Cisco Cisco Prime Network 3.10 Installation Guide

Page of 34
26
Note
Click Mask if you do not want your entries to be displayed in clear text. The Confirm field will be enabled so 
that you can confirm your Run entry.
c.
Click Add. The prompt-run sequence line is added to the table.
d.
Continue to add lines as necessary, ending with a line that includes only the prompt.
For examples of how to enter the Telnet login sequence, see “Telnet and SSH Login Sequences: Notes and Examples” 
in the 
.
Note
Telnet is the default protocol used for network element access (reachability) and modeling. The assumption in 
this guide is that you will not be using SSH for this purpose. It is also assumed that you will not be using ICMP 
polling.
Step 6
Click OK to create the VNE.
Timesaver
For similar VNEs, use the Clone VNE feature. Add the first VNE, then right-click on it and select Clone VNE
Specify the VNE name and IP address; other definitions are copied from the source VNE and you can change them 
if necessary.
Set Up Users and Security
Cisco Prime Network uses two methods to control user access and security:
Security access roles determine the actions a user can perform in the GUI clients
Scopes determine which devices a user can access, and the actions they can perform on those devices.
When you create a user in the system, you assign one user access role and one or more scopes to the user.
Prime Network provides five predefined security access roles that can be assigned to users:
Viewer—Read-only access to Prime Network Vision to view devices, links, events and inventory.
Operator—Can perform most day-to-day business operations, such as managing alarms, manipulating maps, viewing 
network-related information, and managing business tags.
OperatorPlus—Can manage the alarm lifecycle, in addition to the functions available to the Operator. 
Configurator—Can perform tasks and tests related to configuration and activation of services, through Command Builder, 
Configuration Archive, NEIM, and activation commands.
Administrator—Full access to all devices and system functions. Only the Administrator has access to Prime Network 
Administration and Prime Network Events.
For details about the tasks available for the different user roles and scopes, see “Managing User Security: Roles and Scopes” in 
the 
.
Add Scopes
Scopes are groups of network elements. Using scopes, you can determine the devices to which users have access. Each scope has 
a security level that determines which actions the user can take on the devices in the scope. 
It is useful to create scopes before creating users so that the scopes will be readily available for assigning to the users. You can 
also create scopes on-the-fly during the user creation process.
To create a scope:
Step 1
Right-click on Scopes in the Prime Network Administration navigation tree, and select New Scope.
Step 2
Enter a unique identifying name for the scope in the Scope field.