This discussion has been locked. The information referenced herein may be inaccurate due to age, software updates, or external references.
You can no longer post new replies to this discussion. If you have a similar question you can start a new discussion in this forum.

Do you currently use UDT?--We want to talk to you!

The User Experience (UX) team is looking for people who use UDT today in their environment to talk to us about what you use it for, how it's working for you, what's missing that you'd like to see UDT do, and most importantly, take us on a tour of how you use it.  There will be 1 hour interviews any time from Monday, July 9 to Friday, July 20, any 1 hour blocks from 8am Central Standard time to 4pm. People who participate will of course receive 3,000 THWACK points; but the big win is that you get a chance to make a difference in future versions of UDT.  Please email me directly at kellie.mecham@solarwinds.com with a date and time which work for you and we'll set something up! --Meech

  • Although this discussion is a little outdated I wanted to raise my hand anyway. We are using UDT to get an idea of how many ethernet ports are actually used during a semester. Based on the results of our findings we hope to reduce the number of network switches we have deployed across our campus environment.

  • Unmonitor Ports AND Rogue Endpoints in UDT

    I'd love to provide some feedback on the above thread. I tried emailing back in August to see if you were doing another session, but never heard back.

  • We simply use UDT in conjunction with NTA and NPM for identifying users' ports. It's super simple to search on user's name (eh hem... not the username.. but their name ie, "John Doe" not "JDoe") to find out which device and switch port they are accessing. Works great in our small environment.

    We plan to enable sticky ports for port security and limit each port to only one device... This, however, will not allow us to use our Fluke on those ports.  Although I suppose I could set the device limit to 2 and walk around with the Fluke to dynamically assign its MAC to every port as the second device.... Regardless, having UDT will allow us to search for users on our network without needing the Fluke.

    I would love to see how others may be using UDT for port security, as it seems to have capabilities to white list MAC address on the network instead of setting up port security on the switches themselves.

  • we do, but it is not what we expected. Kind of disappointed.

  • we use it for quite a few things, port capacity

    pastedImage_0.png

    custom sql report for the days used, as the inbuilt one never really worked as it should

    pastedImage_7.png

    pastedImage_3.png

    for audit purposes and just finding things on the network we always use the global UDT search. which gives us the port or the AP the device is attached to and how long etc.

    pastedImage_4.png

    pastedImage_5.png

    pastedImage_6.png

    pastedImage_8.png

  • I use it.  There are some limitations that are difficult to overcome (challenges finding information about how to use it with snmp-v3 instead of v2 or v1, challenges when a Cisco ASA is the router for one or more subnets), but I use it.

    Contact me if you'd like to discuss this.