Manage Users

About User Profiles

A user profile defines a user's login, password, and role (permissions). You can configure both internal and external profiles for users. Internal user profiles reside in Cisco DNA Center and external user profiles reside on an external AAA server. A default user profile with SUPER-ADMIN-ROLE permissions is created when you install Cisco DNA Center.

About User Roles

Users are assigned user roles that specify the functions that they are permitted to perform:

Create an Internal User

You can create a user and assign this user a role.

Before you begin

Only a user with SUPER-ADMIN-ROLE permissions can perform this procedure. For more information, see About User Roles.

Procedure

  1. In the Cisco DNA Center GUI, click the Menu icon (≡) and choose System > Users & Roles > User Management.
  2. Click Add.
  3. Enter a first name, last name, email address, and username for the new user. The email address must meet the requirements for the standard Apache EmailValidator class.
  4. Under Role List, choose one of the following roles: SUPER-ADMIN-ROLE, NETWORK-ADMIN-ROLE, or OBSERVER-ROLE.
  5. Enter a password and confirm it. The password must contain:
    • At least eight characters
    • A character from at least three of the following categories:
      • Lowercase letter
      • Uppercase letter
      • Number
      • Special character
  6. Click Save.

Edit a User

You can edit some user properties (but not the username).

Before you begin

Only a user with SUPER-ADMIN-ROLE permissions can perform this procedure. For more information, see About User Roles.

Procedure

  1. In the Cisco DNA Center GUI, click the Menu icon (≡) and choose System > Users & Roles > User Management.
  2. Click the radio button next to the user that you want to edit.
  3. Click Edit.
  4. Edit the first or last name or email address, if needed.
  5. Under Role List, choose a new role, if needed: SUPER-ADMIN-ROLE, NETWORK-ADMIN-ROLE, or OBSERVER-ROLE.
  6. Click Save.

Delete a User

Before you begin

Only a user with SUPER-ADMIN-ROLE permissions can perform this procedure. For more information, see About User Roles.

Procedure

  1. In the Cisco DNA Center GUI, click the Menu icon (≡) and choose System > Users & Roles > User Management.
  2. Click the radio button next to the user that you want to delete.
  3. Click Delete.
  4. At the confirmation prompt, click Continue.

Reset a User Password

You can reset another user's password. For security reasons, passwords are not displayed to any user, not even those with administrator privileges.

Before you begin

Only a user with SUPER-ADMIN-ROLE permissions can perform this procedure. For more information, see About User Roles.

Procedure

  1. In the Cisco DNA Center GUI, click the Menu icon (≡) and choose System > Users & Roles > User Management.
  2. Click the radio button next to the user whose password you want to reset.
  3. Click Reset Password.
  4. Enter a new password and confirm it. The new password must contain:
    • At least eight characters
    • A character from at least three of the following categories:
      • Lowercase letter
      • Uppercase letter
      • Number
      • Special character

Change Your Own User Password

Before you begin

Only a user with SUPER-ADMIN-ROLE permissions can perform this procedure. For more information, see About User Roles.

Procedure

  1. In the Cisco DNA Center GUI, click the Menu icon (≡) and choose System > Users & Roles > Change Password.
  2. Enter information in the required fields.
  3. Click Update.

Change Your Own User Password without Admin Permission

The following procedure describes how to change your password without admin permission.

  1. In the Cisco DNA Center GUI, click the Menu icon (≡), hover your cursor over admin and choose My Profile and Settings > My Account.
  2. Click Update Password.
  3. In the Update Password dialog box, enter the current password, new password and confirm new password.
  4. Click Update.

Reset a Forgotten Password

If you forgot your password, you can reset it through the CLI.

  1. Enter the following command to check if the user is created in the system.
    magctl user display <username>
    The command returns the tenant-name, which can be used to reset the password. The output looks similar to the following:
  2. User admin present in tenant TNT0 (where TNT0 is the tenant-name)
  3. Enter the tenant-name in the following command to reset the password.
    magctl user password update <username> <tenant-name>
  4. You are prompted to enter a new password.
  5. Enter a new password.
  6. You are prompted to re-enter the new password to confirm.
  7. Enter the new password. The password is reset and you can log in to Cisco DNA Center using the new password.

Configure Role-Based Access Control

Cisco DNA Center supports role-based access control (RBAC), which enables a user with SUPER-ADMIN-ROLE privileges to define custom roles that permit or restrict user access to certain Cisco DNA Center functions. Use this procedure to define a custom role and then assign a user to that role.

Before you begin

Only a user with SUPER-ADMIN-ROLE permissions can perform this procedure.

Procedure: Define a custom role

  1. In the Cisco DNA Center GUI, click the Menu icon (≡) and choose System > Users & Roles > Role Based Access Control.
  2. Click Create a New Role. The Create a Role window appears. If this is your first iteration of RBAC, after you have created the new role, you will be asked to assign users to the new role.
  3. Click Let's Do it. If you want to skip this screen in the future, check the Don't show this to me again check box.
  4. The Create a New Role window appears. Enter a name for the role and then click Next.
  5. The Define the Access window appears with a list of options. By default, the observer role is set for all Cisco DNA Center functions.
  6. Click the > icon corresponding to the desired function to view the associated features.
  7. Set the permission level to Deny, Read, or Write for the desired features. If you set the permission level of a feature to Deny, the user to whom you assign this role cannot view this feature in the GUI.
  8. Click Next. The Summary window appears.
  9. Review the summary. If the information is correct, click Create Role. Otherwise, click Edit and make the appropriate changes. The Done, Role-Name window appears.

Procedure: Assign a user to a custom role

  1. To assign a user to the custom role you just created, click Add Users. The User Management > Internal Users window appears, which allows you to assign the custom role to an existing user or to a new user.
  2. To assign the custom role to an existing user:
    1. In the Internal Users window, click the radio button next to the user to whom you want to assign the custom role, and then click Edit. The Update Internal User slide-in pane appears.
    2. From the Role List drop-down list, choose the custom role, and then click Save.
  3. To assign the custom role to a new user:
    1. Click Add. The Create Internal User slide-in pane appears.
    2. Enter the first name, last name, and username in the fields provided.
    3. From the Role List drop-down list, choose the custom role to assign to the new user.
    4. Enter the password and then confirm it.
    5. Click Save.
  4. If you are an existing user who was logged in when the administrator was making changes to your access permissions, you must log out of Cisco DNA Center and then log back in for the new permission settings to take effect.

Cisco DNA Center User Role Permissions

Table 1: Cisco DNA Center User Role Permissions

CapabilityDescription
AssuranceAssure consistent service levels with complete visibility across all aspects of your network.
Monitoring and TroubleshootingMonitor and manage the health of your network with issue troubleshooting and remediation, proactive network monitoring, and insights driven by AI Network Analytics.
This role lets you:
  • Resolve, close, and ignore issues.
  • Run Machine Reasoning Engine (MRE) workflows.
  • Analyze trends and insights.
  • Troubleshoot issues, including path trace, sensor dashboards, and rogue management.
  • Run workflows for rogue and Cisco Adaptive Wireless Intrusion Prevention System (aWIPS). These workflows include AP-allowed list, vendor-allowed list, aWIPS profile creation, assigning an aWIPS profile, and so on.
Monitoring SettingsConfigure and manage issues. Update network, client, and application health thresholds.
Note: You must have at least Read permission on Monitoring and Troubleshooting.
Troubleshooting ToolsCreate and manage sensor tests. Schedule on-demand forensic packet captures (Intelligent Capture) for troubleshooting clients.
Note: You must have at least Read permission on Monitoring and Troubleshooting.
Network AnalyticsManage network analytics-related components.
Data AccessEnable access to query engine APIs.
Note: Do not set the permission to Deny, because all applications will fail.
Network DesignSet up network hierarchy, update your software image repository, and configure network profiles and settings for managing your sites and network devices.
  • Update network settings such as global device credentials, authentication and policy servers, certificates, trustpool, cloud access keys, Stealthwatch, Umbrella, and data anonymization.
  • Export the device inventory and its credentials.
Note To complete this task, you must have Read permissions on Network Settings.
Advanced Network SettingsManage software images and facilitate upgrades and updates on physical and virtual network entities.
Image RepositoryDefine and create a network hierarchy of sites, buildings, floors, and areas based on geographic location. Users with this role can also add CMX servers in System Settings.
Network HierarchyCreate network profiles for routing, enterprise NFV, switching, and wireless, and assign profiles to sites. This role includes Template Editor, Tagging, Model Config Editor, and Authentication Template.
Note: To create SSIDs, you must have Write permission on Network Settings.
Network ProfilesCommon site-wide network settings such as AAA, NTP, DHCP, DNS, Syslog, SNMP, and Telemetry. Users with this role can add an SFTP server and modify the Network Resync Interval in System Settings.
Note: To create wireless profiles, you must have Write permission on Network Profiles.
Network SettingsManage virtual networks (VNs). Segment physical networks into multiple logical networks for traffic isolation and controlled inter-VN communication.
Virtual NetworkConfigure, upgrade, provision, schedule, and manage your network devices.
Network ProvisionManage compliance provisioning.
ComplianceUpgrade a software image on devices after a complete upgrade lifecycle.
Image UpdateDiscover, add, replace, or delete devices on your network while managing device attributes and configuration properties.
Note: To replace a device, you must have Write permission on Network Provision > PnP.
Inventory ManagementUnified view of your software and network assets relative to license usage and compliance. The role also controls permissions for cisco.com and Smart accounts.
LicenseEnable or disable the collection of application telemetry from devices. Configure the telemetry settings associated with the assigned site. Configure other settings like wireless service assurance and controller certificates.
Note: To enable or disable network telemetry, you must have Write permission on Provision.
Network TelemetryAutomatically onboard new devices, assign them to sites, and configure them with site-specific contextual settings.
PnPProvision devices with the site-specific settings and policies that are configured for the network. This role includes Fabric, Application Policy, Application Visibility, Cloud, Site-to-Site VPN, Network/Application Telemetry, Stealthwatch, and Umbrella provisioning.
On the main dashboards for rogue and aWIPS, you can enable or disable certain actions, including rogue containment.
Note: To provision devices in sites that have network profiles attached, you must have at least Read permission on Network Profiles.
ProvisionProvision services in your network.
Network ServicesDeploy, manage, and monitor virtualized and container-based applications running on network devices.
App HostingEnable the wide-area Bonjour service across your network to enable policy-based service discovery.
BonjourConfigure network elements to send data to Cisco Stealthwatch to detect and mitigate threats, even in encrypted traffic.
To provision Stealthwatch, you must have Write permission on the following components:
  • Network Design > Network Settings
  • Network Provision > Provision
  • Network Provision > Scheduler
  • Network Services > Stealthwatch
StealthwatchConfigure network elements to use Cisco Umbrella as the first line of defense against cybersecurity threats.
To provision Umbrella, you must have Write permission on the following components:
  • Network Design > Network Settings
  • Network Provision > Provision
  • Network Provision > Scheduler
  • Network Services > Stealthwatch
You must also have Read permission on Advanced Network Settings.
UmbrellaOpen platform for accessible intent-based workflows, data exchange, notifications, and third-party app integrations.
PlatformDrive value by accessing Cisco DNA Center through REST APIs.
APIsEnhance productivity by configuring and activating preconfigured bundles for ITSM integration.
BundlesSubscribe to get notified in near real time about network and system events of interest and initiate corrective actions.
You can configure email and syslog logs in System Settings > Destinations.
EventsGenerate reports using predefined reporting templates for all aspects of your network.
Generate reports for rogue devices and for aWIPS.
You can configure webhooks in System Settings > Destinations.
ReportsManage and control secure access to the network.
SecurityManage group-based policies for networks that enforce segmentation and access control based on Cisco security group tag. This role includes Endpoint Analytics.
Group-Based PolicyManage IP-based access control lists that enforce network segmentation based on IP addresses.
IP-Based Access ControlScan the network for security advisories. Review and understand the impact of published Cisco security advisories that may affect your network.
Security AdvisoriesCentralized administration of Cisco DNA Center, which includes configuration management, network connectivity, software upgrades, and more.
SystemConfigure automatic updates to the machine reasoning knowledge base to rapidly identify security vulnerabilities and improve automated issue analysis.
Machine ReasoningManage core system functionality and connectivity settings. Manage user roles and configure external authentication.
This role includes Integrity Verification, Proxy Config, Device EULA, HA, Integration Settings, Disaster Recovery, Debugging Logs, Telemetry Collection, System EULA, IPAM, vManage Servers, Backup & Restore, and Data Platform.
System ManagementOne-stop-shop productivity resource for the most commonly used troubleshooting tools and services.
UtilitiesDetailed log of changes made via UI or API interface to network devices or Cisco DNA Center.
Audit LogInitiate logical and automated troubleshooting for network issues while drawing on the knowledge wealth of network domain experts.
Network ReasonerIntegrated with other back-end services, scheduler lets you schedule tasks such as deploy policies, provision network devices, or upgrade.
You can also schedule rogue containment.
SchedulerSearch for various objects in Cisco DNA Center, such as sites, network devices, clients, applications, policies, settings, tags, menu items, and more.
Search

Display Role-Based Access Control Statistics

You can display statistics that show how many users belong to each user role. You can also drill down to view the list of users who have a selected role.

  1. In the Cisco DNA Center GUI, click the Menu icon (≡) and choose System > Users & Roles > Role Based Access Control. All default user roles and custom roles are displayed.
  2. Click the number corresponding to each user role to view the list of users who have that role.

Configure External Authentication

If you are using an external server for authentication and authorization of external users, you should enable external authentication in Cisco DNA Center.

Before you begin

Only a user with SUPER-ADMIN-ROLE permissions can perform this procedure. For more information, see About User Roles.

You must configure at least one authentication server.

Note

The external authentication fallback behavior has changed in this Cisco DNA Center release. In releases earlier than 2.1.x, when external authentication is enabled, Cisco DNA Center falls back to local users if the AAA server is unreachable or the AAA server rejects an unknown username. In the current release, Cisco DNA Center does not fall back to local users if the AAA server is unreachable or the AAA server rejects an unknown username.

To enable external authentication fallback, SSH to the Cisco DNA Center instance and enter the following CLI command:
magctl rbac external_auth_fallback enable

Procedure

  1. In the Cisco DNA Center GUI, click the Menu icon (≡) and choose System > Users & Roles > External Authentication.
  2. To enable external authentication in Cisco DNA Center, check the Enable External User check box.
  3. (Optional) Configure the AAA attribute.
  4. For TACACS authentication, the following AAA attributes are supported:
Cisco DNA CenterTACACS
Emptycisco-av-pair
cisco-av-paircisco-av-pair
Cisco-AVPairCisco-AVPair
  1. For RADIUS authentication, the following AAA attributes are supported:
Cisco DNA CenterRADIUS
Emptycisco-av-pair
Cisco-AVPaircisco-av-pair
  1. In the AAA Attribute field, enter the appropriate attribute for your use case, as described in the preceding tables.
  2. Click Update.
  3. (Optional) Configure the AAA server or servers. Configure these settings only if you want to swap the current primary or secondary AAA servers or define different AAA servers. In the Cisco DNA Center GUI, click the Menu icon (≡) and choose System > Settings > External Services > Authentication and Policy Servers to open the Authentication and Policy Servers window.
  4. From the Primary AAA Server IP Address drop-down list, choose the IP address of one of the preconfigured AAA servers.
  5. From the Secondary AAA Server IP Address drop-down list, choose the IP address of one of the preconfigured AAA servers.
  6. (Optional) If you are using a Cisco ISE server, you can update the settings, if necessary. For information about Cisco ISE policies, see "Configure and Manage Policies" in the Cisco Identity Services Engine Administrator Guide.

Table 2: Cisco ISE Server Settings

NameDescription
Shared SecretKey for device authentications. The shared secret can contain up to 100 characters.
UsernameName that is used to log in to the Cisco ISE CLI.
PasswordPassword for the Cisco ISE CLI username.
FQDNFully qualified domain name (FQDN) of the Cisco ISE server. The FQDN consists of two parts, a hostname and the domain name, in the following format: hostname.domainname.com For example, the FQDN for a Cisco ISE server might be ise.cisco.com.
Subscriber NameA unique text string--for example, acme--that is used during Cisco DNA Center-to-Cisco ISE integration to set up a new pxGrid client in Cisco ISE.
Virtual IP Address(es)Virtual IP address of the load balancer behind which the Cisco ISE policy service nodes (PSNs) are located. If you have multiple PSN farms behind different load balancers, you can enter a maximum of six virtual IP addresses.
  1. (Optional) To update advanced settings, click View Advanced Settings and update the settings, if necessary.

Table 3: AAA Server Advanced Settings

NameDescription
ProtocolTACACS or RADIUS.
Authentication PortPort used to relay authentication messages to the AAA server.
  • For RADIUS, the default is UDP port 1812.
  • For TACACS, the port is 49 and cannot be changed.
Accounting PortPort used to relay important events to the AAA server. The information in these events is used for security and billing purposes.
  • For RADIUS, the default UDP port is 1813.
  • For TACACS, the port is 49 and cannot be changed.
RetriesNumber of times that Cisco DNA Center can attempt to connect with Cisco ISE.
TimeoutLength of time that Cisco DNA Center waits for Cisco ISE to respond. The maximum timeout value is 60 seconds.
  1. Click Update.

Two-Factor Authentication

Two-factor authentication, also known as 2FA, adds another layer of security to user verification by using an identifier method in addition to a user's name and password. The identifier method is generally something that only the actual intended user possesses (such as a phone app or keyfob) and is intentionally separated from the original login method.

The Cisco DNA Center implementation of two-factor authentication supports the use of a token client (that generates single-use token codes after the appropriate PIN is entered), a token server (that validates token codes), and an authentication server to manage user access. Authentication can be handled using either the RADIUS or TACACS+ protocol.

The topics in this section describe:

Prerequisites for Two-Factor Authentication

The following prerequisites must be in place in order to set up two-factor authentication for use with Cisco DNA Center:

Two-Factor Authentication Workflow

Here is a summary of what happens when a user logs in to a Cisco DNA Center appliance on which two-factor authentication has been configured:

  1. In an RSA SecurID token client, a user enters their PIN to get a token code.
  2. In the Cisco DNA Center login page, they enter their username and token code.
  3. Cisco DNA Center sends the login request to Cisco ISE using either the RADIUS or TACACS+ protocol.
  4. Cisco ISE sends the request to the RSA Authentication Manager server.
  5. RSA Authentication Manager validates the token code and informs Cisco ISE that the user has been authenticated successfully.
  6. Cisco ISE matches the authenticated user with their configured authorization profile and returns the role=NETWORK-ADMIN-ROLE attribute-value pair.
  7. Cisco DNA Center grants access to the features and pages associated with the user's role-based access control (RBAC) role.

Configure Two-Factor Authentication

To configure two-factor authentication on your Cisco DNA Center appliance, complete the following procedure.

Step 1: Integrate RSA Authentication Manager with Cisco ISE

  1. In RSA Authentication Manager, create two users: cdnac_admin (for the Admin user role) and cdnac_observer (for the Observer role). For more information, see the "Add a User to the Internal Database" topic in the RSA Self-Service Console Help. To access this topic, do the following:
    1. Open the RSA Self-Service Console Help.
    2. In the Search help field, enter Add a User to the Internal Database and then click Search help.
  2. Create a new authentication agent. For more information, see the "Add an Authentication Agent" topic in the RSA Self-Service Console Help.
  3. Generate the Authentication Manager agent configuration file (sdconf.rec):
    1. From the RSA Security Console, choose Access > Authentication Agents > Generate Configuration File. The Configure Agent Timeout and Retries tab opens.
    2. For the Maximum Retries and Maximum Time Between Each Retry fields, use the default values.
    3. Click Generate Configuration File. The Download Configuration File tab opens.
    4. Click the Download Now link.
    5. When prompted, click Save to Disk to save a local copy of the zip file.
    6. Unzip the file and use this version of the sdconf.rec file to overwrite the version that is currently installed on the agent.
  4. Generate a PIN for the cdnac_admin and cdnac_observer users you created in Step 1a. For more information, see the "Create My On-Demand Authentication PIN" topic in the RSA Self-Service Console Help.
  5. Start Cisco ISE, choose Administration > Identity Management > External Identity Sources > RSA SecurID, and then click Add.
  6. In the RSA SecurID Identity Sources page, click Browse, choose the sdconf.rec file you downloaded, and then click Open.
  7. Check the Reauthenticate on Change PIN check box, then click Submit.

Step 2: Create Authorization Profiles

Create two authorization profiles, one for the Admin user role and one for the Observer user role.

  1. In Cisco ISE, choose Policy > Policy Elements > Results > Authorization > Authorization Profiles.
  2. For both profiles, enter the following information:
    • Name field: Enter the profile's name.
    • Access Type field: Choose ACCESS_ACCEPT.
    • Advanced Attributes Settings area: Choose Cisco:cisco-av-pair from the first drop-down list. If you are creating an authorization profile for the Admin user role, choose Role=NETWORK-ADMIN-ROLE from the second drop-down list. If you are creating an authorization profile for the Observer user role, choose Role=OBSERVER-ROLE from the second drop-down list.

Step 3: Create Authentication Policy

Create an authentication policy for your Cisco DNA Center appliance. In the Cisco Identity Services Engine Administrator Guide, see the "Configure Authentication Policies" topic.

Step 4: Create Authorization Policies

Create two authorization policies, one for the Admin user role and one for the Observer user role. In the Cisco Identity Services Engine Administrator Guide, see the "Configure Authorization Policies" topic.

Step 5: Verify Token Assignment

In the RSA Authentication Manager Security Console, verify that software tokens have been assigned to both users. For more information, see the "View a Token" topic in the RSA Self-Service Console Help. Note If you need to assign tokens, complete the steps described in the "Assign a Software Token to a User" topic.

Enable Two-Factor Authentication Using RADIUS

To enable two-factor authentication that uses a Cisco ISE server configured for RADIUS, complete the following procedure:

  1. Integrate Cisco ISE with Cisco DNA Center. In the Cisco DNA Center Installation Guide, see the "Integrate Cisco ISE with Cisco DNA Center" topic.
  2. Configure Cisco DNA Center to use your Cisco ISE server for authentication. See Configure External Authentication. Important Ensure that you specify the same shared secret for both Cisco ISE and Cisco DNA Center.

Enable Two-Factor Authentication Using TACACS+

To enable two-factor authentication that uses a Cisco ISE server configured for TACACS+, complete the following procedure:

  1. In Cisco ISE, choose Administration > Network Resources > Network Devices to open the Network Devices window.
  2. Click TACACS Authentication Settings to view its contents and ensure that a shared secret has already been configured for the Cisco DNA Center device you added previously.
  3. Choose Work Centers > Device Administration > Policy Elements to open the TACACS Profiles window.
  4. Create TACACS+ profiles for the cdnac_admin and cdnac_observer user roles:
    1. Click Add.
    2. Complete the following tasks:
      • Enter the profile's name.
      • After clicking the Raw View tab, enter the following text into the Profile Attributes text box:
        • For the cdnac_admin user role, enter Cisco-AVPair=ROLE=NETWORK-ADMIN-ROLE
        • For the cdnac_observer user role, enter Cisco-AVPair=ROLE=OBSERVER-ROLE
    3. Click Save.
  5. Integrate Cisco ISE with Cisco DNA Center. In the Cisco DNA Center Installation Guide, see the "Integrate Cisco ISE with Cisco DNA Center" topic.
  6. Configure Cisco DNA Center to use your Cisco ISE server for authentication. See Configure External Authentication. Important Ensure that you specify the same shared secret for both Cisco ISE and Cisco DNA Center.

Log In Using Two-Factor Authentication

To log in to Cisco DNA Center using two-factor authentication, complete the following procedure:

  1. From the Cisco DNA Center login page, enter the appropriate username.
  2. Open the RSA SecurID token client and enter the PIN you configured previously to generate a one-time token.
  3. Copy this token and paste it in to the Cisco DNA Center login page's Password field.
  4. Click Log In.

Display External Users

You can view the list of external users who have logged in through RADIUS/TACACS for the first time. The information that is displayed includes their usernames and roles.

  1. In the Cisco DNA Center GUI, click the Menu icon (≡) and choose System > Users & Roles > External Authentication.
  2. Scroll to the bottom of the window, where the External Users area lists the external users.
Models: DNA Center, DNA Center, Center

File Info : application/pdf, 16 Pages, 1.18MB

PDF preview unavailable. Download the PDF instead.

b cisco dna center admin guide 2 2 2 chapter 0100

References

DITA Open Toolkit XEP 4.30.961; modified using iText 2.1.7 by 1T3XT

Related Documents

Preview Manage Users in Catalyst Center
This document provides a comprehensive guide to managing users within Cisco Catalyst Center, covering user profile creation, role assignment, password management, and external authentication configurations.
Preview Cisco DNA Center on AWS Deployment Guide
Deploy Cisco DNA Center on AWS with this comprehensive guide covering automated deployment via Cisco DNA Center VA Launchpad, manual deployment using AWS CloudFormation, and AWS Marketplace, including prerequisites and troubleshooting.
Preview Cisco SD-WAN Data Sheet
This data sheet provides an overview of Cisco SD-WAN, a secure, cloud-scale architecture for intent-based networking. It details the solution's features, benefits, prominent innovations, software capabilities, licensing options, and integration with Cisco Umbrella and ThousandEyes.
Preview Cisco DNA Center Cloud User Guide for EFT
User guide for Cisco DNA Center Cloud for EFT, providing comprehensive instructions on network management, device onboarding, site configuration, monitoring, and troubleshooting for Cisco networking solutions.
Preview Cisco Catalyst SD-WAN Licensing Guide
This document provides a comprehensive guide to DNA licensing for Cisco Catalyst SD-WAN, covering subscription benefits, licensing models, and configuration steps for various Cisco routing platforms.
Preview Cisco Wide Area Bonjour Application on Cisco DNA Center User Guide
This user guide provides comprehensive information on the Cisco Wide Area Bonjour Application, detailing its features, workflow, and supported platforms for network administrators. Learn how to configure and manage Bonjour services across Layer-3 wired and wireless networks using Cisco DNA Center.
Preview Cisco Wireless Network Solution Guide
A comprehensive guide to Cisco's wireless network solutions, covering architecture, RF planning, security, mobility, and more. This document focuses on the Cisco wireless on-premises solution managed by Cisco DNA Center, highlighting its secure, scalable, and cost-effective approach to enterprise mobility.
Preview Cisco Catalyst 9136 Series Access Points Deployment Guide
A comprehensive deployment guide for Cisco Catalyst 9136 Series Access Points, covering Wi-Fi 6E technology, hexa-radio architecture, installation, configuration, and advanced features like IoT integration and AI/ML-driven scanning.