Configuring after installation
After installing the BMC Network Automation product, you must perform the following post-installation configuration tasks, as applicable:
Configuring after installation task | For more information | Benefit |
---|---|---|
Perform a quick start configuration | Performing a quick start configuration | Review the topics in this section to view example procedures related to establishing a quick start stand-alone BMC Network Automation configuration. |
Configure system-wide attributes | Configuring system-wide attributes | Review the topics in this section to perform some of the following tasks and other tasks:
|
Configure devices, realms, and groups | Configuring network spans | Review the topics in this section to perform the following tasks: |
Configure policies | Configuring policies | Provides overview information about about factory-installed policies. |
Configure rules | Configuring rules | Provides overview information about about rules. |
Enable the virtual data center (VDC) | Enabling the Virtual Data Center | Review this topic to enable the VDC during installation or upgrade. |
Configure syslog servers to forward events | Review the topics in this section to perform the following tasks:
| |
Configure your environment for restricted security | Configuring enhanced security | Describes how to configure enhanced security for your BMC Network Automation environment and changes in BMC Network Automation to support FIPS 140-2. |
Establish the OS image library | Establishing the OS image library | Provides overview information about binary images by vendor and their use in the Deploy OS Image action. |
Verify that the BMC Network Automation system is correctly configured | Performing the initial configuration snapshot | Review the topics in this section to perform the following tasks: |
Comments
Log in or register to comment.