Configuring after installation
After installing the TrueSight Network Automation product, you must perform the following post-installation configuration tasks, as applicable:
Configuring after installation task | For more information | Benefit |
---|---|---|
Perform a quick start configuration | Review the topics in this section to view example procedures related to establishing a quick start stand-alone Network Automation configuration. | |
Configure system-wide attributes | Review the topics in this section to perform some of the following tasks and other tasks:
| |
Configure devices, realms, and groups | Review the topics in this section to perform the following tasks: | |
Configure policies | Provides overview information about about factory-installed policies. | |
Configure rules | Provides overview information about about rules. | |
Configure syslog servers to forward events | Review the topics in this section to perform the following tasks:
| |
Configure your environment for restricted security | Describes how to configure enhanced security for your Network Automation environment and changes in TrueSight Network Automation to support FIPS 140-2. | |
Establish the OS image library | Provides overview information about binary images by vendor and their use in the Deploy OS Image action. | |
Verify that the Network Automation system is correctly configured | Review the topics in this section to perform the following tasks: |