Searching the Help
To search for information in the Help, type a word or phrase in the Search box. When you enter a group of words, OR is inferred. You can use Boolean operators to refine your search.
Results returned are case insensitive. However, results ranking takes case into account and assigns higher scores to case matches. Therefore, a search for "cats" followed by a search for "Cats" would return the same number of Help topics, but the order in which the topics are listed would be different.
Search for | Example | Results |
---|---|---|
A single word | cat
|
Topics that contain the word "cat". You will also find its grammatical variations, such as "cats". |
A phrase. You can specify that the search results contain a specific phrase. |
"cat food" (quotation marks) |
Topics that contain the literal phrase "cat food" and all its grammatical variations. Without the quotation marks, the query is equivalent to specifying an OR operator, which finds topics with one of the individual words instead of the phrase. |
Search for | Operator | Example |
---|---|---|
Two or more words in the same topic |
|
|
Either word in a topic |
|
|
Topics that do not contain a specific word or phrase |
|
|
Topics that contain one string and do not contain another | ^ (caret) |
cat ^ mouse
|
A combination of search types | ( ) parentheses |
|
Configuring Tenants
Note Any number of static Network Address Translation (NAT) instances can be monitored by one NNMi management server, as long as each instance is configured with a unique tenant. See Managing Overlapping IP Addresses in NAT Environments, and the NNMi help, for more information.
NNMi provides the following ways to configure multi-tenancy:
- The Tenant form in the NNMi console is useful for working with individual tenants.
- The
nnmsecurity.ovpl
command-line interface is useful for automation and bulk operations. The tool also provides reports of potential problems with the tenant configuration.
The process of defining and configuring NNMi multi-tenancy to assign each NNMi topology object to a tenant (organization) is a cyclical process. This high-level procedure describes one approach to configuring NNMi multi-tenancy.
Note the following about configuring NNMi multi-tenancy:
- The security group that NNMi assigns to a discovered node is set by the value of the Initial Discovery Security Group for the tenant associated with that node.
- When you use the NNMi security model without also configuring NNMi tenants, all nodes are assigned to the Default Tenant.
- When you seed a node for NNMi discovery, you can specify the tenant to which that node belongs. When NNMi discovers a node through an auto-discovery rule, NNMi assigns that node to the Default Tenant. After discovery, you can change the tenant assignment for the node.
One high-level approach to planning and configuring NNMi multi-tenancy is as follows:
-
Analyze your customer requirements to determine how many tenants are required in the NNMi environment.
It is recommended that tenants be used only when managing multiple separate networks with a single NNMi management server.
- Analyze the managed network topology to determine which nodes belong to each tenant.
- Analyze the topology of each tenant to determine the groups of nodes to which NNMi users need access.
-
Remove the default associations between the predefined NNMi user groups and the Default Security Group and the Unresolved Incidents security group.
Doing this step assures that users do not inadvertently obtain access to nodes they should not be managing. At this point, only NNMi administrators can access objects in the NNMi topology.
-
Configure the identified tenants.
- Create the identified security groups.
-
Create the identified tenants.
For each tenant, set the Initial Discovery Security Group to either the Default Security Group or a tenant-specific security group with restricted access. This approach ensures that new nodes for the tenant are not generally visible until the NNMi administrator configures access.
-
Prepare for discovery by assigning tenants to seeds.
Tip After discovering a group of nodes, you can change the value of the Initial Discovery Security Group. Using this approach limits the manual re-assignment of nodes to security groups.
-
After discovery completes, do the following:
- Verify the tenant for each node and make changes as necessary.
- Verify the security group for each node and make changes as necessary.
We welcome your comments!
To open the configured email client on this computer, open an email window.
Otherwise, copy the information below to a web mail client, and send this email to network-management-doc-feedback@hpe.com.
Help Topic ID:
Product:
Topic Title:
Feedback: