|
|
The CiscoWorks2000 Server includes tools required to properly set up the server to support other CiscoWorks2000 applications. These features include:
Several CiscoWorks2000 network management and application management operations are potentially disruptive to either the network or to the applications themselves and must be protected.
To prevent such operations from being used accidentally or maliciously, CiscoWorks2000 uses a multilevel security system that only allows access to certain features to users who can authenticate themselves at the appropriate level.
CiscoWorks2000 provides two predefined login IDs, but you create additional unique login IDs for users at your company:
![]() |
Note The login named admin is the equivalent of the superuser login for CiscoWorks2000. This login provides access to all CiscoWorks2000 tasks. |
System administrators determine user security levels when they are granted access to CiscoWorks2000. When users are granted logins to the CiscoWorks2000 application, they are assigned one or more roles. The user role or combination of roles dictates which CiscoWorks2000 applications are presented to the user on the navigation tree. shows available security levels.
| Level | Description |
|---|---|
0 | |
1 | |
2 | |
4 | |
8 |
Other roles are displayed, depending on your applications. For example, two additional user roles (Developer and Export Data) are displayed in the security user account windows. These roles are available only for Management Connection and third-party developers.
To see which security levels are allowed to use the CiscoWorks2000 applications, run the CiscoWorks2000 Server>Setup>Security>Permissions Report.
Users can perform some tasks for their own accounts, but most security tasks require system administrator role privileges. When performing these security tasks (see Table 3-2), consider the following:
| Task | Purpose | Action |
|---|---|---|
| All Users | ||
View role permissions. | Displays predetermined set of applications, tools, and product features each user role can access | CiscoWorks2000 Server>Setup>Security> Permissions Report |
Change password. | Allows users to modify their account password | CiscoWorks2000 Server>Setup>Security> Modify My Profile |
| Admin Tasks | ||
Add a user. | Creates a new user and provides appropriate user access level to CiscoWorks2000 | CiscoWorks2000 Server>Setup> |
Delete a user. | Removes user from list | CiscoWorks2000 Server>Setup> |
Modify a user. | Allows updates to user information, such as email address, login name, password, and access level | CiscoWorks2000 Server>Setup> |
View other logged-in users. | Displays information about currently logged in CiscoWorks2000 users and allows users to send a broadcast message to others | CiscoWorks2000 Server>Setup> |
Modify authentication module. | Allows the addition of new users by using another source of authentication, such as directory service | CiscoWorks2000 Server > Security > |
Pluggable authentication using the CiscoWorks2000 Server security feature allows administrators to authenticate users by another source of authentication, such as a directory service. CiscoWorks2000 provides several standard pluggable authentication modules that allow the administrator of the CiscoWorks2000 Server to authenticate any CiscoWorks2000 login with NT, UNIX, TACACS+, Radius or other authentication sources.
Three login module fall back options are available on all platforms. Fall back options allow you to access the software should you accidentally lock yourself or others out. Table 3-3 describes the login module fall back options.
| Option | Description |
|---|---|
Allow all CiscoWorks2000 Local users to fall back to the CiscoWorks2000 Local login. | All users can access CiscoWorks2000 using the Local login if the current login module fails. |
Only allow the following user(s) to fall back to the CiscoWorks2000 Local login if preceding login fails: xxxx. | Specified users can access CiscoWorks2000 using the Local login if the current login module fails. Use commas between user names. |
Allow no fall backs to the CiscoWorks2000 Local login. | No access is allowed if the current login module fails. |
It is recommended that you select the option that allows specific users to fall back to the CiscoWorks2000 Local login if a preceding login fails. This way, if your server cannot authenticate the user, and the user has a local CiscoWorks2000 account, the CiscoWorks2000 Local login module authenticates the same name and password. If authentication occurs, the user can access CiscoWorks2000 even if their first-choice server is down. You may also want to test the new login module by having a user log in using the new authentication module.
![]() |
Note The administrator needs to add users with more than guest privileges when choosing no local authentication source. If the system falls back to the local authentication choice a full set of user IDs and passwords is necessary. |
Depending on your platform, different login module features are available (see Table 3-4).
| Module | Available on UNIX1 | Available on Windows NT |
|---|---|---|
CiscoWorks2000 Local | X | X |
UNIX System Module | X |
|
NT Local |
| X |
Microsoft Active Directory | X | X |
Netscape LDAP | X | X |
Radius | X | X |
TACACS+ | X | X |
| 1This includes the Solaris platform, but will also include other platforms as new platforms are added to the CMF support. |
The following procedure describes how to select a specific login module. For information on selecting other login modules, refer to the online help.
Step 2 Select your option:
a. To view or change the current login module configuration, click Edit Options.
b. To select a different login module, click Next.
The Login Module Options window opens. Depending on your module, you might see one of the following modules:
Step 3 Enter the data into the fields and click Finish. To return to the previous window and modify your entries, click Back.
Step 4 After you change the login module, you do not have to restart CiscoWorks2000. The next person to login after the change automatically uses the new module. Changes to the login module are logged in the NMSROOT/objects,/jrun/
jsm-cw2000/logs directory.
![]() |
Note If you accidentally lock yourself out of the CiscoWorks2000 software after using this option, see the "Frequently Asked Questions" in the "Troubleshooting the CiscoWorks2000 Server" chapter. |
You can improve the performance of some CiscoWorks2000 applications by downloading and installing server files on your local machine. Whenever a client browser connects to a CiscoWorks2000 Server, you can choose to install Client Application Manager.
You can install Client Application Manager by selecting CiscoWorks2000 Server>Setup>Client Manager Admin or choosing to install when the Client Application Manager dialog box appears. This dialog box appears after you access a CiscoWorks2000 application that uses Client Application Manager.
If the Client Application Manager dialog box appears after you make a selection from the navigation tree, you can choose not to install it. Click on the check box to not show the message again and click No. If you do not select the check box, the dialog box appears each time you select an application that supports client-side installed files.
Some CiscoWorks2000 applications require the Asynchronous Network Interface (ANI) Server to automatically discover network devices. If your application does not use or require the ANI Server, it is not available in the navigation tree.
For applications that require the ANI Server, it is critical that you set up your network and the ANI Server to ensure that the network is properly discovered.
The Network Setup Overview table (see Table 3-5) provides an overview of the tasks required to ensure that ANI properly discovers your network. Detailed information and instructions are available in the online help (select CiscoWorks2000 > Setup > ANI Server Admin).
To perform these tasks, use the Command Line Interface (CLI) of the network devices in your network. Refer to the command reference guides for specific devices to obtain instructions about performing these tasks.
| Task | Purpose | ||
|---|---|---|---|
| Required for Device and Physical Topology Discovery | |||
Upgrade software versions on devices. | To ensure that ANI Server successfully discovers and supports your network devices, upgrade your device software to the latest general deployment (GD) software release. | ||
Verify connectivity to seed devices. | The workstation on which ANI Server is installed must have connectivity to the seed devices in your network. If devices are not reachable, they cannot be discovered. | ||
Enable SNMP. | ANI communicates with network devices using SNMP. | ||
Enable Cisco Discovery Protocol. | ANI Server uses Cisco Discovery Protocol (CDP) to discover your network devices and layout. | ||
Set unique sysName variable on devices. | Using CDP, ANI identifies Cisco IOS devices by the sysName variable. If multiple devices share the same sysName variable, the devices cannot be discovered properly. | ||
Enable ILMI on ATM devices. | ANI Server uses Integrated Local Management Interface (ILMI) to discover the ATM devices in your network. | ||
Configure DNS. | ANI uses Domain Name Services (DNS), if available, to perform device name lookups. If DNS is not available, ANI uses IP addresses. If you use DNS, ensure that all devices have unique host names and that DNS is properly configured. | ||
| Required for Logical (VLAN and LANE) Discovery | |||
| |||
Configure VLAN Trunk Protocol. | VLAN Trunk Protocol (VTP), and at least one VTP Server per VTP domain is required to discover, display, and configure VLANs. | ||
Configure VLAN trunks on Fast Ethernet and Gigabit Ethernet. | If a switch is connected to Fast Ethernet links and you want to configure it to carry more than one VLAN, you must enable ISL or IEEE 802.1Q. | ||
Create the default LANE configuration server for ATM devices. | If you are running LAN Emulation (LANE) in your network, you must set up the main configuration server. | ||
| Required for User Discovery | |||
| |||
Connect users and hosts to the network. | ANI can retrieve information about end-user devices and hosts only if those devices are actively connected to the network. Also, ANI can automatically collect user names only if users are actively connected to the network. | ||
| Required for Path Determination | |||
| |||
Enable source routing. | ANI might not be able to trace a reliable path between two end points if source routing is disabled on any intervening routers. | ||
Enable CDR logging on all Cisco Call Managers | The call detail record (CDR) provides information such as the IP address of the phones and gateways, telephone numbers of the involved parties, and the time that the call was made. This information is used to determine a path involving any Cisco Call Manager devices. | ||
The ANI Server automatically discovers devices in your network at a defined interval. To do this, the ANI Server must have access to your network devices and a discovery starting point (seed device).
You provide ANI access to your network devices by ensuring that the community strings on your devices are known to the ANI Server. The ANI Server uses your specified seed device (or a set of seed devices) to initiate discovery. See Table 3-6 for a description of these and other tasks you can perform with the ANI Server.
| Task | Purpose | Action |
|---|---|---|
| Required for Initial Discovery | ||
Verify community strings. | Allows the ANI Server access to your network devices. Default community strings are public for the read-only string and private for the read-write string. | CiscoWorks2000 Server>Setup> |
Add seed device. | Initiates network discovery. | CiscoWorks2000 Server>Setup> |
| Additional Tasks | ||
Schedule discovery and polling. | Sets the frequency of network discovery and polling. | CiscoWorks2000 Server>Setup> |
Modify SNMP settings. | Changes the number of SNMP retries and length of SNMP timeouts. | CiscoWorks2000 Server>Setup> |
Limit discovery. | Narrows the network discovery by IP address or VTP domain. | CiscoWorks2000 Server>Setup> |
Synchronize devices with Essentials. | Provides mechanism for sharing devices and device credentials with Resource Manager Essentials. | CiscoWorks2000 Server>Setup> |
Schedule user and host acquisition. | Sets the frequency of user name and host acquisition. | CiscoWorks2000 Server>Setup> |
Modify system resources dedicated to discovery. | Assigns more or fewer system resources to ANI discovery to affect time to complete. | CiscoWorks2000 Server>Setup> |
![]()
![]()
![]()
![]()
![]()
![]()
![]()
Posted: Wed Apr 5 14:49:34 PDT 2000
Copyright 1989 - 2000©Cisco Systems Inc.