Core features in Crosswork Network Controller
Familiarize yourself with the fundamental features essential for understanding and using Cisco Crosswork Network Controller.
|
Feature |
Description |
||
|---|---|---|---|
|
User roles |
Use role-based access control to allow each user to access only the software functions needed for their job duties. New users start with full administrative privileges. To grant only the necessary privileges, create user roles and assign the appropriate roles to each user profile. |
||
|
User accounts |
Create separate accounts for each user to maintain a detailed audit record of user activity. Prepare a list of users, decide on usernames and temporary passwords, and create user profiles for each account. You can use TACACS+, LDAP, or RADIUS servers to centrally manage user roles and accounts. For more details, see User authentication systems . |
||
|
Device-access groups |
Device-access Groups (DAGs) are groups of devices that define device access for users. Users associated with DAGs can make configuration changes and provision services on devices within those groups. When creating a user, assign at least one DAG and a role to the user. For more details, see Manage Device Access Groups. |
||
|
Credential profiles |
For the Crosswork Network Controller to access a device or interact with a provider, it must present credentials. Instead of entering credentials each time, you can create credential profiles to securely store this information. The platform supports unique credentials for each access protocol and allows bundling multiple protocols and their corresponding credentials into a single profile. Devices using the same credentials can share a credential profile. For example, if all routers in a particular building share a single SSH user ID and password, you can create one credential profile for Crosswork Network Controller to manage them. Before creating a credential profile, gather the access credentials and supported protocols needed to monitor and manage your devices. These credentials include user IDs, passwords, SNMPv2 read and write community strings, and SNMPv3 authentication and privilege types. For other providers (NSO, SR-PCE, Storage, Alert, and WAE), you always need user IDs, passwords, and connection protocols. Use this information to create credential profiles. |
||
|
Tags |
Tags are simple text strings that you can attach to devices to help group them. The Crosswork Network Controller includes a short list of pre-made tags for grouping network devices. You can also create your own tags to identify, find, and group devices for various purposes. Plan a preliminary list of custom tags to create when setting up the system. Use these tags to group your devices when you first onboard them. You can always add more tags later, so a complete list is not necessary at the start. Add all planned tags before they are needed. If any tags are missing, add them manually at that time. For more details, see Manage tags. |
||
|
Providers |
Crosswork Network Controller applications rely on external services like Cisco Crosswork Network Services Orchestrator (NSO) or SR-PCE for tasks such as configuration changes and segment routing path computation. To manage access and reuse information between Crosswork Network Controller applications, configure a provider (for example, NSO or SR-PCE) for each external service. The provider family determines both the type of service supplied to Crosswork Network Controller and the unique parameters required for configuration. The parameters needed to configure a provider depend on the type of Crosswork Network Controller application used. It is important to review and gather each application's requirements before configuring a provider. For more information, see Providers and Provider families. The main providers used with Crosswork Network Controller are:
|
||
|
Devices |
You can onboard devices using the UI, a CSV file, an API, SR-PCE discovery, or zero-touch provisioning. The onboarding method determines the type of information needed to configure a device in Crosswork Network Controller. Also, Crosswork Network Controller can forward device configuration to NSO, which may affect how you provision an NSO provider. For more information, see Add and Configure Devices.
|
||
|
External data destinations |
Crosswork Network Controller functions as the controller for the Crosswork Data Gateway. Operators planning to have Crosswork Data Gateway forward data to other data destinations must understand the format required by those destinations and other connection requirements. |
||
|
Labels |
If you plan to use Change Automation, labels are used to restrict which users can execute a playbook. For example, you may allow lower-level operators to run check playbooks but use labels to prevent them from running more complex or impactful playbooks that make changes to network device configurations. |
||
|
KPI profile |
If you plan to use Crosswork Health Insights, use KPI (Key Performance Indicator) profiles to monitor network health. You can establish unique performance criteria based on how a device or devices are used in the network. KPIs can be grouped to form a KPI Profile. It is helpful to have a clear idea of the data you plan to monitor and the performance targets you want to establish as you set up Health Insights. |
||
|
Device monitoring samples |
If you plan to install the Crosswork Service Health application, you should review the provided samples to determine if they are adequate for monitoring devices in your network. |
Note that you can capture the devices, credential profiles, tags, and providers lists in spreadsheet form, convert the spreadsheet to CSV format, and then upload them in bulk to the Crosswork Network Controller application using the Import feature. You can access CSV templates for each of these lists by clicking the Import icon in the corresponding places in the user interface. Select the Download template link when prompted to choose an export destination path and filename.

Feedback