Assurance
|
Assure consistent service levels with complete visibility across all aspects of your network.
|
Monitoring and Troubleshooting
|
Monitor and manage the health of your network with issue troubleshooting and remediation, proactive network monitoring, and
insights driven by AI Network Analytics.
This role lets you:
-
Resolve, close, and ignore issues.
-
Run Machine Reasoning Engine (MRE) workflows.
-
Analyze trends and insights.
-
Troubleshoot issues, including path trace, sensor dashboards, and rogue management.
|
Monitoring Settings
|
Configure and manage issues. Update network, client, and application health thresholds.
Note: You must have at least Read permissions on Monitoring and Troubleshooting.
|
Troubleshooting Tools
|
Create and manage sensor tests. Schedule on-demand forensic packet captures (Intelligent Capture) for troubleshooting clients.
Note: You must have at least Read permissions on Monitoring and Troubleshooting.
|
Network Design
|
Set up network hierarchy, update your software image repository, and configure network profiles and settings for managing
your sites and network devices.
|
Advanced Network Settings
|
Update network settings such as global device credentials, authentication and policy servers, certificates, trustpool, cloud
access keys, Stealthwatch, Umbrella, and data anonymization.
|
Image Repository
|
Manage software images and facilitate upgrades and updates on physical and virtual network entities.
|
Network Hierarchy
|
Define and create a network hierarchy of sites, buildings, floors, and areas based on geographic location. Users with this
role can also add CMX servers in System Settings.
|
Network Profiles
|
Create network profiles for routing, enterprise NFV, switching, and wireless, and assign profiles to sites. This role includes
Template Editor, Tagging, Model Config Editor, and Authentication Template.
Note: To create SSIDs, you must have Write permissions on Network Settings.
|
Network Settings
|
Common site-wide network settings such as AAA, NTP, DHCP, DNS, Syslog, SNMP, and Telemetry. Users with this role can add an
SFTP server and modify the Network Resync Interval in System Settings.
Note: To create wireless profiles, you must have Write permissions on Network Profiles.
|
Virtual Network (VN)
|
Manage virtual networks (VNs). Segment physical networks into multiple logical networks for traffic isolation and controlled
inter-VN communication.
|
Network Provision
|
Configure, upgrade, provision, schedule, and manage your network devices.
|
Image Update
|
Upgrade a software image on devices that does not match the Golden Image settings after a complete upgrade lifecycle.
|
Inventory Management
|
Discover, add, replace, or delete devices on your network while managing device attributes and configuration properties.
Note: To replace a device, you must have Write permissions on .
|
License
|
Unified view of your software and network assets relative to license usage and compliance.
|
PnP
|
Automatically onboard new devices, assign them to sites, and configure them with site-specific contextual settings.
|
Provision
|
Provision devices with the site-specific settings and policies that are configured for the network. This role includes Fabric,
Application Policy, Application Visibility, Cloud, Site-to-Site VPN, Network/Application Telemetry, Stealthwatch, and Umbrella
provisioning.
Note: To provision devices that are in sites with network profiles attached, you must have at least Read permissions on Network
Profiles.
|
Scheduler
|
Integrated with other back-end services, scheduler lets you schedule tasks such as deploy policies, provision network devices,
or upgrade.
|
Network Services
|
Provision services in your network.
|
App Hosting
|
Deploy, manage, and monitor virtualized and container-based applications running on network devices.
|
Bonjour
|
Enable wide-area bonjour service across your network to enable policy-based service discovery.
|
Stealthwatch
|
Configure network elements to send data to Cisco Stealthwatch to detect and mitigate threats, even in encrypted traffic.
To provision Stealthwatch, you must have Write permissions on the following components:
|
Umbrella
|
Configure network elements to use Cisco Umbrella as the first line of defense against cybersecurity threats.
To provision Umbrella, you must have Write permissions on the following components:
You must also have Read permissions on Advanced Network Settings.
|
Platform
|
Open platform for accessible intent-based workflows, data exchange, notifications, and third-party app integrations.
|
APIs
|
Drive value by accessing Cisco DNA Center through REST APIs.
|
Bundles
|
Enhance productivity by configuring and activating preconfigured bundles for ITSM integration.
|
Events
|
Subscribe to get notified in near real time about network and system events of interest and initiate corrective actions.
You can configure Email and Syslog logs in .
|
Reports
|
Generate reports using predefined reporting templates for all aspects of your network.
You can configure webhooks in .
|
Security
|
Manage and control secure access to the network.
|
Group-Based Policy
|
Manage group-based policies for networks that enforce segmentation and access control based on Cisco security group tag. This
role includes Endpoint Analytics.
|
IP-Based Access Control
|
Manage IP-based access control lists that enforce network segmentation based on IP addresses.
|
Security Advisories
|
Scan the network for security advisories. Review and understand the impact of published Cisco security advisories that may
affect your network.
|
System
|
Centralized administration of your Cisco DNA Center, which includes configuration management, network connectivity, software upgrades, and more.
|
Basic
|
Personalize user settings based on preferences. (Set the default to Write for all defined custom roles.)
|
Machine Reasoning
|
Configure automatic updates to the machine reasoning knowledge base to rapidly identify security vulnerabilities and improve
automated issue analysis.
|
System Management
|
Manage core system functionality and connectivity settings. This role includes Cisco Credentials, Integrity Verification,
Device EULA, HA, Integration Settings, Disaster Recovery, Debugging Logs, Telemetry Collection, System EULA, IPAM, vManage
Servers, Backup & Restore, and Data Platform. Manage user roles and configure external authentication.
|
Utilities
|
One-stop-shop productivity resource for the most commonly used troubleshooting tools and services.
|
Audit Log
|
Detailed log of changes made via UI or API interface to network devices or Cisco DNA Center.
|
Network Reasoner
|
Initiate logical and automated troubleshooting for network issues while drawing on the knowledge wealth of network domain
experts.
|
Search
|
Search for various objects in Cisco DNA Center, such as sites, network devices, clients, applications, policies, settings, tags, menu items, and more.
|