Management profiles


Management profiles are how to configure NAV with the necessary credentials and options to manage networked devices. You may require multiple management profiles to manage all your devices. They are created and edited in the “management profile” tab in the SeedDB tool, available from the Toolbox.

The simplest scenario is the one where all your network devices support SNMP, using the same community, and you only need to fetch data, not send configuration changes, from NAV. In this case, you need only a single management profile, to define the SNMP community used on your devices, and then you will assign this profile to all your devices in the SeedDB tool.

An IP device can be assigned multiple profiles as well. A common scenario for this is a device you wish to make configuration changes on, either through PortAdmin or Arnold. Typically, you will create one management profile with the read-only SNMP community, which NAV will use for all operations where it only needs read access to the devices. You will need to create a second management profile containing an SNMP community that will give PortAdmin write access to the switch, and the Write checkbox will need to be checked on this profile.

Supported profile types

Traditionally, NAV only supported SNMP, but as of NAV 5.1, this changed.


NAV currently supports SNMP versions 1 and 2c, which can be selected from the Version dropdown in the management profile form.


Checking the Write checkbox will tell NAV that the community configured in this profile will provide NAV with write access to the devices it is assigned to.

Otherwise, the procedure for creating an SNMP profile is documented in the Getting started guide.


NAV can use the NAPALM library to manage some devices, using NETCONF or other underlying protocols. As of NAV 5.1, these profiles are only used to configure Juniper switches in PortAdmin, as Juniper does not support SNMP write operations for modifying device configuration.

Adding a NAPALM profile looks like this:


These fields can be configured:


The NAPALM “driver” to use for communication. This is usually vendor specific. Currently, only the JunOS driver can be selected, since Juniper is the only platform NAV needs NAPALM on.


Which username to access the switch with. The JunOS driver uses SSH, so this would be an SSH user that can run netconf commands on the switch.


The SSH password for this user.

Private key

An SSH private key that will give SSH access as the configured user. If filled out, the password is assumed to be the passphrase to unlock the key itself. Leave password empty if the key doesn’t have one.

Use keys

If checked, the JunOS driver will use the SSH keys available in the file system of the NAV web server for authentication. This usually means that the keys must be present in the home directory of the user running the NAV Django application, in ~/.ssh/.

Alternate port

If access to the switch is not on the default port (22, in the case of the JunOS driver), put the alternate port here.