Cisco MSX Enterprise Access Service Pack Overview

Cisco MSX Enterprise Access provides consistent management and automation of an Enterprise Network Fabric (wired and wireless network infrastructure). Cisco MSX Enterprise Access allows service providers to offer managed intent-based policy and network segmentation as well as traditional LAN and WAN provisioning from one central place. Cisco MSX Enterprise Access also provides the network health at the global enterprise level by transparently aggregating all the enterprise network domains in one single pane of glass.

These are the benefits of using Cisco MSX Enterprise Access:

  • Enables enterprise customers to monitor the health of their network.

  • Gives network architects the tools to orchestrate key business functions like onboarding, secure segmentation, IoT integration, and guest access.

  • Enables policy-based automation from the edge to the cloud.

  • Automates user and device policy for any application across the wireless and wired network via a single network fabric.

  • Automated Configuration of Cisco DNA Center Appliances.

Audience

This guide is designed for service provider operators and tenants who use Cisco MSX Enterprise Access service pack to deploy Enterprise Access services.

What’s New in Cisco MSX Enterprise Access

There are no new features in this release.

Logging in to Cisco MSX

To log into the Cisco MSX user interface, enter the given URL in your web browser address field, where server-ip is the IP address or fully qualified domain name (FQDN) of the Cisco MSX server.

https://<server-ip> or https://<your_portal_fqdn>

Depending on your network configuration, the first time your browser connects to the Cisco MSX web server, you may have to update your client browser to trust the security certificate of the server. This update ensures the security of the connection between your client and the Cisco MSX web server.

To log out, click Logout, on the right hand side settings menu.

Cisco MSX Service Pack-Specific User Roles

In Cisco MSX, user permissions are managed using Role-Based Access Control (RBAC). RBAC restricts or authorizes system access for users based on user roles. Based on the permissions that are assigned to a user by an administrator, you can define and customize how the services are exposed to customers.

The permissions allow users to customize various aspects of a service workflow, such as managing tenants, notifications, integration with BSS systems, and managing announcements.

The role-based access permissions are categorized into:

  • Service Pack Specific Permissions: Include permissions for controlling various settings of the service packs.

  • Services, Configurations, and Devices Specific Permissions: Include permissions for configuring various settings of the devices and services.

  • Integrations, Settings, and Log Specific Permissions: Include permissions for controlling integration, log, and SSO configurations.

  • Users, Roles, and Tenants Specific Permissions: Include permissions to configure users, remote users, tenants, roles, and provider settings.

In Cisco MSX Enterprise Access Service Pack, you need to create a new role and assign the permissions that are required to order, operate, and view the Enterprise Access services. Table 1 lists the Enterprise Access specific permissions.

Table 1. Enterprise Access-Specific Permissions

Permission

Associated Tasks

View (Control Plane)

Allows you to:

  • View control planes and Cisco DNA Center details.

  • View Cisco DNA Center site hierarchy

Manage (Control Plane)

Allows you to:

  • Attach control plane

  • Edit control plane

  • Detach control plane

  • View Cisco DNA Center details with additional information like address, control plane ID (for internal use and debugging)

  • Launch the Cisco DNA Center by clicking on the tile, which takes you to the appropriate page in the Cisco DNA Center.

  • View list of templates

  • Create templates

  • Assign template to a network profile

  • Add/Delete/Provision device

    Note 

    For add/delete/provision a device, you also need the DEVICE_MANAGEMENT permission from platform.

  • Add SDA fabrics and site domains

  • View SDA fabrics and site domains

  • Delete SDA fabrics and site domains

  • Add Cisco DNA Center site hierarchy

  • Delete Cisco DNA Center site hierarchy

For more information on Cisco MSX out-of-box roles, see the Cisco MSX Administration 4.3 Documentation.

For a complete list of all the permissions available in Cisco MSX, see the Cisco Managed Services Accelerator (MSX) 4.3 Platform and Service Packs Permissions Addendum.

About this Content

This section provides information about related documentation of Cisco MSX and trademarks used in this content.

Bias-free Doc Disclaimer


Note

The documentation set for this product strives to use bias-free language. For purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product.


Full Cisco Trademarks with Software License

THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.

THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.

The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.

NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.

IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.

All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current online version for the latest version.

Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at www.cisco.com/go/offices.

The documentation set for this product strives to use bias-free language. For purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on standards documentation, or language that is used by a referenced third-party product.

Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: https://www.cisco.com/c/en/us/about/legal/trademarks.html. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1721R)