User role permissions

The table below lists the main features and identifies the user roles that have permission to access them, where:

A = Administrator

O = Operator

M = Monitor

D = Dashboard Viewer

E = Event Viewer

R = Restricted

Feature/page

A

O

M

D

E

R

Dashboard

 

 

 

 

 

 

Dashboard - view default dashboard

x

x

x

x

 

x

Dashboard - follow links, acknowledge events, customize layout

x

x

 

 

 

x

Reports

 

 

 

 

 

 

All Reports

x

x

x

 

 

x

Service Reports

x

x

x

 

 

 

Traffic Reports

x

x

x

 

 

x

WAN Optimization

x

x

x

 

 

x

Top Talker Reports

x

x

x

 

 

x

Event Reports - list events

x

x

x

 

 

 

Event Detail Reports - view details of individual events

x

x

x

 

x

 

Event Detail Reports - choose actions

x

x

x

 

 

 

User Reports - identify users of the network

x

x

x

 

 

 

Saved Reports - view completed reports, run reports from saved report templates

x

x

x

 

 

x

Quick Reports

x

x

x

 

 

x

Information Reports - reports with pre-defined formats for reporting  host, host group, application, interface, DSCP marking, network segment, and server and switch information

x

x

x

 

 

x

Definitions

 

 

 

 

 

 

Applications - define custom applications

x

x

 

 

 

 

Host Groups - specify custom host groups; manage automatically-created groups

x

x

 

 

 

 

Interface Groups - create, edit, and delete interface groups

x

x

 

 

 

 

Port Names - edit standard port names, create new port names

x

x

 

 

 

 

DSCP - DSCP Marking names

x

x

 

 

 

 

Policies - specify parameters in policy definitions; set tolerances, alerting thresholds, global and advanced settings

x

x

 

 

 

 

Notifications - alert notification delivery settings

x

x

 

 

 

 

Events - view lists of Event Detail reports

x

x

 

 

 

 

WAN - define the WAN by identifying its interfaces

x

x

 

 

 

 

NetSharks & Steelheads - associate Sensors and NetSharks with SteelHeads.

x

x

 

 

 

 

Mitigation

 

 

 

 

 

 

Plans and Actions

x

x

 

 

 

 

Trusted Hosts

x

x

 

 

 

 

Switching Setup

x

x

 

 

 

 

Routing Setup

x

x

 

 

 

 

Integration

 

 

 

 

 

 

SteelHead QoS Shaping

x

x

 

 

 

 

Vulnerability Scanning - identify scanners, configure autoscan

x

x

 

 

 

 

External Links - identify queries for external devices

x

x

 

 

 

 

Riverbed Links - Identify Riverbed devices that data can be sent to for analysis

x

x

 

 

 

 

Switch Port Discovery - identify switches to the NetProfiler

x

x

 

 

 

 

API Access - maintain API access control list

x

x

 

 

 

 

Identity Sources - identity information about network users

x

x

 

 

 

 

Load Balancers

x

x

 

 

 

 

Global SNMP Settings for NetFlow Reporting Devices

x

 

 

 

 

 

Administration

 

 

 

 

 

 

Account Management - add, edit, delete, disable, enable, unlock user accounts; global settings, configure RADIUS and TACACS+ authentication, manage OAuth access codes

x

 

 

 

 

 

Password (Administrators can use the Account Management features)

 

x

x

x

 

x

User Preferences - applies to only your own account

x

x

x

x

 

x

Flow Log - disk space allocation and automatic data resolution

x

x

 

 

 

 

Appliance Security - specify password security, select security compliance features and manage encryption certificates

x

 

 

 

 

 

General Settings - network connections; security and reporting options

x

x

       

System Information - status of NetProfiler components and operation

x

x

x

 

 

 

Devices/Interfaces - devices from which the NetProfiler receives data

x

x

 

 

 

 

Audit Trail - identify NetProfiler user activities

x

 

 

 

 

 

System Operations - power off the NetProfiler chassis or reboot the system, backup files, install updates

x

 

 

 

 

 

 

Accounts