CISCO DNA Center User Guide
- June 10, 2024
- Cisco
Table of Contents
- Cisco DNA Center Overview
- Web Content Accessibility Guidelines (WCAG) 2.1 AA Compliance
- Log In
- Complete the Quick Start Workflow
- User Profile Roles and Permissions
- Default Home Page
- Cisco DNA Center Journey Map
- View the Remote Support Authorization Dashboard
- Configure SSH Credentials
- Use Global Search
- Enable Localization
- Add a Window to My Favorites
- Manage My Favorites
- Subscribe to Cisco DNA Center Insights
- Read User Manual Online (PDF format)
- Download This Manual (PDF format)
DNA Center
User Guide
Cisco DNA Center Overview
Cisco Digital Network Architecture offers centralized, intuitive management that makes it fast and easy to design, provision, and apply policies across your network environment. The Cisco DNA Center GUI provides end-to-end network visibility and uses network insights to optimize network performance and deliver the best user and application experience.
Web Content Accessibility Guidelines (WCAG) 2.1 AA Compliance
Cisco DNA Center GUI complies with Web Content Accessibility Guidelines (WCAG)
2.1 AA standards.
Keyboard Accessibility Support
You can use a keyboard to access all interactive content in the Cisco DNA
Center GUI. People with physical disabilities who cannot use a mouse can
access and move between links, buttons, fields, and other controls using the
Tab key and other keystrokes.
Log In
Access Cisco DNA Center by entering its network IP address in your browser.
For compatible browsers, see the Cisco DNA Center Release Notes. This IP
address connects to the external network and is configured during the Cisco
DNA Center installation. For more information about installing and configuring
Cisco DNA Center, see the Cisco DNA Center Installation Guide.
You should continuously use Cisco DNA Center to remain logged in. If you are
inactive for too long, Cisco DNA Center logs you out of your session
automatically.
Step 1
Enter an address in your web browser’s address bar in the following format.
Here, server-ip is the IP address (or the hostname) of the server on which you
have installed Cisco DNA Center: https://server-ip
Example: https://192.0.2.1
Depending on your network configuration, you might have to update your browser
to trust the Cisco DNA Center server security certificate. Doing so will help
ensure the security of the connection between your client and Cisco DNA
Center.
Step 2
Enter the Cisco DNA Center username and password assigned to you by the system
administrator. Cisco DNA Center displays its home page.
If your user ID has the SUPER-ADMIN-ROLE and no other user with the same role
has logged in before, you will see a first-time setup wizard instead of the
home page.
Step 3
To log out, click the menu icon ( ) and choose Sign Out.
Complete the Quick Start Workflow
After you have installed and configured the Cisco DNA Center appliance, you
can log in to its GUI. Use a compatible, HTTPS-enabled browser when accessing
Cisco DNA Center.
When you log in for the first time as the admin superuser (with the username
admin and the SUPER-ADMIN-ROLE assigned), the Quick Start workflow
automatically starts. Complete this workflow to discover the devices that
Cisco DNA Center will manage and enable the collection of telemetry from those
devices.
Before you begin
To log in to Cisco DNA Center and complete the Quick Start workflow, you will
need: · The admin superuser username and password that you specified while
completing one of the following procedures in the Cisco DNA Center Second-
Generation Appliance Installation Guide:
- Configure the Primary Node Using the Maglev Wizard
- Configure an Appliance Using the Install Configuration Wizard (44- or 56-core appliance)
- Configure an Appliance Using the Install Configuration Wizard (112-core appliance)
- Configure the Primary Node Using the Advanced Install Configuration Wizard (44- or 56-core appliance)
- Configure the Primary Node Using the Advanced Install Configuration Wizard (112-core appliance)
- The information described in the installation guide’s Required First-Time Setup Information topic.
Step 1
After the Cisco DNA Center appliance reboot is completed, launch your browser.
Step 2
Enter the host IP address to access the Cisco DNA Center GUI, using HTTPS://
and the IP address of the Cisco DNA Center GUI that was displayed at the end
of the configuration process. After entering the IP address, one of the
following messages is displayed (depending on the browser you are using):
- Google Chrome: Your connection is not private
- Mozilla Firefox: Warning: Potential Security Risk Ahead
Step 3
Ignore the message and click Advanced. One of the following messages is
displayed:
-
Google Chrome:
This server could not prove that it is GUI-IP-address; its security certificate is not trusted by your computer’s
operating system. This may be caused by a misconfiguration or an attacker intercepting your connection. -
Mozilla Firefox:
Someone could be trying to impersonate the site and you should not continue. Websites prove their identity via certificates. Firefox does not trust GUI-IP- address because its certificate issuer is unknown, the certificate is self- signed, or the server is not sending the correct intermediate certificates.
These messages are displayed because the controller uses a self-signed
certificate. For information on how Cisco DNA Center uses certificates, see
the “Certificate and Private Key Support” section in the Cisco DNA Center
Administrator Guide.
Step 4
Ignore the message and do one of the following:
- Google Chrome: Click the Proceed to GUI-IP-address (unsafe) link.
- Mozilla Firefox: Click Accept the Risk and Continue.
The Cisco DNA Center login window opens.
Step 5
Do one of the following and then click Log In: · If you completed the
Maglev configuration wizard and chose the Start using DNAC pre manufactured
cluster option, enter the admin’s username (admin) and password (maglev1@3).
- If you completed the Maglev configuration wizard and chose the Start configuration of DNAC in advanced mode option, enter the admin’s username (admin) and password that you set when you configured your Cisco DNA Center appliance.
- If you completed the Install configuration wizard, enter the admin’s username (admin) and paste the password (maglev1@3) that you copied from the wizard’s final window.
- If you completed the Advanced Install configuration wizard, enter the admin’s username (admin) and password that you set when you configured your Cisco DNA Center appliance.
In the next window, you are prompted to specify a new admin password (as a
security measure).
Step 6
Do one of the following:
- If you don’t want to change the admin password at this time, click Skip.
- To set a new admin password:
a. Enter the same password that you specified in Step 5.
b. Enter and confirm a new admin password.
c. Click Next.
Step 7
Enter your cisco.com username and password (which are used to register
software downloads and receive system communications) and then click Next.
Note
If you don’t want to enter these credentials at this time, click Skip instead.
Step 8
The Terms & Conditions window opens, providing links to the software End User
License Agreement (EULA) and any supplemental terms that are currently
available.
After reviewing these documents, click Next to accept the EULA. The Quick
Start Overview slider opens. Click > to view a description of the tasks that
the Quick Start workflow will help you complete in order to start using Cisco
DNA Center.
Step 9
Complete the Quick Start workflow:
a) Click Let’s Do it.
b) In the Discover Devices: Provide IP Ranges window, enter the following
information and then click Next:
- The name for the device Discovery job.
- The IP address ranges of the devices you want to discover. Click + to enter additional ranges.
- Specify whether you want to designate your appliance’s loopback address as its preferred management IP address. For more information, see the “Preferred Management IP Address” topic in the Cisco DNA Center User Guide.
c) In the Discover Devices: Provide Credentials window, enter the information described in the following table for the type of credentials you want to configure and then click Next:
Field | Description |
---|
CLI (SSH) Credentials
Username| Username used to log in to the CLI of the devices in your network.
Password| Password used to log in to the CLI of the devices in your network.
The password you enter must be at least eight characters long.
Name/Description| Name or description of the CLI credentials.
Enable Password| Password used to enable a higher privilege level in the CLI.
Configure this password only if your network devices require it.
---|---
SNMP Credentials: SNMPv2c Read tab
Note Cisco DNA Center does not support SNMPv2c credentials when FIPS
mode is enabled. You’ll need to enter SNMPv3 credentials instead. For more
information about FIPS mode, see the “Configure the Primary Node Using the
Maglev Wizard” topic in the Cisco DNA Center Second-Generation Appliance
Installation Guide.
Name/Description| Name or description of the SNMPv2c read community string.
Community String| Read-only community string password used only to view SNMP
information on the device.
SNMP Credentials: SNMPv2c Write tab
Name/Description| Name or description of the SNMPv2c write community string.
Community String| Write community string used to make changes to the SNMP
information on the device.
SNMP Credentials: SNMPv3
Name/Description| Name or description of the SNMPv3 credentials.
Username| Username associated with the SNMPv3 credentials.
Mode| Security level that SNMP messages require:
• No Authentication, No Privacy (noAuthnoPriv): Does not provide
authentication or encryption.
• Authentication, No Privacy (authNoPriv): Provides authentication, but
does not provide encryption.
• Authentication and Privacy (authPriv): Provides both authentication and
encryption.
Note When FIPS mode is enabled, Cisco DNA Center only supports
Authentication and Privacy mode.
Authentication Password| Password required to gain access to information from
devices that use SNMPv3. The password must be at least eight characters in
length. Note the following points:
• Some wireless controllers require that passwords be at least 12 characters
long. Be sure to check the minimum password requirements for your wireless
controllers. Failure to ensure these required minimum character lengths for
passwords results in devices not being discovered, monitored, or managed by
Cisco DNA Center.
• Passwords are encrypted for security reasons and are not displayed in the
configuration.
Authentication Type| Hash-based Message Authentication Code (HMAC) type used
when either Authentication and Privacy or Authentication, No Privacy
is set as the authentication mode:
• SHA : HMAC-SHA authentication.
• MD5 : HMAC-MD5 authentication.
Note Cisco DNA Center does not support this authentication type when FIPS
mode is enabled.
---|---
Privacy Type| Privacy type. (Enabled if you select Authentication and
Privacy as Mode.) Choose one of the following privacy types:
• AES128 : 128-bit CBC mode AES for encryption.
• CISCOAES192 : 192-bit CBC mode AES for encryption on Cisco devices.
• CISCOAES256 : 256-bit CBC mode AES for encryption on Cisco devices.
Note
• Privacy types CISCOAES192 and CISCOAES256 are supported only for use with
Discovery and Inventory features. Assurance features are not supported.
• Privacy type AES128 is supported for Discovery, Inventory, and Assurance.
Privacy Password| SNMPv3 privacy password that is used to generate the secret
key for encrypting messages are exchanged with devices supported with AES128,
AES192, and AES256 encryption standards. Passwords (or passphrases) must be at
least eight characters long.
Note the following points:
• Some wireless controllers require that passwords be at least 12 characters
long. Be sure to check the minimum password requirements for your wireless
controllers. Failure to ensure these required minimum character lengths for
passwords results in devices not being discovered, monitored, or managed by
Cisco DNA Center.
• Passwords are encrypted for security reasons and are not displayed in the
configuration.
NETCONF
Port| The NETCONF port that Cisco DNA Center should use in order to discover
wireless controllers that run Cisco IOS-XE.
d) In the Create Site window, group the devices you are going to discover into
one site in order to facilitate telemetry and then click Next.
You can enter the site’s information manually or click the location you want
to use in the provided map.
e) In the Enable Telemetry window, check the network components that you want
Cisco DNA Center to collect telemetry for and then click Next.
Note
If both the Enable Telemetry and Disable Telemetry options are grayed out,
this indicates that either devices are not capable of supporting telemetry or
devices are running an OS version that does not support telemetry enablement.
f) In the Summary window, review the configuration settings. (To make any
changes, click Edit.)
· If you’re happy with the settings, click Start Discovery and Telemetry.
Cisco DNA Center validates your settings to ensure that they will not result
in any issues. After validation is complete, the window updates.
Cisco DNA Center begins the process of discovering your network’s devices and
enabling telemetry for the network components you selected. The process will
take a minimum of 30 minutes (more for larger networks).
A message is displayed at the top of the homepage to indicate when the Quick
Start workflow has completed.
g) Do one of the following:
- Click View Discovery to open the Discovery window and confirm that the devices in your network have been discovered.
- Click the Go to Network Settings link to open the Device Credentials window. From here, you can verify that the credentials you entered previously have been configured for your site.
- Click the View Activity Page link to open the Tasks window and view any tasks (such as a weekly scan of the network for security advisories) that Cisco DNA Center has already scheduled to run.
- Click the Workflow Home link to access guided workflows that will help you set up and maintain your network.
User Profile Roles and Permissions
Cisco DNA Center supports role-based access control (RBAC). The roles assigned to a user profile define the capabilities that a user has permission to perform. Cisco DNA Center has three main default user roles:
- SUPER-ADMIN-ROLE
- NETWORK-ADMIN-ROLE
- OBSERVER-ROLE
The SUPER-ADMIN-ROLE gives users broad capabilities and permits them to
perform all actions in the Cisco DNA Center GUI, including creating custom
roles and assigning them to user profiles. The NETWORK-ADMIN-ROLE and the
OBSERVER-ROLE have more limited and restricted capabilities in the Cisco DNA
Center GUI.
If you’re unable to perform an action in Cisco DNA Center, the reason might be
that your user profile is assigned a role that doesn’t permit it. For more
information, check with your system administrator or see the Cisco DNA Center
Administrator Guide.
Default Home Page
After you log in, Cisco DNA Center displays its home page. The home page has
the following main areas: Assurance Summary, Network Snapshot, Network
Configuration, and Tools.
Note
By default, the login name you provided is displayed in the Welcome text. To
change the name, click the name link; for example, admin. You are taken to the
User Management window, where you can edit the display name.
Assurance Summary
This area includes:
- Health: Provides the health score of your overall enterprise, which includes network devices, wired clients, and wireless clients. Clicking View Details takes you to the Overall Health window.
- Critical Issues: Provides the count of P1 and P2 issues. Clicking View Details takes you to the Open Issues window.
- P1: Critical issues that need immediate attention before they cause a wider impact on network operations.
- P2: Major issues that can potentially impact multiple devices or clients.
- Trends and Insights: Provides insights about the performance of your network. Clicking View Details takes you to the Network Insights window.
Network Snapshot
This area includes:
- Sites: Provides the number of sites discovered on your network along with the number of DNS and NTP servers. Clicking Add Sites takes you to the Add Site window.
- Network Devices: Provides the number of network devices discovered on your network along with the number of unclaimed, unprovisioned, and unreachable devices. Clicking Find New Devices takes you to the New Discovery window.
- Application Policies: Provides the number of application policies discovered on your network along with the number of successful and errored deployments. Clicking Add New Policy takes you to the Application Policies window.
- Network Profiles: Provides the number of profiles discovered on your network. Clicking Manage Profiles takes you to the Network Profiles window.
- Images: Provides the number of images discovered on your network along with the number of untagged and unverified images. Clicking Import Images/SMUs takes you to the Image Repository window.
- Licensed Devices: Provides the number of devices that have a Cisco DNA Center license along with the number of switches, routers, and access points. Clicking Manage Licenses takes you to the License Management window.
- EoX Status: Provides the number of devices scanned and EoX alerts discovered on your network. Clicking Accept Cisco CX Cloud EULA takes you to the CX Cloud platform window. Read the information in the Accept Cisco CX Cloud EULA window and click OK to scan the network for EoX alerts.
- AI Endpoint Analytics: Provides information about the endpoints that are connected to your network, including profiled endpoints, trust score alerts, and AI rules. (If Cisco AI Endpoint Analytics isn’t installed, click Setup AI Endpoint Analytics.) Clicking View Details takes you to the Policy > AI Endpoint Analytics > Overview window
- Fully profiled endpoints have entries in the Endpoint Inventory window for Endpoint Type, OS Type, Hardware Model, and Hardware Manufacturer.
- Partially profiled endpoints are missing at least one of the following entries: Endpoint Type, OS Type, Hardware Model, Hardware Manufacturer.
- Unprofiled endpoints are missing the preceding entries.
Tools
Use the Tools area to configure and manage your network.
Figure 1: Cisco DNA Center Home Page
Different Views of Home Page
The home page can vary depending factors such as the different stages of Cisco
DNA Center and what role is used to log in:
Getting Started: When you log in to Cisco DNA Center for the first time as a
Network Administrator or System Administrator, or when there are no devices in
the system, you see the following dashlet. Click Get Started and complete the
getting started workflow to discover new devices in your network.
When you log in to Cisco DNA Center for the first time as an Observer, you see
the following message:
Ask your Network Administrator to add Network Devices to gather Assurance
data.
· Day 0 Home Page: If you skipped getting started, or when there are no
devices in the system, you see the following home page.
When discovery is in progress, you see a progress message with a link to the
Discovery window.
When there are devices in the system, you see a network snapshot of discovered
devices.
Menu Bar
Click the menu icon ( ) at the left of the menu bar to access the menu items.
Icons
Click the icons at the right of the menu bar to perform common tasks:
Icon | Description |
---|---|
Search : Search for devices, users, hosts, menus, and other items that |
are stored anywhere in the Cisco DNA Center database.
| Favorite : You can add any window on Cisco DNA Center to My Favorites,
so you can navigate to it more easily and quickly. For more information, see
Add a Window to My Favorites, on page 17.
Icon| Description
---|---
| Help
• About :
Display the current Cisco DNA Center software version.
Click Release Notes to launch the release notes in a separate browser tab.
Click Packages to view the system and application package versions.
Click Serial number to view the serial number of the Cisco DNA Center
appliance.
• API Reference : Open the Cisco DNA Center platform API documentation in
Cisco DevNet.
• Developer Resources : Open Cisco DevNet, where you can access developer
tools.
• Contact Support : Open a support case with the Cisco Technical
Assistance Center (TAC).
• Remote Support Authorization : Grant remote access to a Cisco
specialist to access Cisco DNA Center for troubleshooting your network. For
more information, see View the Remote Support Authorization Dashboard, on page
13.
• Help : Launch context-sensitive online help in a separate browser tab.
• Cisco CX Cloud Success Tracks : Allows you to access the Cisco CX cloud
success tracks website in a new window.
• Keyboard Shortcuts : Display the keyboard shortcut names, shortcut
keys, and shortcut key combinations for shortcut groups.
The supported shortcut groups are Global , Geo Maps , and
Topology.
• Make a Wish : Submit your comments and suggestions to the Cisco DNA
Center product team.
| Software Updates : See a list of available software updates. Click the
Go to Software Updates link to view system and application updates.
| Notifications : View event notifications and set notification
preferences. A red circle by the notification icon indicates that there are
new notifications.
Interactive Help
Interactive Help contains walkthroughs for specific tasks in Cisco DNA Center.
The walkthroughs provide onscreen guidance to help you complete the task.
The Interactive Help widget is displayed by default at the bottom-right corner
of the Cisco DNA Center window. Click the widget to open the Interactive Help
menu.
Figure 2: Interactive Help Widget
You can also move the Interactive Help widget from the default location to
other locations. Drag and drop the widget to the possible locations, which are
indicated by green dotted-line rectangles.
Cisco DNA Center Journey Map
The Cisco DNA Center journey map shows various capabilities provided by Cisco DNA Center and its usage. To launch the Cisco DNA Center journey map, do any one of the following:
- Click the menu icon ( ) and choose Explore.
- In the Cisco DNA Center home page, click Begin Your Journey.
In the Cisco DNA Center journey map, the various features (capabilities) provided by Cisco DNA Center are grouped into the following tabs: AIOps, NetOps, DevOps, and SecOps. Each tab shows the features in a donut chart. The features are further grouped into segments in the donut chart. Hover your mouse over the features displayed in the donut chart to view a brief description about the feature and its status. Click the feature displayed in the donut chart to open the feature window. From the Filter By drop-down list, choose the following options to view the features in a specific state:
- Successfully Completed
- Active
- Inactive
- Not available
View the Remote Support Authorization Dashboard
View the Remote Support Authorization Dashboard
Remote support authorization allows you to grant remote access to a Cisco
specialist to access Cisco DNA Center and troubleshoot your network.
Note The Cisco DNA Center remote support authorization is supported only
with RADKit version 1.2.1 or later.
Step 1
In the Cisco DNA Center GUI, click the help icon in the top-right corner and
choose Remote Support Authorization. In the Remote Support Authorization
dashboard, the SUMMARY area shows the total, scheduled, and completed remote
support authorizations.
Step 2
Click the Create New Authorization tab to create a new authorization. For more
information, see Create a Remote Support Authorization.
Step 3
Click the Current Authorization tab to view the current remote support
authorization tiles with the following possible status:
- All: Displays all the scheduled and active remote support authorizations.
- Scheduled: Displays the scheduled remote support authorizations.
- Active: Displays the active remote support authorizations.
The support authorization tile shows the schedule and duration of Cisco
specialist access to Cisco DNA Center for troubleshooting purposes.
Step 4
To cancel an authorization, click the Cancel Authorization link in the
respective support authorization tile.
Step 5
Click View Logs to navigate to the Audit Logs window, which lists the remote
support authorization logs. For more information, see View Audit Logs in the
Cisco DNA Center Administrator Guide.
Step 6
Click the Past Authorizations tab to view the past authorizations. The Past
Authorizations table shows the support authorization based on Cisco
Specialist, Happened On, Session Status, and Log and lists the following past
authorizations status:
- All: Lists all the expired and canceled remote support authorizations.
- Expired: Lists all the expired remote support authorizations.
- Canceled: Lists all the canceled remote support authorizations.
Step 7
Click Manage SSH Credentials to establish the SSH connection to Cisco DNA
Center. For more information, see Configure SSH Credentials, on page 14.
Note
- The number of nodes in the deployment determines the maximum number of SSH credentials.
- SSH credentials only need to be created once if all nodes use the same password.
In the Remote Support Authorization dashboard, the Remote Support Cloud service connectivity status is shown:
- A green check mark in the top-right corner indicates that the remote support authorization is connected to the Remote Support Cloud service.
- An exclamation point in the top-right corner indicates that the remote support authorization is not connected to the Remote Support Cloud service.
Configure SSH Credentials
SSH credentials allow a Cisco specialist to access your Cisco DNA Center setup for troubleshooting.
Step 1
Click the menu icon ( ) and choose Remote Support Authorization > Manage SSH
Credential > Add New SSH Credentials.
Step 2
In the Add New SSH Credentials slide-in pane, do the following:
a. In the Password field, enter a password.
b. In the Name/Description field, enter a name or description to identify the
password.
Step 3
Click Add.
Note
- The number of nodes in the deployment determines the maximum number of SSH credentials.
- SSH credentials only need to be created once if all nodes use the same password.
- When you reach the maximum number of SSH credentials, you must delete an existing credential before you can add a new one.
Step 4
To edit an SSH credential, do the following:
a. In the Existing SSH Credentials area, click Edit.
b. In the Edit SSH Credentials slide-in pane, make your changes and click
Save.
Step 5
To delete an SSH credential, do the following:
a. In the Existing SSH Credentials area, click Delete.
b. In the confirmation window, click Confirm.
Use Global Search
Use the global Search function to find items in the following categories anywhere in Cisco DNA Center:
- Activities: Search for Cisco DNA Center menu items, workflows, and features by name.
- Applications: Search for them by name.
- Application Groups: Search for them by name.
- Authentication template: Search for them by name or type.
- Devices: Search for them by collection status, reachability status, location, or tag.
- Fabric: Search by fabric name.
- Help: Search for topics that include your search string.
- Hosts and Endpoints: Search for them by name, IP address, or MAC address.
- IP Pools: Search for them by name or IP address.
- Network Devices: Search for them by name, IP address, serial number, software version, platform, product family, or MAC address.
- Network Profiles: Search by profile name.
- Network Settings
- Device Credentials: Search by name.
- IP Address Pools: Search for them by group name or pool CIDR.
- Service Provider Profiles: Search for them by profile name, WAN provider, or model.
- Policy: Search for them by name or description.
- Sites: Search for them by name.
- Traffic copy: Search for them by name and description.
- Transits: Search by transit name.
- Users: Search for the system settings and users by username. Case-insensitivity and substring search are not supported for usernames.
- Other items, as new versions of Cisco DNA Center are released.
To start a global Search, click the icon in the top-right corner of any Cisco
DNA Center window. Cisco DNA Center displays a global search window, with a
Search field where you can begin entering identifying information about an
item.
You can enter all or part of the item’s name, address, serial number, or other
identifying information. The Search field is case-insensitive and can contain
any character or combination of characters.
As you begin entering your search string, Cisco DNA Center displays a list of
possible search targets that match your entry. If more than one category of
item matches your search string, Cisco DNA Center sorts them by category, with
a maximum of five items in each category. The first item in the first category
is selected automatically, and summary information for that item is displayed
in the summary panel on the right.
You can scroll the list as needed, and click any of the suggested search
targets to see information for that item in the summary panel. If there are
more than five items in a category, click View All next to the category name.
To return to the categorized list from the complete list of search targets,
click Go Back.
As you add more characters to the search string, global Search automatically
narrows the displayed list.
Cisco DNA Center allows you to search for a device using its entire IPv6
address or any abbreviated form of the IPv6 address.
For example, to search for 2001:0db8:85a3:0000:0000:8a2e:0370:7334, you can
use the following search entries:
- 2001:0db8:85a3:0000:0000:8a2e:0370:7334 (using the full IPv6 address)
- 2001:db8:85a3:0:0:8a2e:0:7334 (truncating leading zeros)
- 2001:db8:85a3::8a2e:0:7334 (compressing consecutive zeros with a double colon)
- 2001:db8:85a3 (using a portion of the IPv6 address)
Cisco DNA Center allows you to search for an IPv6 address by using the double
colon in the IPv6 address with prefix, postfix, or any combination.
For example, to search for 2001:db8:85a3::8a2e:0:7334, you can use the
following search entries:
- :: (using double colon alone)
- 85a3::8a2e (using prefix and postfix with double colon)
- 85a3:: (using prefix with double colon)
- ::8a2e (using postfix with double colon)
You can search for devices in Cisco DNA Center by entering their MAC addresses
in any format (with a hyphen or colon).
When you are finished, click to close the window. Global search can display
five results per category at a time.
Enable Localization
You can view the Cisco DNA Center GUI windows in English (the default),
Chinese, Japanese, or Korean. To change the default language, perform the
following task:
Step 1
In your browser, change the locale to one of the supported languages: Chinese,
Japanese, or Korean.
· From Google Chrome, do the following:
a. Click the icon in the top-right corner, and then choose Settings.
b. Click Languages.
c. Click Add languages.
d. In the Add languages dialog box, choose Chinese, Japanese, or Korean, and
then click Add.
· From Mozilla Firefox, do the following:
a. Click the icon in the top-right corner, and then choose Settings.
b. From the Language and Appearance > Language area, click Choose.
c. From the Select a language to add drop-down list, choose Chinese, Japanese,
or Korean.
d. Click OK.
Step 2
Log in to Cisco DNA Center.
The GUI is shown in the selected language.
Add a Window to My Favorites
You can add any window on Cisco DNA Center to My Favorites (the list of your
favorited windows). With My Favorites, you can navigate to favorited windows
more easily and quickly.
You can also add different views of the same window to My Favorites if the
view has an unique URL. For example, on the Activities window, you can add
this window to My Favorites when it’s filtering tasks or work items with the
Success status and, separately, when it’s filtering tasks or work items with
the Last Updated 24 hours status.
Step 1
Navigate to the window that you want to add to My Favorites.
Step 2
On the window, in the top-right corner, click the star icon ( ) to add the
window to My Favorites.
Step 3
On the THIS WINDOW IS FAVORITED dialog box, in the Name field, you can either:
a) Keep the autopopulated name as the title of your favorited window.
b) Delete the autopopulated name and type a new name.
Step 4
(Optional) To view the list of your favorited windows, click View My
Favorites.
The My Favorites slide-in pane displays all your favorited windows.
Tip
To quickly display the My Favorites slide-in pane from any window on Cisco DNA
Center, use the keyboard shortcut q + f.
Step 5
Click Done to save any edits to the favorited window name and to close the
dialog box.
Step 6
(Optional) To remove a window from My Favorites, you can either remove it from
the THIS WINDOW IS FAVORITED dialog box or the My Favorites window.
a) Navigate to the favorited window that you want to remove, and then click
the star icon ( ). In the THIS WINDOW IS FAVORITED dialog box, click Remove.
b) To remove a window from the My Favorites window, see Manage My Favorites,
on page 17.
Manage My Favorites
You can manage your favorited windows on the My Favorites window. For
information about adding a window to My Favorites, see Add a Window to My
Favorites, on page 17.
Step 1
Click the menu icon ( ) and choose Admin > My Profile and Settings > My
Favorites.
The My Favorites window displays the list of your favorited windows.
Step 2
(Optional) To remove a favorited window, do the following:
a) Locate the window you want to remove from the list.
b) Deselect the window’s adjacent star icon ( ) to remove it from My
Favorites.
Step 3
(Optional) To go to a favorited window, do the following:
a) Locate the favorited window that you want to go to.
b) Under the favorited window, click its hyperlinked pathway.
Subscribe to Cisco DNA Center Insights
You can subscribe to the Cisco DNA Center Insights publication, which contains
product announcements, network highlights, information about your network
performance, and more. Cisco DNA Center Insights is sent in PDF format to the
email address that you specify.
Note
If your Cisco DNA Center appliance is deployed in a secure, air-gapped
network, certain metrics are omitted from Cisco DNA Center Insights. To view
the complete Cisco DNA Center Insights, you must have internet and telemetry
connectivity, which aren’t available in air-gapped environments.
Before you begin
- Under System > Settings > Integration Settings, enter your callback URL hostname or IP address. For more information, see “Configure Integration Settings” in the Cisco DNA Center Administrator Guide.
- Under System > Settings > External Services > Destinations > Email, configure the SMTP servers that you will use to receive the publication.
Step 1
Click the menu icon ( ), hover your cursor over your displayed username, and
choose My Profile and Settings > Communication Preferences.
Step 2
Click the Subscription Off toggle to enable the Subscription On option.
Step 3
Enter the email address at which you want to receive Cisco DNA Center
Insights, and click Save.
Insights are archived for up to one year. You can read past publications by
choosing Actions > Download PDF for the corresponding date range.
Step 4
(Optional) To change the email address, click the pencil icon.
Step 5
(Optional) To unsubscribe from Cisco DNA Center Insights, click the
Subscription On toggle to enable the Off option.
Read User Manual Online (PDF format)
Read User Manual Online (PDF format) >>