Searching the Help
To search for information in the Help, type a word or phrase in the Search box. When you enter a group of words, OR is inferred. You can use Boolean operators to refine your search.
Results returned are case insensitive. However, results ranking takes case into account and assigns higher scores to case matches. Therefore, a search for "cats" followed by a search for "Cats" would return the same number of Help topics, but the order in which the topics are listed would be different.
Search for | Example | Results |
---|---|---|
A single word | cat
|
Topics that contain the word "cat". You will also find its grammatical variations, such as "cats". |
A phrase. You can specify that the search results contain a specific phrase. |
"cat food" (quotation marks) |
Topics that contain the literal phrase "cat food" and all its grammatical variations. Without the quotation marks, the query is equivalent to specifying an OR operator, which finds topics with one of the individual words instead of the phrase. |
Search for | Operator | Example |
---|---|---|
Two or more words in the same topic |
|
|
Either word in a topic |
|
|
Topics that do not contain a specific word or phrase |
|
|
Topics that contain one string and do not contain another | ^ (caret) |
cat ^ mouse
|
A combination of search types | ( ) parentheses |
|
- Administer
- License
- Set Up Application Failover
- Configure NNMi in a High Availability Cluster
- NNMi and NNM iSPI Default Ports
- General Concepts for Configuration
- Configure NNMi to Use a Different Java Development Kit
- NNMi Communications
- NNMi Discovery
- NNMi State Polling
- NNMi Incidents
- Configure NNMi Console
- NNMi Auditing
- Manage Certificates
- Use Single Sign-On (SSO) with NNMi
- Configure NNMi to Support Public Key Infrastructure User Authentication
- Configuring the Telnet and SSH Protocols for Use by NNMi
- Integrate NNMi with a Directory Service through LDAP
- Multihomed NNMi Management Server
- Managing Overlapping IP Addresses in NAT Environments
- NNMi Security and Multi-Tenancy
- Configure NNMi to Work in a GNM Environment
- Configuring NNMi Advanced for IPv6
- Quick Start Configuration Wizard
- Manage environment variables
- Console features useful for configuration tasks
- Actions provided by NNMi
- Processes and services
- Connect multiple NNMi Management Servers (NNMi Advanced)
- Configure communication protocol
- Discover your network
- Configure Device Profiles (sysObjectIDs)
- Create Groups of Nodes or Interfaces
- Monitor Network Health
- Configure the NNMi User Interface
- Configure Security
- Configure Incidents
- Use RAMS with NNMi Advanced
- Extend NNMi Capabilities
- Integrate NNMi Elsewhere with URLs
- Administer SNMP Traps
- Maintain NNMi
- Security Configuration
- Modify Default Settings
- NNMi Logging
- NNMi Northbound Interface
- Use Operations Bridge Reporter to View Reports
- Network Node Manager i Reference Pages
- Administer NPS
- Administer the NNM iSPI Performance for QA
- Administer the NNM iSPI Performance for Traffic
- Administer the NNM iSPI for MPLS
- Administer the NNM iSPI for IP Multicast
- Administer the NNM iSPI for IP Telephony
NNMi Security and Multi-Tenancy
Note NNMi uses tenancy to support networks with overlapping address domains that may exist within static Network Address Translation (NAT), dynamic NAT, or dynamic Port Address Translation (PAT) areas of your network management domain. If you have such networks, put the overlapping address domains into different tenants (this is done using seeded discovery). See Managing Overlapping IP Addresses in NAT Environments and the NNMi help for more information.
By default, all NNMi console users can see information for all objects in the NNMi database. If this default configuration is acceptable for your environment, you do not need to read this chapter.
In NNMi, security and multi-tenancy provide for restricting user access to information about the objects in the NNMi database. This restriction is useful for customizing the views of network operators to their areas of responsibility. It also supports service providers with per-organization configuration of NNMi.
This chapter describes the NNMi security and tenant models and gives suggestions for configuration. It contains the following topics:
- Effects of Limiting Object Access
- The NNMi Security Model
- The NNMi Tenant Model
- NNMi Security and Multi-Tenancy Configuration
- NNMi Security, Multi-Tenancy, and Global Network Management (GNM)
- Including Select Interfaces in NPS Reports
See also the Network Node Manager i Software Step-by-Step Guide to Using Security Groups White Paper.
We welcome your comments!
To open the configured email client on this computer, open an email window.
Otherwise, copy the information below to a web mail client, and send this email to network-management-doc-feedback@hpe.com.
Help Topic ID:
Product:
Topic Title:
Feedback: