56 Replies Latest reply on Apr 26, 2011 3:03 PM by njoylif

    If you're curious as to what we're working on...

    chris.lapoint

      The NCM team is busy at work on a number of highly requested enhancements:

      1. Connected Hosts Report - ability to get a list of connected hosts managed in Orion.  The current plan is to deliver this as an update to the NCM integration module for Orion NPM.

      2. Find Connected Port for End Host - ability to search for a host via IP, hostname, or MAC address and see the switch port it's connected to along with details of the port.  This current plan is to deliver this as an update to the NCM integration module for Orion NPM.

      3. NPM/NCM alerting integration - ability to run an NCM config script to gather diagnostic data and include this in an NPM advanced alert message (e.g. sh interface ${ifName}) .  ability to get last config change and include this in an NPM advanced alert message.  ability to backup running config.   This will be delivered as an update to the NCM integration module for Orion NPM.

      4. Config change templates - ability to add logic to config change templates (e.g. if, then, else).  ability to access NCM inventory data in change templates (e.g. custom properties, interface description, VLAN, etc.).  ability to gather change template inputs (e.g. node, interface description, etc.) interactively through web UI when it is run.   ability to import and export to thwack.

      5. Windows 2008 task scheduler support - ability to run on Windows 2008 without any requirements to edit  job settings using the Windows Task Scheduler.   Ability to run Realtime Change Detection without having to be logged on to server.

      6. Windows 2008 R2 support

      7. SCP v1 support  (SCP/SFTP v2 support already in 5.5.2) - certain Cisco devices only support SCP v1 (e.g. Cisco IPS module), so this will enable SCP download from those devices as well.

      In parallel, we are also working on the following:

       

      FIPS support – ensures product operability on a Windows OS (2003 & 2008) with the FIPS Group Policy Object (GPO) enabled, which restricts which cryptographic algorithms are allowed.

       

      PLEASE NOTE:  We are working on these items based on this priority order, but this is NOT a commitment that all of these enhancements will make the next release.  We are working on a number of other smaller features in parallel.   If you have comments or questions on any of these items (e.g. how would it work?) or would like to be included in a preview demo, please let us know!