Specifications

© 2006 Cisco Systems, Inc.
All rights reserved.
Product Features 2-32
NAM / Traffic Analyzer v3.5 Tutorial
© 2006 Cisco Systems, Inc. All rights reserved.
Product Features 2-32
NAM / Traffic Analyzer v3.5 Tutorial
Planning for NAM Deployment
Users, Security, and NAM Access
Planning for NAM Deployment
Users, Security, and NAM Access
Define security policies to protect
your data requirements.
Which users should have access to which features?
third
third
-
-
Party
Party
Management
Management
Systems
Systems
Enable third-party management systems
to communicate with the NAM via SNMP
community strings.
Define security policies that meet
your security needs and NAM
users’ functional requirements.
NAM
Users, Security, and NAM Access Considerations
Network management systems are a funny thing when it comes to security and access. You may need to
define different levels of security to meet your users’ varying needs. In-depth configuration and customization
of the NAM to deliver the monitoring needed requires a certain level of access. Whereas monitoring and
reporting features of the NAM often serve a broad range of users who have different security requirements.
These issues may be true of the NAM in your environment because you may want to give many users
access to some parts of the NAM and secure other parts. However, giving unlimited access to all the NAM
features could undermine the very purpose for deploying NAMs in the first place. The problem is this: As
discussed earlier, the data you get from the NAM is only as good as your planning for and configuration of it.
So, if you give configuration access to all your users, you will not be able to guarantee that the collections
you configured a week ago will still be the same when you go to review the performance of your network. For
example, let’s say you have configured the NAM for alarming and event notification on a data source for
historical reporting. Any changes made to the NAM may disable the alarms you rely on for notification or the
data sources you are using for monitoring. So, when planning for the NAM deployment, consider who should
have access to its configuration utilities and who simply needs access to the reports. Doing so will help
ensure that the NAM will continue to deliver the data you need.