- play_arrow Introduction
- play_arrow Overview
- play_arrow Access and Manage Paragon Automation Account
-
- play_arrow Device Life Cycle Management
- play_arrow Introduction
- play_arrow Day-Wise Activities for Device Life Cycle Management
- play_arrow Field Technician User Interface
- play_arrow Onboarding Profiles
- play_arrow Plan Device Onboarding
- play_arrow View Device Onboarding
- play_arrow Device Management
- Device Management Workflow
- Device Licenses Overview
- About the Features Tab
- About the Licenses Tab
- Manage Device Licenses
- About the Software Images Page
- Upload a Software Image
- Delete a Software Image
- About the Configuration Backups Page
- Configuration Templates Overview
- About the Configuration Templates Page
- Add a Configuration Template
- Edit and Delete a Configuration Template
- Preview a Configuration Template
- Deploy a Configuration Template to a Device
-
- play_arrow Observability
- play_arrow Introduction
- play_arrow Health Dashboard
- play_arrow Troubleshoot Devices
- play_arrow View Network Topology
- Network Topology Visualization Overview
- Network Visualization Options
- View Network Topology Details
- Network Table Overview
- About the Device Tab
- About the Link Tab
- About the Site Tab
- About the Tunnels Tab
- Configure a PCE Server
- Configuring PCEP on a PE Router
- Configuring Topology Acquisition Using BGP-LS
-
- play_arrow Trust and Compliance
- play_arrow Introduction
- play_arrow Manage Trust Settings and Trust Scores
- Compliance Standards Overview
- About the Compliance Benchmarks Page
- About the Compliance Tailorings Page
- Example: Create a Tailoring Document for NTP Settings
- About the Compliance Checklist Page
- Add a Checklist Template
- Add Checklist for a Device
- Import Scans and Update Rule Results in a Checklist
- Trust Plans Overview
- About the Network Score Formula Page
- Trust Score Overview
- About the Network Score Page
- About the Snapshots Page
- Add a Snapshot for a Target
- play_arrow Manage Compliance Scans
- play_arrow Manage Vulnerabilities
- play_arrow Monitor Integrity
-
- play_arrow Service Orchestration
- play_arrow Introduction
- play_arrow View Service Design Catalog
- play_arrow Manage Customers
- play_arrow Add Resources for Network Services
- play_arrow Manage Service Instances
- Service Instance Overview
- About the Service Instances Page
- View Service Instance Details
- View VPN Service Health Monitoring Data
- Physical Interfaces Health Check Results
- Logical Interfaces Health Check Results
- L2 Circuit Service Health Check Results
- Performance Graphs to View Service Health Monitoring Data
- play_arrow Provision VPN Services
- play_arrow Monitor Service Order Execution Workflows
-
- play_arrow Active Assurance
- play_arrow Introduction
- play_arrow Test Agents
- play_arrow Tests and Monitors
- play_arrow Test Templates
-
- play_arrow Paragon Shell CLI Reference
- play_arrow Introduction
- play_arrow Operational Mode Commands
- file copy
- monitor
- request paragon backup
- request paragon cluster pods reset
- request paragon cluster upgrade
- request paragon config
- request paragon deploy
- request paragon deploy cluster
- request paragon destroy cluster
- request paragon fix-permission
- request paragon load
- request paragon repair-node
- request paragon replace-node
- request paragon restore
- request paragon running-config
- request paragon ssh
- request paragon ssh-key
- request paragon storage cleanup
- request paragon super-user password reset
- request system decrypt password
- request system reboot
- show configuration paragon cluster
- show host disk usage
- show paragon backup
- show paragon certificate expiry-date certificate-type
- show paragon cluster (o)
- show paragon cluster applications (o)
- show paragon cluster common-services ingress (o)
- show paragon cluster details
- show paragon cluster namespaces
- show paragon cluster nodes
- show paragon cluster pods
- show paragon cluster pods namespace healthbot sort
- show paragon images version
- show paragon images version namespace
- show paragon pvc details
- show paragon version
- play_arrow Configuration Mode Commands
- delete paragon cluster
- load set
- set paragon cluster applications
- set paragon cluster common-services ingress
- set paragon cluster insights victoria-metrics
- set paragon cluster install
- set paragon cluster mail-server
- set paragon cluster nodes
- set paragon cluster ntp
- set paragon cluster papi
- set paragon monitoring
- set system login
- show paragon cluster (c)
- show paragon cluster applications (c)
- show paragon cluster common-services ingress (c)
- play_arrow Troubleshooting Commands
- Troubleshoot Using the Paragon Shell CLI Commands
- request paragon support information
- request paragon troubleshooting information
- request paragon debug
- request paragon debug get-tsdb-data
- request paragon debug insights-kafka-data
- request paragon debug kafka
- request paragon debug logs
- request paragon debug logs namespace
- request paragon debug postgres
- request paragon debug redis
- play_arrow Service Orchestration
- About the Service Orchestration cMGD CLI
- set foghorn:core org-id
- set service design default version
- show service order status
- show service order as-json
- show service order as-yaml
- show service designs
- show device dependent configuration
- show insights configuration
- show configuration foghorn:customers
- show service instance lock status
- show service instance lock token
- show service projects
- show service order history
- request service project add
- request service order sync
- request network resources load
- request service order load
- request service order place
- request service order modify
- request service order delete
- request service order submit
- request service order provision
- request service design install
- request service design uninstall
- request create graphdb
- request service order set
- request service instance lock
- request service instance unlock
-
Predefined User Roles Overview
Paragon Automation provides four predefined roles to manage access privileges of users, based on the tasks users need to perform.
A superuser creates an organization, adds users to predefined roles depending on the requirements of the organization. For example, an organization with a large number of networking devices would require multiple users performing different roles to efficiently manage the organization, whereas, in a small organization, a single user can perform all the four roles. Different types of users in an organization, such as a network architect, network planner, NOC engineer, and field technician, all derive their access privileges from the predefined roles assigned to them.
User Roles and their Responsibilities
The four predefined roles are:
Super User
Is the administrator of the organization.
Creates organization, invites users, assigns user roles, creates sites, adopts devices, and so on.
A superuser doesn’t need to be a person with a high-level of networking domain expertise.
Network Admin
Is a networking expert who monitors, verifies, and troubleshoots an organization's network.
Observer
Monitors events in the organization's network.
An Observer cannot take corrective action. The observer brings issues to the notice of the network administrator for resolution.
Installer
Onboards devices and monitors device status during onboarding.
An Installer can access only the Onboard a Device and Device List pages.
Table 1 displays the access privileges of the four user roles to the menu items.
Menu | Super User | Network Admin | Observer | Installer |
---|---|---|---|---|
Observability | ||||
Observability > Health | ||||
Troubleshoot Devices | ✓ | ✓ | ✓ | ╳ |
Events | ✓ | ✓ | ✓ | ╳ |
Observability > Active Assurance | ||||
Monitors | ✓ | ✓ | ✓ | ╳ |
Tests | ✓ | ✓ | ✓ | ╳ |
Measurement Designer | ✓ | ✓ | ✓ | ╳ |
Observability > Network | ||||
Topology | ✓ | ✓ | ✓ | ╳ |
Trust and Compliance | ||||
Trust > General | ||||
Trust Plans | ✓ | ✓ | ✓ | ╳ |
Trust > Compliance | ||||
Compliance Scan | ✓ | ✓ | ✓ | ╳ |
Checklist | ✓ | ✓ | ✓ | ╳ |
Benchmarks | ✓ | ✓ | ✓ | ╳ |
Tailorings | ✓ | ✓ | ✓ | ╳ |
Trust > Integrity | ||||
Hardware EOL | ✓ | ✓ | ✓ | ╳ |
Software EOL | ✓ | ✓ | ✓ | ╳ |
Trust > Vulnerabilities | ||||
Advisories | ✓ | ✓ | ✓ | ╳ |
PBNs | ✓ | ✓ | ✓ | ╳ |
Orchestration | ||||
Orchestration > Service | ||||
Instances | ✓ | ✓ | ✓ | ╳ |
Service Catalog | ✓ | ✓ | ✓ | ╳ |
Customers | ✓ | ✓ | ✓ | ╳ |
Orchestration > Monitoring | ||||
Workflows | ✓ | ✓ | ✓ | ╳ |
Inventory | ||||
Inventory > Devices | ||||
Network Inventory | ✓ | ✓ | ✓ | ╳ |
Device and Interface Profiles | ✓ | ✓ | ✓ | ╳ |
Configuration Templates | ✓ | ✓ | ✓ | ╳ |
Configuration Backups | ✓ | ✓ | ✓ | ╳ |
Software Images | ✓ | ✓ | ✓ | ╳ |
Inventory > Device Onboarding | ||||
Onboarding Dashboard | ✓ | ✓ | ✓ | ╳ |
Network Implementation Plan | ✓ | ✓ | ✓ | ╳ |
Inventory > Active Assurance | ||||
Test Agents | ✓ | ✓ | ✓ | ╳ |
Inventory > Common Resources | ||||
Sites | ✓ | ╳ | ╳ | ╳ |
Settings Menu | ||||
System Settings | ✓ | ╳ | ╳ | ╳ |
Users | ✓ | ╳ | ╳ | ╳ |
Audit Logs | ✓ | ✓ | ╳ | ╳ |
Field Technician UI | ||||
Onboard a Device | ╳ | ╳ | ╳ | ✓ |
Device List | ╳ | ╳ | ╳ | ✓ |