Skip navigation
1 2 3 4 Previous Next

Product Blog

49 Posts authored by: cvachovecj

We have been working hard to bring another bulk of enhancements to the Storage Resource Monitor (SRM).

SRM 6.4 Beta 2 is available and it contains some of the enhancements listed in the following post: What we are working on for SRM after v6.5 -- Updated on October 6, 2017.

 

To find out more and get access to the beta, you need to be a customer on active maintenance for SRM and sign up here:

 

sign-up-Beta.png

 

As an added incentive, beta users who submit feedback will receive 2,000 Thwack points to buy swag at the Thwack Store.

We are pleased to announce the general availability of Storage Resource Monitor 6.3.

 

This version includes the following enhancements:

  • Support for EMC XtremIO arrays
  • Support for Pure Storage arrays

 

Storage Resource Monitor 6.3 is available for download in your customer portal for those customers under active Storage Resource Monitor maintenance.

 

You can view the full set of release notes, including problems that were resolved here.

You can find further details about the improvements here: Storage Resource Monitor v6.3 Release Candidate is Avaiable!

We have reached the Release Candidate (RC) status for Storage Resource Monitor (SRM) 6.3. RC is the last step before general availability and is a chance for existing customers to get the newest functionality before it is available to everyone else.

 

This RC contains the following enhancements:

  • Support for EMC XtremIO arrays
  • Support for Pure Storage arrays (Purity 4.6 or above required)
  • Refreshed user interface

 

New Metrics with All-Flash Arrays (AFA's)

The use of very fast flash memory instead of spinning disks is not the only benefit that comes with all-flash arrays. Many (but not all) models provide the user with interesting advanced features such as data de-duplication, compression, and thin provisioning. In order to monitor and report relevant information about the flash array, we extended and/or modified some of the reported statistics, alerts, etc.

The below information applies to both EMC XtremIO and Pure Storage arrays.

 

Capacity Reporting

XtremIO-Capacity.png

 

Let's take a look at storage array capacity summary resources. Because of the nature of disk space management, Raw Capacity and Total Used Capacity will always be the same for AFA's. They represent sum of physical sizes of all memory modules (e.g. SSD's).

 

Usable Capacity Summary is more interesting: Total Usable Capacity means sum of user data space on all memory modules (disks).

  • Data Reduction is the ratio of actually used volume capacity to used physical capacity in the cluster. In the picture below, the reduction is 3:1, which means that e.g. 300 GB of user data only occupies 100 GB physical capacity after deduplication. It's one of the most important parameters for capacity planning.
  • Total Reduction also takes compression and thin provisioning into account, but its interpretation is not so straightforward.

 

Further details are reported on storage pool level:

XtremIO-Pool.png

  • Total Usable Capacity -- Total user data space on all memory modules (SSDs)
  • Total Subscribed -- Capacity of all LUNs after the data reduction (SUM(Lun.CapacityTotal) / Data Reduction))
  • Provisioned -- Amount of user data space in use
  • Over-Subscribed -- Total Subscribed minus Total Usable Capacity

 

Monitor Your EMC XtremIO Arrays

XtremIO-Summary.png

 

The latencies with AFA's are much lower that for disk-based arrays.

XtremIO-Latencies.png

 

Monitor Your Pure Storage Arrays

Pure-Summary.png

 

Enjoy the New UI Design

If you kept reading up to this point, you have probably noticed that the user interface looks a little different than in the past. SRM is not the only module that benefits from this improvement shipped by the Orion Platfrom (Core). We wish you a pleasant experience.

 

RC builds are made available to existing customers prior to the formal release. These are used to get customer feedback in production environments and are fully supported. If you have any questions, I encourage you to leverage the SRM RC forum.

 

You will find the latest version on your customer portal in the Release Candidate section.

We have been working hard to bring another bulk of enhancements to the Network Configuration Manager (NCM) and NCM 7.5 Beta is available. We have been working on:

  • Additional F5 LTM & GTM Support (Including Binary Config Support)
  • Compliance Reports (security best practices) for various vendors
  • Usability Improvements

 

To get access to the Beta, you need to be a customer on active maintenance for NCM and sign up here.

 

You can discuss your experience in the NCM Beta Forum.

 

As an added incentive, Beta users who submit feedback will receive 2,000 Thwack points to buy swag at the Thwack Store.

We have been working hard to bring another bulk of enhancements to the Storage Resource Monitor (SRM). SRM 6.3 Beta 1 contains the following improvements:

  • Support for Pure Storage arrays
  • Support for EMC XtremIO arrays

 

To get access to the beta, you need to be a customer on active maintenance for SRM and sign up here.

 

As an added incentive, beta users who submit feedback will receive 2,000 Thwack points to buy swag at the Thwack Store.

I'm happy to announce that Storage Resource Monitor (SRM) v6.2 is now available in the SolarWinds Customer Portal for customers on Active Maintenance. This version includes the following new features and improvements:

 

  • Additional Device Support for Storage Resource Monitor's Orion Module :
    • EMC® Isilon®
    • Hitachi® Data Systems AMS, USP VM, USPV, VSP G1000, G200/400/600, HUS 100 Block-Side, HUS VM
    • HP® StorageWorks XP
    • IBM® Spectrum™ Virtualize (Vxxx and SVC)
  • Hierarchical Storage Pools

 

More details can be found in the Release Notes and in the RC blog post: More array support for Storage Resource Monitor in 6.2 RC.

We are happy to announce that version 7.4 of SolarWinds Network Configuration Manager ships the DISA STIG, NIST FISMA, and PCI DSS compliance reports out of the box. Wait -- that's not all! For DISA STIGs, we now support Brocade, Dell, Cisco, Juniper, and Palo Alto. The NIST FISMA and PCI reports have been developed for Cisco.

Simply select any of these new report(s) that you wish to run and “enable” them by following the steps outlined below.

 

Corresponding instructions for older versions of NCM can be found here: DISA STIG Resources for SolarWinds NCM (Now also for Juniper!). Also, don't miss a similar post for LEM: DISA STIG Compliance with Log & Event Manager.

 

How to enable the new compliance checks?

 

  1. Enter the compliance management interface: Configs tab / Compliance view / Manage Policy Reports.

    Manage-Reports.png

  2. Select the reports you are interested in and enable them.

    Enable-Reports.png

  3. Update the reports.

    Update-Reports.png

  4. Compliance status of your network is ready!

    Check-Results.png

Further recommendations

  • Make sure the reports you are interested in are displayed in the Policy Violations summary resource. (Policy Violations resource / Edit)

    Edit-Violations-Resource.png  Violations-Resource.png

  • Customize the violation severity labels to match your needs. (Settings / NCM Settings / Manage Violation Levels)

    Manage-Violation-Levels.png  Violations-Resource-CAT.png

  • Look for Cisco firmware vulnerabilities.
    If network security is a concern in your organization, you should definitely use this new capability of NCM -- run a nightly vulnerability assessment based on recent CVE data provided by the National Vulnerability Database -- NVD (by NIST). NCM will download and process the CVE data in a SCAP-compatible way and will notify you of potential vulnerabilities, provide detailed information and let you take an appropriate action. This security scan works even if your NCM server is not connected to the Internet -- you just have to download the datafiles manually.

    Wait for the nightly update or force the scan manually in Settings / NCM Settings / Firmware Vulnerability Settings / Run Now
    (See the below referenced NCM 7.4 RC blog post for more screenshots and details.)

    Firmware-Vulnerabilities.png

  • Check other new features of NCM 7.4
    All details are available here: Network Configuration Manager v7.4 Release Candidate is Available!
    Quick start:

    Whats-New.png

Miscellaneous

  • Please note that the US Army has granted a Certificate of Networthiness (CoN) to NCM V 6.0. CERT-201109082. CoN has also been granted to NPM, SAM (APM), NTA and Engineer's Toolset.
  • The following SolarWinds products are Common Criteria EAL 2 certified by the NIAP: NPM, SAM (APM), IPAM, NTA, VNQM, NCM, EOC. Our Validation ID is 10453
  • You can also find Federal Information Security Management Act (FISMA) / NIST reports for NCM 6.1, on Thwack.com (same installation procedure applies)
  • Did you know that Gartner positions NCM in their research “MarketScope for Network Configuration and Change Management”, Deb Curtis, David Williams, 31 March 2010, ID Number: G00175140, as follows:
    • NCM is the most widely deployed of the products meeting Gartner’s criteria for evaluation (except CiscoWorks)
    • NCM is rated in the top tier (Positive / Strong positive) with the “Big-4”
  • A reference to SolarWinds (NPM) in the SIGNAL Online article “Marines Revolutionize Network In Southwest Afghanistan

I am happy to announce General Availability (GA) of SolarWinds Network Configuration Manager (NCM) v7.4. This version includes the following new features and improvements:

 

  • Cisco IOS and ASA Vulnerability Reporting
    NCM uses Cisco IOS and ASA firmware and configuration vulnerability data from the National Vulnerability Database to record which nodes in NCM are vulnerable. This information is available in a new Firmware Vulnerability resource and as a report.
  • NCM Entirely Web-based
    The NCM desktop application is no longer available and all functionality has migrated to the SolarWinds Orion Web Console.
  • New Compliance Reports
    • You can run over 60 Defense Information Systems Agency Security Technical Implementation Guide (DISA STIG) policy reports, preconfigured with the necessary rules and policies.
    • You can run National Institute of Standards and Technology Federal Information Security Management Act (NIST FISMA) and Payment Card Industry Data Security Standard (PCI DSS) reports.
  • Device Template Wizard
    • Create and edit device templates using the new, web-based Device Template Wizard in the SolarWinds Orion Web Console.
    • All templates from previous versions of NCM are migrated to the SolarWinds Orion database during an upgrade.
    • Access templates that other SolarWinds users share through thwack directly in Device Template Management.
  • Enhanced Change Approval Workflow
    The NCM approval system allows three different workflows:
    • Use a one-tier approval workflow to submit configuration changes to an NCM administrator.
    • Use a non-privileged, two-tier approval workflow to require non-privileged users (any user with the WebUploader role) to submit configuration changes to two different approval groups.
    • Use an inclusive, two-tier approval workflow to require all users to submit configuration changes to two different approval groups.
  • Web-based Reports
    • Create and edit reports using new, web-based reports.
    • NCM now uses Orion Platform reports (HOME > Reports) instead of the NCM reporting pages (CONFIGS > Reports).
    • Previous reports are not migrated to the web-based reports system and can no longer be edited after an upgrade.
    • Schedule reports with the Orion Report Schedulers instead of the NCM Run Report job.
  • Policy Violation Remediation
    You can automatically remediate violations in a device configuration on multiple nodes using a script.
  • Web-based Alerts
    • Create and manage alerts using the web-based alerting engine.
    • Alerts created using the desktop-based alerting engine are automatically migrated to the web-based alerting engine.

 

More details can be found in the Release Notes and in the RC blog post: Network Configuration Manager v7.4 Release Candidate is Available!.

We have reached the Release Candidate (RC) status for Network Configuration Manager (NCM) 7.4. RC is the last step before general availability and is a chance for existing customers to get the newest functionality before it is available to everyone else.

 

Update: NCM v7.4 RC2 is available on customer portal. Please note that an NCM server host with SolarWinds NPM installed cannot install or upgrade to NCM 7.4 RC2 until the NPM is ugraded to NPM 11.5.2 RC1. More details can be found in NCM 7.4 RC2 is Available on Customer Portal.

 

  • Device Template Wizard
    Use the web-based wizard to create or edit a device template. NCM stores all device templates in the Orion Platform database instead of the NCM server's local file system.
  • Cisco Vulnerability Reports
    Receive alerts when the latest NIST data indicates a vulnerability in a version of Cisco device software (IOS or non-IOS) running on deployed switches, routers, and security appliances.
  • Compliance Reports
    DISA STIG, NIST FISMA, and PCI policy reports, with all necessary rules and policies already set-up, become available to run after installation.
  • Enhanced Change Approval
    Use a one tier approval workflow to allow any NCM user with the WebUploader role to submit device configuration changes to a single NCM Administrator. Use a two tier approval for non-privileged users to require two NCM Administrators to approve a device configuration change submitted by any NCM user with the WebUploader role. And use a two tier approval for all users to require two NCM Administrators to approve a device configuration change submitted by any NCM user.
  • Web-based Alerts and Reports
    Fully eliminating the NCM desktop application, NCM uses the Orion Platform alerts and reports systems, enhancing NCM's integration with other Orion Platform products.
  • Remediation of Policy Violation
    Automatically or manually remediate violations from within the Policy Report interface for all relevant blocks in a device configuration.
  • Configuration Change Auditing
    Syslog data forwarded from network devices as part of real-time change detection includes the name of the user associated with the change.

 

Extend and troubleshoot device templates easily

Device templates have been moved to the database. You can modify the templates in the Web UI and no longer have to replicate them accross your polling engines. Smooth thwack integration was a must!

In addition, we have integrated a wizard into NCM that helps you develop new templates or troubleshoot problems with the existing ones.

 

Device-Template-Management.PNG Device-Template-Wizard.PNG

 

Identify and manage firmware vulnerabilities

If network security is a concern in your organization, you should definitely use this new capability of NCM -- run a nightly vulnerability assessment based on recent CVE data provided by the National Vulnerability Database (by NIST). NCM will download and process the CVE data in a SCAP-compatible way and will notify you of potential vulnerabilities, provide detailed information and let you take an appropriate action. This security scan works even if your NCM server is not connected to the Internet -- you just have to download the datafiles manually. Complimentary reports are provided out of the box.

Note: Cisco IOS and ASA devices are supported as of now.

 

Vulnerability-Report.PNG

Vulnerability-Manage.PNG Vulnerability-Settings.PNG

 

Run your favourite regulatory compliance checks out of the box

Tired of importing the obligatory reports from thwack? No longer a problem! NCM now ships the latest DISA STIG, NIST FISMA, and PCI reports out of the box. The updates also include broader vendor coverage and more detailed checks.

 

Note: If you upgrade from NCM v7.2.x to v7.4 Release Candidate, these new reports will be missing. The workaround is to upgrade from 7.2.x to 7.3.2 first and then to 7.4 RC. The problem is related to upgrades from NCM 7.2.x only; upgrades from NCM 7.3.x and clean installations are not affected. We apologoize for incovenience and work on solution for the final NCM 7.4 release.

 

DISA-STIG.PNG

 

Manage your NCM reports and alerts on the web

Were you looking forward to the day when you could customize your NCM reports in the web and combine them with information from other modules? The day has come! Not only have we migrated all the existing inventory reports to the Orion reporting engine, but we have also added a decent number of new ones. The same applies to alerts.

 

Web-Reports.PNG

Web-Alerts.PNG

 

Automatic Compliance Enforcement

Maintaining your configurations compliance has never been so easy. Just configure the remediation script to be executed automatically! Works for interfaces, too.

 

Automatic-Remediation.PNG

 

Ant that's not all -- check Network Configuration Manager v7.4 Beta2 is Available! for other improvements that cannot fit in this post.

 

RC builds are made available to existing customers prior to the formal release. These are used to get customer feedback in production environments and are fully supported. If you have any questions, I encourage you to leverage the NCM forum.

 

You will find the latest version on your customer portal in the Release Candidate section.

Update: NCM 7.4 Beta2 has been made available.

 

We have completed another bulk of the development effort and are now focused on testing the latest enhancements of Network Configuration Manager (NCM); NCM v7.4 Beta is available. This is your chance to install the latest version and provide feedback on the new features and fixes. Providing feedback during the beta is the best way to ensure that your feedback will be incorporated in to the release. To participate, simply fill out this survey and you will be sent the download links for the Beta. Remember, Betas are open to customers with valid maintenance contract, cannot be installed in production, and you cannot upgrade the Beta to any other future versions.

 

signup.png

 

New features in Beta2 (topics in alphabetical order):

  • Auditing Improvements
    • Track username of user who made a config change (for real-time change detection)
  • Compiance Reports and Remediation
    • Automatic remediation of policy violations (optional).
    • Execute remediation script for all blocks in violation (e.g. interfaces).
    • Use Config Change Templates for remediation.
  • Config Change Approval
    • Two-step approval (optional).
  • Device Lifecycle Management
    • New report listing End-of-Life devices
    • Automatically assign End-of-Life information based on part number.
  • Device Template Assistant integrated in Web UI
  • Miscellaneous Web UI and Usability Improvements
    • Update or cancel only selected inventory transfers.
    • A number of small usability improvements

 

Content of Beta1:

  • Web-based reporting
  • Web-based alerting
    • Enhancement: Execute the NCM action on a different node.
  • Miscellaneous Web UI and Usability Improvements
    • Be able to quickly add/remove a lot of nodes to/from NCM at the same time.
    • Add SWQL filtering for drill-down charts on NCM summary page.
    • Make grids match browser window size.
    • Export config file from Web UI.
    • Ability to re-execute items on transfer status page.
    • Keep history for the transfer status page.
    • Notify requestor when his/her request has been approved.
    • Option to exclude devices with no config changes from the config change report email notification
    • Improved EoL/EoS summary resource
  • Improvements of Compliance Reports
    • Better navigation when inspecting violations.
    • Config block not found does not mean policy violation.
    • Update only selected policy reports.
    • Disable a policy report.
    • Copy/duplicate a policy or rule.
    • Delete all policies and rules associated with a report at once.
    • Policy violations summary resource is customizable.
    • Export violation details with the compliance report.
  • Security Improvements
    • Report vulnerabilities for Cisco IOS
    • The default NCM Role is None for a new Orion account.
  • New config change templates out of the box
  • Store device templates in the database

 

Inventory reports use Orion web reporting UI

The reporting system of Orion Platform brings a lot of improvements to NCM inventory reports.

  • Modern UI shared with other Orion products
  • Wide range of cusomization possibilities; both information and formatting.
  • No need to RDP to the NCM server

 

Web-Reports-01.png

 

Web-Reports-02.PNG

 

Web UI improvements

Now you can add nodes to NCM without leaving the main node management page:

 

Add-to-NCM.png

 

The pie charts on NCM summary page can be filtered now; this is useful e.g. for Juniper devices that don't follow Cisco's model of startup and running configuration.

 

Chart-Filtering.png

 

You can re-execute transfers easily on the Transfer Status page. The records do not get overwritten in case you are interested in the history.

 

Transfer-Reexecute.png

 

The EoL/EoS summary resource presents the data in a better structured way. When you click on a part number, the EoL/EoS detailed grid filtered for that particular part number is opened.

 

EOS-Resource.PNG

 

Compliance reports are easier to use

A few simple but useful improvements:

 

  1. Update only selected report(s)
    Compliance-Update-Selected.png
  2. Enable/disable a report
    Compliance-Enable-Disable.png
  3. Policy violations resource is customizable
    Compliance-Resource-Customizable.PNG
  4. When a rule searches in a block rather than in the full config, you have the option not to trigger violation if the whole config block is not present.
    Compliance-Block-Not-Found.png

 

NCM reports vulnerabilities for Cisco IOS

See what vulnerabilities exist for your Cisco IOS nodes. Be alerted when there is a new vulnerability. Acknowledge, remediate, or ignore.

 

Vulnerabilities-Report.PNG

 

Vulnerabilities-Resource.png

 

Vulnerabilities-Manage.png

 

Device templates are managed on the web

No need to distribute the device templates across all your pollers and keep them in sync.

 

Device-Templates.PNG

 

signup.png

You can find the installation packages in your customer portal. This service release:

 

  • Upgrades Orion Platform (2014.2.1):
    This version includes the latest Orion Platform features and versions of existing components.
  • Includes a Parameter for Specifying a Password Prompt in Device Templates:
    This version enables you to specify the password prompt issued by a device as part of the device template, in case NCM is having trouble recognizing the device's prompt (for example, due to unsupported characters).
  • Enhances Support for SWIS Connections:
    The version modifies NCM software to process SWIS connections to any poller.
  • Accounts for the SolarWinds Alerting Service V2:
    This version fixes a problem with the NCM installer not shutting down a specific Orion Platform service.
  • Restores Test Button:
    This version fixes an error with Test button in Edit Properties resource for a node.
  • Enforces Reserved Words:
    In this version NCM ignores custom property names that include reserved words.
  • Moves a Data Migration Module:
    This version fixes a bug related to the location of data migration code module.
  • Restores "Overall Policy Violations" Resource:
    This release resolves a problem that prevents this resource from displaying.
  • Supports SQL Server 2012 SP2:
    NCM now supports this version of SQL Server.

 

Further details and list of fixed issues can be found in the release notes.

You can find the installation packages in your customer portal. This service release:

 

  • Upgrades Orion Platform:
    This version includes the latest Orion Platform features and versions of existing components.
  • Enables Storing of Config Archives on Network Share:
    This version more effectively enables storing your growing archive of device configs on a permissioned network share.
  • Maintains Job Logs:
    The database maintenance job now remove job logs of a specified size and age.
  • Removes Unnecessary Node Information:
    Orion Platform nodes no longer have a Configs subview under Node Details.

 

Further details and list of fixed issues can be found in the release notes.

To receive updates on the NCM roadmap, JOIN thwack and BOOKMARK this page.

 

After the release of NCM v7.3 and service releases NCM v7.3.1, and v7.3.2, we have been working on another bulk of features. Here they are:

 

Disclaimer: Comments given in this forum should not be interpreted as a commitment that SolarWinds will deliver any specific feature in any particular time frame. All discussions of future plans or product roadmaps are based on the product teams intentions, but those plans can change at any time.

This post is an update of the NCM 7.0, 7.1, and 7.2 Architecture and Deployment blog post and focuses on the differences introduced in Network Configuration Manager (NCM) 7.3.

 

NCM 7.3 architecture is different from the previous versions as we have taken two important steps towards complete integration with other Orion modules:

  • NCM and Core/NPM databases have been merged. (See Network Configuration Manager v7.3 is Now GA! for full list of benefits.)
  • Deployment scenario where NCM is integrated with NPM but installed on a separate server is no longer supported.
    This kind of deployment was a temporary step between NCM 6.x (and older) and NCM 7.x with additional poller support. As NCM 7.1 was released in Q3'2012, this installation scenario is no longer supported.

 

Standalone Deployment

  • Choose this deployment if you only have NCM or if you want it completely non-integrated to any other Orion-based product.
  • Other SolarWinds products can be installed and integrated to a standalone NCM at a later time.
  • Node, User Account and Syslog & Trap Management rely on Orion Platform (a.k.a. Core) components. NCM also benefits from Network Atlas.
  • NCM and Orion Platform rely on Microsoft SQL Server database which can be co-hosted or installed on separate server. The diagrams below show these two options:

 

73-SP.png               73-SP-DB.png

 

Integrated Deployment

  • Choose this deployment if you want to have NCM integrated with the rest of your Orion-based products (NPM, SAM, UDT, IPAM, VNQM, etc.).
  • In this case, the Web UI is always integrated, i.e. Home/Network and Configs tabs appear side by side in the Web interface. Note that it is possible to configure NPM users to have no visibility of the NCM tab and resources by using the NCM User Account setting NCM Role=None. See NCM admin guide section “Setting User Account Access” for details.
  • NCM 7.3 can be co-hosted with NPM 10.7 and higher.
  • The options for MS SQL database are the same as with the Standalone deployment type.

 

73-Integrated.png

 

Integrated Separate Server Deployment

This scenario is no longer supported.

 

73-not-supported.png

 

Multi-Poller Deployment

Multi-Poller Standalone

  • This is the configuration for NCM standalone, leveraging multiple polling engines.

 

73-MP.png

 

Multi-Poller Integrated

  • This is the configuration for NCM integrated with NPM (and/or other Orion modules), leveraging multiple polling engines.
  • The polling engines are shared by NCM and the other Orion modules.

 

73-MP-Integrated.png

 

Further Reading

I am happy to announce General Availability (GA) of SolarWinds Network Configuration Manager (NCM) v7.3. Above all, I would like to draw your attention to the major architectural improvement that we have implemented in this version: NCM and Core/NPM databases have been merged. This improvement:

  • Considerably simplifies installation, upgrade, and maintenance;
  • Represents one further step towards full integration with other Orion modules;
  • Is a prerequisite to the following enhancements:
    • Account limitations applied to NCM jobs.
    • Core node management page is used to add/remove devices from NCM.
    • Node sync is gone. (No more issues with NPM and NCM databases containing contradicting data.)
    • Subviews are fully supported.

 

In addition to the database merge, we have implemented the following improvements:

  • A completely new version of the Configuration Management page
  • EoL/EoS feature enhancements
    • Improved matching reliability for EoL/EoS.
    • EoL/EoS data includes more information.
  • Admins can clear transfers for other users.
  • Better support of Huawei devices.
  • Jobs Summary table can be sorted according to any column.
  • SWISv3 support

 

Let's take a look at the most important benefits of this release in detail.

 

Making Life Easier with a Single Database

  1. Simpler node management -- You don't have to manage your NCM nodes in two different places; all you need is now covered by the NPM/Core node management page.

    Node-Management.png

  2. Easier product configuration -- There is only one (Orion) configuration wizard now. You don't have to enter two different database credentials in two different configuration tools.
  3. Account limitations applied to jobs -- Not only are the limitations respected by NCM jobs; you are no longer required to have full Orion admin permissions to manage NCM scheduled jobs. All you need is NCM Administrator or Engineer roles. The job uses permissions and limitations of the user account that modified it last.

    Jobs-Summary.PNG
  4. Subviews -- Using a single database schema allows NCM to efficiently support subviews. You can easily switch between information about the same device from different Orion modules.

    Node-Details.png

Smoother Config Management Workflows

Do you want to perform a series of actions on the same set of devices? Are you missing the node tree from the Win32 NCM application in the Web Console? Or do you find the current Configuration Management page in the Web Console a bit cumbersome?

If you have answered "Yes" at least once, you are going to love our brand new Configuration Management UI:

 

Config-Management.PNG

 

Compare-Configs.PNG

 

With this new UI you can:

  • Group the nodes according up to three criteria including node properties, custom properties, device status etc.
  • Cover complex scenario with the same set of nodes. The node selection is persistant -- you can switch between groups of nodes, check transfer status, take different actions -- and the selection stays the same.
  • Proceed with your workflow without interruption -- most of the actions are performed in popup windows.
  • Save your scripts and re-use them later.

 

More Efficient End-of-Life Management (now with color coding!)

We have extended the EoL data with product part numbers for Cisco, in this release. Therefore, NCM is able to find the EoL information for your devices much more easily; all you have to do for this procedure to work is update inventory. Then you will see highly reliable data (marked green).

 

EoL-green.PNG

 

As a bonus, you will get Replacement Part Number and End of Software Maintenance information.

Filter Blog

By date: By tag: