RAD access order

Use the access order section of a RAD to specify the names of and the order in which Netcool Configuration Manager should access specific network protocols. Access order is not called out explicitly in the GUI as it is defined in the XML document; however, it is represented in the GUI by the list of enabled access types.

XML tags example

The XML document explicitly calls out the access order, and declares which access types will be used.

The following example shows the XML tags used in the access order section of a RAD:

<access-order>
	<name>ssh</name>
	<name>telnet</name>
	<name>alt-telnet</name>
</access-order>
Table 1. XML tags description
XML tag Description
<access-order>

Specifies the access order section of a RAD.

The <access-order> XML tag is typically followed by one or more <name> XML tags.

The order in which access types are attempted is specified in a RAD file. So, in this example Netcool Configuration Manager would start with SSH, then TELNET, and so forth. As soon as a successful connection is made, the access type listed next in line is not required and therefore not attempted.

<name>
Specifies the name of an access type, or network protocol. Valid values are as follows:
  • ssh — Specifies the Secure Shell (SSH) protocol.
  • TELNET — Specifies the TELNET protocol.
Tip: GUI access order: Access types are displayed by right clicking on the RAD in the Resource Browser, and selecting Edit. The access types displayed in the GUI need to be enabled in the RAD for them to be used. Access types can be enabled by ensuring that the enabled checkbox against the access type is selected. An access type that is italicized in the GUI is not enabled in the RAD. The order in which they are listed reflects the order in which the access types are used to access the device. For example, if the access type of 'ssh' is listed before 'telnet', the 'ssh' access type will be used to attempt to connect to the device first. If a successful connection is made to the device using 'ssh', then the 'telnet' access type will be ignored. If the connection is not successful using 'ssh', 'telnet' is then used to attempt connection to the device.
Remember: At this point, the name of the access type should not necessarily reflect the protocol used to connect to the device.