Important

   

Starting version 8.9.03, BMC Network Automation is renamed to TrueSight Network Automation. This space contains information about BMC Network Automation 8.9.02 and previous versions. For TrueSight Network Automation 8.9.03 and later releases, see the TrueSight Network Automation documentation.

Configuring after installation

After installing the BMC Network Automation product, you must perform the following post-installation configuration tasks, as applicable:

Configuring after installation task
For more information
Benefit
Perform a quick start configurationPerforming a quick start configuration

Review the topics in this section to view example procedures related to establishing a quick start stand-alone BMC Network Automation configuration.

Configure system-wide attributesConfiguring system-wide attributes

Review the topics in this section to perform some of the following tasks and other tasks:

  • Configure user roles and accounts
  • Configure email lists
  • Configure job approval types
Configure devices, realms, and groupsConfiguring network spans

Review the topics in this section to perform the following tasks:

Configure policiesConfiguring policiesProvides overview information about about factory-installed policies.
Configure rulesConfiguring rulesProvides overview information about about rules.
Enable the virtual data center (VDC)Enabling the Virtual Data CenterReview this topic to enable the VDC during installation or upgrade.
Configure syslog servers to forward events

Review the topics in this section to perform the following tasks:

  • Configure an existing Kiwi Syslog Server
  • Configure an existing Linux syslogd server
  • Configure an existing syslog-ng server
Configure your environment for restricted securityConfiguring enhanced security

Describes how to configure enhanced security for your BMC Network Automation environment and changes in BMC Network Automation to support FIPS 140-2.

Establish the OS image libraryEstablishing the OS image libraryProvides overview information about binary images by vendor and their use in the Deploy OS Image action.
Verify that the BMC Network Automation system is correctly configuredPerforming the initial configuration snapshot

Review the topics in this section to perform the following tasks:

Was this page helpful? Yes No Submitting... Thank you

Comments