Get Started with Crosswork Cloud Trust Insights
Step |
Action |
Procedure and Notes |
||||
---|---|---|---|---|---|---|
Crosswork Data Gateway Cisco Crosswork Data Gateway is initially deployed as a VM called Base VM that contains only enough software to enroll itself with Crosswork Cloud. Once the Crosswork Data Gateway is registered with Crosswork Cloud, Crosswork Cloud pushes the collection job configuration down to the Crosswork Data Gateway, enabling it to gather the data it needs from the network devices. The following steps are done outside of Crosswork Cloud. |
||||||
1 |
Confirm Crosswork Data Gateway requirements. |
|||||
2 |
Gather information needed during Crosswork Data Gateway installation. Make sure you have the following:
|
|||||
3 |
|
Add Crosswork Data Gateway Information For Crosswork Data Gateway 6.0.1 or later:
|
||||
4 | Install Crosswork Data Gateway.
During Crosswork Data Gateway installation, you will need to paste the enrollment token in the following platforms:
|
Install Crosswork Data Gateway
|
||||
5 |
Authorize Crosswork Data Gateway access to Crosswork Cloud Trust Insights.
|
|
||||
6 |
Confirm you have all the Cisco IOS XR supported images, enrollment keys, certificates, and requirements needed for Crosswork Cloud Trust Insights. |
|||||
7 |
Configure a user with limited access to devices for Crosswork Trust Insights to prevent unauthorized operational or configuration changes to your Cisco IOS XR routers. |
|||||
8 |
Add device credential profiles to be used when adding devices. |
> Configure > Credentials > Add Credential |
||||
9 |
Add devices.
|
|
||||
10 |
Give it some time to collect data, then verify that the device data collection was successful. |
> Monitor > Devices > device-name Trust Insights tab |
||||
11 |
Initiate a dossier collection to get the latest device information |
Collect Data for Trust Insights Device Dossier > Configure > Devices > device-name > Trust Insights > Collect Dossier |
||||
12 |
View and create policies to monitor device integrity. |
> Configure > Policies |
||||
What's Next? | ||||||
13 |
Verify software and view runtime signature analytics.
|
> Monitor >Devices > device-name Trust Insights tab |
||||
14 |
Verify hardware inventory. |
> Monitor > Devices > device-name Trust Insights tab. Click the Inventory tab. |
||||
15 |
View historical changes observed in systems.
|
> Monitor > Devices > device-name Trust Insights tab. Click the Changes tab. |
||||
16 |
Compare device configurations where a single device is chosen to be used as a baseline. Identify differences in installed software packages on similar devices deployed within production environments. Generate a “Punch List” of recommended changes to bring deviant devices into compliance. |
> Tools > Device Comparison |