CLI (SSH) Credentials
|
Username
|
Username used to log in to the CLI of the devices in your network.
|
Password
|
Password used to log in to the CLI of the devices in your network. The password you enter must be at least eight characters
long.
|
Name/Description
|
Name or description of the CLI credentials.
|
Enable Password
|
Password used to enable a higher privilege level in the CLI. Configure this password only if your network devices require
it.
|
SNMP Credentials: SNMPv2c Read tab
|
Name/Description
|
Name or description of the SNMPv2c read community string.
|
Community String
|
Read-only community string password used only to view SNMP information on the device.
|
SNMP Credentials: SNMPv2c Write tab
|
Name/Description
|
Name or description of the SNMPv2c write community string.
|
Community String
|
Write community string used to make changes to the SNMP information on the device.
|
SNMP Credentials: SNMPv3
|
Name/Description
|
Name or description of the SNMPv3 credentials.
|
Username
|
Username associated with the SNMPv3 credentials.
|
Mode
|
Security level that SNMP messages require:
-
No Authentication, No Privacy (noAuthnoPriv): Does not provide authentication or encryption.
-
Authentication, No Privacy (authNoPriv): Provides authentication, but does not provide encryption.
-
Authentication and Privacy (authPriv): Provides both authentication and encryption.
Note
|
When FIPS mode is enabled, Cisco DNA Center only supports Authentication and Privacy mode.
|
|
Authentication Password
|
Password required to gain access to information from devices that use SNMPv3. The password must be at least eight characters
in length. Note the following points:
-
Some wireless controllers require that passwords be at least 12 characters long. Be sure to check the minimum password requirements
for your wireless controllers. Failure to ensure these required minimum character lengths for passwords results in devices
not being discovered, monitored, or managed by Cisco DNA Center.
-
Passwords are encrypted for security reasons and are not displayed in the configuration.
|
Authentication Type
|
Hash-based Message Authentication Code (HMAC) type used when either Authentication and Privacy or Authentication, No Privacy is set as the authentication mode:
|
Privacy Type
|
Privacy type. (Enabled if you select Authentication and Privacy as Mode.) Choose one of the following privacy types:
-
AES128: 128-bit CBC mode AES for encryption.
-
CISCOAES192: 192-bit CBC mode AES for encryption on Cisco devices.
-
CISCOAES256: 256-bit CBC mode AES for encryption on Cisco devices.
Note
|
-
Privacy types CISCOAES192 and CISCOAES256 are supported only for use with Discovery and Inventory features. Assurance features are not supported.
-
Privacy type AES128 is supported for Discovery, Inventory, and Assurance.
|
|
Privacy Password
|
SNMPv3 privacy password that is used to generate the secret key for encrypting messages are exchanged with devices supported
with AES128, AES192, and AES256 encryption standards. Passwords (or passphrases) must be at least eight characters long.
Note the following points:
-
Some wireless controllers require that passwords be at least 12 characters long. Be sure to check the minimum password requirements
for your wireless controllers. Failure to ensure these required minimum character lengths for passwords results in devices
not being discovered, monitored, or managed by Cisco DNA Center.
-
Passwords are encrypted for security reasons and are not displayed in the configuration.
|
NETCONF
|
Port
|
The NETCONF port that Cisco DNA Center should use in order to discover wireless controllers that run Cisco IOS-XE.
|