Configuring after installation

After installing the TrueSight Network Automation product, you must perform the following post-installation configuration tasks, as applicable:

Configuring after installation task
For more information
Benefit
Perform a quick start configurationPerforming a quick start configuration

Review the topics in this section to view example procedures related to establishing a quick start stand-alone Network Automation configuration.

Configure system-wide attributesConfiguring system-wide attributes

Review the topics in this section to perform some of the following tasks and other tasks:

  • Configure user roles and accounts
  • Configure email lists
  • Configure job approval types
Configure devices, realms, and groupsConfiguring network spans

Review the topics in this section to perform the following tasks:

Configure policiesConfiguring policiesProvides overview information about about factory-installed policies.
Configure rulesConfiguring rulesProvides overview information about about rules.
Configure syslog servers to forward events

Review the topics in this section to perform the following tasks:

  • Configure an existing Kiwi Syslog Server
  • Configure an existing Linux syslogd server
  • Configure an existing syslog-ng server
Configure your environment for restricted securityConfiguring enhanced security

Describes how to configure enhanced security for your Network Automation environment and changes in TrueSight Network Automation to support FIPS 140-2.

Establish the OS image libraryEstablishing the OS image libraryProvides overview information about binary images by vendor and their use in the Deploy OS Image action.

Verify that the Network Automation system is correctly configured

Performing the initial configuration snapshot

Review the topics in this section to perform the following tasks:

Was this page helpful? Yes No Submitting... Thank you

Comments