Reference Information; Network Considerations - Cisco Craft Works Interface Quick Start Manual

Cisco systems craft works interface quick start guide
Table of Contents

Advertisement

Table 11
Applications for the CWI Desktop (continued)
Application
Configuration Editor
Fabric Status Viewer
Rack Environment Monitor
Card Environment Monitor
Sensor Environment Monitor
Health Monitor
Performance System Monitor
Performance Process Monitor Displays the attributes for each process.
Performance Interface
Monitor
7

Reference Information

These sections describe additional reference information:
• Network Considerations, page 21
• Login Modes and Requirements, page 22
• CWI Supported Connection Methods and Applications, page 23
• Testing the CWI Client, page 24

Network Considerations

Before you start setting up the minimum router and CWI client configurations, network information must be taken into
consideration (see Table 12). Note that the specific setup is dependent on the session used from the "About CWI" section.
Table 12
Network Information
Type
Network Security
SSL Encryption Configuration The secure configuration uses Secure Socket Layer (SSL) encryption. If you use the SSL
IP Security
Firewall
Description
Displays the target configuration in CLI format. The Configuration Editor provides general
text editor functions, such as copy, paste, redo, and undo, and provides syntax checking and
CLI functions, such as command completion and CLI help.
Displays the port ID and port status columns in text format in a Fabric Status Viewer table.
Displays the attributes at the rack level.
Displays the attributes at the card level.
Displays the attributes at the sensor level.
Displays the attributes for each card.
Displays the system-wide performance statistics.
Displays the attributes at the interface level.
Function
The default configuration is not secure.
protocol on your network, use the SSL configuration.
IP security (IPSec) does not require any special configuration for CWI on the router or client.
If you have a firewall in your network, you can use the basic or SSL encryption configuration.
See Table 13 for a list of firewall ports.
21

Advertisement

Table of Contents
loading

Table of Contents