cc/td/doc/product/rtrmgmt/ip_mgr
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Network Organization

Network Organization

Overview of Network Management

The Cisco IP Manager software utilizes five distinct information units to model a network management working environment:

Domains provide a hierarchical organizational structure for the management of elements (devices) and templates. Templates and associated data are the means by which configurations are generated for devices, either individually or as a group.

Individual users derive their access levels (permissions to manipulate domains, elements and templates) from the permission group to which they belong.

Users and permission groups are created and managed by a single user entity, the CIPM administrator, known to the system as admin.

Domains

Domains are the organizational containers in which elements and templates are created and maintained.

The system always includes at least one domain, the root domain. This domain is reserved for system use. It is a special-purpose domain that serves as the starting point and common ancestor for other top-level domains.

Elements

When elements---network devices, such as routers---are created within the Cisco IP Manager system, they are associated with a specific domain. Any user who has sufficient access to the elements within a domain can configure those elements from a template that is created in any other domain that the user can access.

Templates

Templates are the means by which configurations can be built and reproduced in multiple quantities. A template consists of a template body and a template data object. The template body contains text made up of the static portion of the configuration---text that does not change from device to device (the Cisco IOS commands)---and the variable names that will be replaced by data values.

The template data object contains the data values that are used in place of the variable names when configurations are generated.

Templates are created as objects within specific domains, but a template can be used to configure devices in any domain if the user belongs to a group that has sufficient permission.

A template can reference another template. The referenced template is called a subtemplate.

The subtemplate must be in the same domain as the calling template or in a domain higher in the domain hierarchy (must be in a direct line of ancestry from the calling template's domain---that is, it cannot be in a subdomain of any of the ancestor domains).

Templates can be nested only one level deep. A subtemplate cannot reference another subtemplate.

Users

When you create a user, you are only providing the system with a name and password for the user entity, which can be either a person or an application. Users derive working privileges (access to domains, elements, and templates) from the permission group to which they are assigned. A user can belong to only a single permission group.

Only the admin user can create or modify a user profile.

Permissions Groups

User access to domains, elements, and templates is controlled by the permissions that are granted to permission groups.

Permissions describe what level of access is permitted for various resources; a permissions group defines the permissions that are assigned to its members. Every user who is included in a group has all of the access privileges granted to that group.

Only the admin user can create a permissions group and assign or modify privileges.

Permissions are granted as follows (in any combination):

To work on an element or a template, the user must belong to a group that has been given the appropriate access to the element or template and has been given at least read access to the domain in which the element or template resides.

Permissions descend downward from the topmost domain in which the group has rights.

Consider the following example:

domainA
   subdomainA-1
   subdomainA-2
      subdomainA-2.1
domainB
   subdomainB-1
 

If a permission group is granted the right to create and delete elements and templates in domainA only, users in that group can also create and delete elements and templates in subdomainA-1, subdomainA-2 and subdomainA-2.1, but not in either domainB or subdomainB-1.

If the permission group is granted permission to create domains in domainA, users in that group automatically gain the right to create subdomains in any of the domains that exist within domainA.

If the permission group is granted permission to delete domains in domainA, users in that group automatically gain the right to delete any domains within domainA.

Once a domain has been created, however, the administrator can change these inherited permissions.

Granting Useful Permissions

When the administrator creates domains, for these domains to be useful for nonadministrative users, the permissions create, read, and modify should be granted. Create permission is necessary for domain creation, read permission is required to get the content of the domain, and modify permission is needed to assign the NEM server in the domain.

Element Manager Gateway Considerations

The three element manager gateways (NEMServer, SGServer, and TGServer) must be on a machine that has LAN access to devices it is handling.

To listen for SNMP traps, the SNMP Gateway Server (SGServer) needs to be run as root and listening on UDP port 162. No other process on the same machine can listen on this port once the SGServer is running.

GUI Application

The graphical user interface (GUI) application provides the following tools for working with the network resources described previously:

For information on running the GUI, see the chapter "Running the GUI."

For information about creating and managing domains and elements, see the chapter "Managing Network Elements."

For information about working with templates, see the chapter "Managing Templates."

For information about managing users and permission groups and about the log viewer, see the chapter "System Administration and Log Management."

For information about the archive manager, see the chapter "Archive Administration."


hometocprevnextglossaryfeedbacksearchhelp
Posted: Mon Feb 14 14:15:46 PST 2000
Copyright 1989 - 2000©Cisco Systems Inc.