Comments
-
I have seen this about 5 times over the past few months. I am running 9.5.1 so the latest version. I also concur that it appears to fall back to snmpv2, and of course it is unreachable because we have snmpv2 turned off. Anybody else seen this?
-
I found a migration technical reference through Thwack - looks like it has what I am looking for I believe.
-
According to this it is supported, see the paragraph at the bottom of the page: http://www.solarwinds.com/support/supported_products.aspx From experience - it works great!
-
Found the answer in another thread:
-
One correction to my comment, the detail matches, but the counts on the summary do not.
-
This functionality is not currently available in the product. They have it on the roadmap for a future release. Here is a link with the request #:
-
Thanks for the reply. Actually I am not logged in as that account, the idea was to use a service account that did not have login capability, only allow authentication between the two servers. Maybe I will try to have the account enabled for login long enought to run the wizard, and then turn it off. Where's 'su' for…
-
Here are a couple of posts that might give some insight: The summary of the posts are that you are unable to do compliance checking at the interface level without specifying the actual interface names and what to look for in your rules. This is fine if you have consistent device types, but does not scale if you have a…
-
Have you had any response outside this forum to this problem? I am seeing the same issue.
-
Well not exactly sure what it all means, but I was able to add the node once I bounced the snmp daemon on the node I was trying to add. Weird...
-
Not sure the easiest way to do this via NPM/NCM, but in order for the security folks to have access to a limited number of show commands, you would accomplish this via the privleges command set on the routers/switches they need access to. Here is a link that describes how to set which show commands they could see:…
-
Those are some good enhancements, I appreciate your team's effort to continue to make the product more robust. Don't want to keep beating the drum, but can you give me a hint as to whether compliance checking via regexp at the interface level is getting any attention? I know that "it is on the roadmap", but that doesn't…
-
Had issues upgrading related to "file not found", which is explained here: http://support.solarwinds.com/kbase/ProblemDetail.cfm?ID=1232
-
I have yet to run across this type of functionality. We have similiar needs like determining at the interface level which ones are not configured for redirects, proxy arp, etc... Looks like regexp is pretty powerful for looking for strings, but NCM is not quite there when it comes to searching for…