of the city.
|
|
State
|
Enter the name of the state.
|
|
Country
|
Enter the name of the country.
|
|
Region
|
Enter the name of the region.
|
|
Zip
|
Enter the zip code of the region.
|
|
Longitude
|
Longitude value is required so that the geographical map can present the correct geographical location of the device and its
links to other devices. Enter the longitude in Decimal Degrees (DD) format.
|
|
Latitude
|
Latitude value is required so that the geographical map can present the correct geographical location of the device and its
links to other devices. Enter the latitude in Decimal Degrees (DD) format.
|
|
Altitude
|
The altitude at which the device is located.
If you do not know the altitude or do not wish to track it, you can leave this field blank. Alternatively, you may use this
field to specify the floor of the building where the device is installed. The value must be a numeric entry.
|