SlideShare a Scribd company logo
Welcome to Network
Configuration Manager
training – Part 1
Configuration backup & Disaster recovery
Free Network Configuration Manager Training – Part 1
Can you hear me?
Can you see the presentation?
Please confirm by commenting on the chat panel.
Trainer
Renuka Govindarajan
Network Configuration Manager
• Manual Configuration changes
• Faulty configuration changes.
• Unplanned, unauthorized configuration changes to their network
devices
• Business needs demand frequent, quick configuration changes. Task
becomes complex when multiple administrators manage devices from
multi-vendors.
• Keeping track of configuration changes
Why is a tool needed for configuration
management?
NCM offers a perfect solution for all the above issues:
• Designed to automate the entire lifecycle of device configuration
management.
• Process of changing configurations, managing changes, ensuring
compliance and security are all automated.
• Helps in ensuring high levels of security in the network
What does NCM do?
Minimum system requirements
2.4 GHz dual-core
processor, or
equivalent
12GB RAM 50GB storage PostgreSQL/MSSQL Windows/Linux
The above given specifications are for an environment with 1000 devices. Refer: System requirements
Agenda
• Initial setup
• Device discovery & templates
• Credentials
• Configuration backups & upload
• Real-time change detection & change management
• Disaster recovery
Initial setup
-Ports & protocols SNMP Profile Device discovery
and
Device template
Backup
credential
Pre-requisites: Ports & Protocols
Protocols:
SSH, SCP, TFTP
Ports:
69 – TFTP | 22 – SSH/SCP | 514 – Syslog
13306 – Postgres database
Device discovery
SNMP Request
SysOID
SNMP Profile
V1, V2, V3
NCM Discovery
Add device & associate with
corresponding device
template
Match received
SysOID with
default/custom
SysOIDS
Match found
Match not
founddevice not
added
Device discovery
Single device:
-IP Address
Bulk discovery:
- IP range
- CSV file import
‘Device is not responding for SNMP requests’
Common causes:
The device is reachable yet not
responding:
- Incorrect SNMP read
community
- Disabled SNMP in the device
Possible error:
Device not added
Common causes:
Device reachable & SNMP community is correct but still device is not
getting added:
1. Device SysOID not mapped with any device template
Fix: Add sysOID to device template at SysOID finder in settings.
Possible error:
2. No default device template is available in NCM for the particular
device type
Fix: Add/clone new device template.
or Contact NCM support
Device template
What are device templates and what are they used for?
Device specific configuration commands :
• Configuration backup
• Configuration upload
• Enable/disable syslog change detection
• Fetching hardware information
Built-in device templates for
4000 device models
Customizable device templates
Share with network admins around
the world.
Manual device addition
Single device
- IP Address/Hostname
- Vendor
- Device template
Bulk addition
-CSV File import
Format: <Hostname/ IP Address>,<Device Template
Name>,<Series>,<Model>
Inventory
list
Backup credential
Possible combinations of protocol for backup:
• SSH/TELNET
• SSH - TFTP / TELNET - TFTP
• SSH - SCP
• SNMP - TFTP
SSH / TELNET
SSH / TELNET
Device
configuration
Encrypted
configuration
stored in
database
Config
backup
commandsNCM
SSH/TELNET - TFTP
Inbuilt
TFTP
Server
Config backup
commands
Config file transfer
using TFTP
Encrypted
configuration file
stored in DB
NCM
SSH/TELNET -
TFTP
SSH - SCP
SCP
Server
Config backup
commands
Config file transfer
using SCP
Encrypted
configuration file
stored in DB
NCM
SSH - SCP
SNMP - TFTP
SNMP Request for
config backup
Configuration
file transfer
using TFTP
TFTP
Server
Encrypted
configuration file
stored in DB
NCM
How to provide credentials?
Refer: https://download.manageengine.com/network-configuration-manager/Device-Expert-Credentials-Tutorial.pdf
When password &
enable password is
configured:
No enable mode
configured:
admin
#
Password & enable
password configured:
enable
Directly going to
enable mode
enable
admin
3Com router
:
manager
Credentials are valid but
file transfer is failed
Common cause:
1. TFTP or SCP servers have not been
started.
Fix: Check running status of TFTP or SCP
servers in NCM server settings. (69 & 22)
2. Timeout due to config file size
Fix: Increase backup timeout value in the
corresponding device template.
Possible error:
Configuration backup
• Why should you backup?
• Instant (Single & Bulk)
• Real-time change detection
• Scheduled
Real-time change detection
• What is it? Configuration
change made
Configuration
change made
Configuration backup
• Why is it important?
• How does it work?
Syslog listener
How does it
work?
We don’t support Enable Change Detection for
this device.
Common cause:
NCM doesn’t support syslog for the
particular model.
- Fix: Enable syslog by connecting to
the device and executing the
enable syslog commands manually.
or
Contact NCM support.
Possible error:
Change detection is enabled but change is not
detected
Common cause:
When the device & NCM support syslog,
- Mismatched ports
- Check NCM syslog server running status in NCM server settings
Possible error:
Scheduled backup
• Routine everyday backups
• Monthly / Weekly / Daily / Hourly / Once
Schedule failure
Common causes:
Particular device credentials incorrect.
Backup failure
Common causes:
1. Credentials are changed or invalid.
2. Ports blocked or TFTP/SCP server not started
• Check port 69 & 22 (TFTP & SCP) in NCM server settings
3. Huge config file
• Fix: Change the timeout settings in the corresponding device template.
4. Unsupported backup commands
• Edit the commands in device template or create a new device
template by cloning the closest template.
Change management
• Change tracking, versioning & history
• Compare configurations
Change tracking, versioning, & history
• View all changes made in a device
• Automatic configuration versioning
• Know the who, when & what of each change
• Know the historical change trend of a device
• View the number of modified, deleted & added config lines
Compare configurations
• Compare different versions of same
device
• Compare different devices configurations
• View colour coded differences: added,
modified & deleted
Disaster recovery
What’s a disaster in networks?
• A network outage
• A security breach
• Performance degradation of
business critical services and
applications
How to be prepared?
• Baseline configuration
• Startup/running sync
• Change notification & rollback
• Export configuration | Upload draft
Baseline configuration
• What is it?
• Why is it important?
• How to use it in times of disaster?
‘We don’t support upload feature for this device’
Common causes:
• TELNET/SSH protocol doesn’t support upload
• Fix: Edit the credential and Change the protocol from
SSH, TELNET to SSH - TFTP, SSH - SCP , TELNET -TFTP
depending the devices.
• When SCP/TFTP protocol is used:
• Device vendor supports but NCM device template
doesn’t have upload commands for the specific device.
• Fix: Clone/create a new device template with
suitable SCP/TFTP commands
or Contact NCM support
Possible error:
Startup/running sync
• Why is it important?
• Loss of changes made in running
configuration during device reboot
• How NCM helps?
• Detects conflict
• Sync configurations
‘Upload failure’
Common causes:
1. Command timeout
Fix: Change timeout in device template command settings for the device type.
2. Based on the protocol, check the running status of TFTP & SCP
servers in Server Settings.
Possible error:
‘Change happens, but startup-running conflict is not
detected by NCM in real-time.’
Common cause:
Disabled real-time change detection.
Fix:
- Enable change detection if syslog is supported.
- If syslog is not supported, the startup-running conflict will be detected
and reported after the next successful schedule backup or manual backup
operation.
Possible error:
Change notification & roll back
Configure change notifications
• Email
• SNMP Trap for change event
• Trouble ticket
• Generate syslog message for change event
Associate notification profile to devices/device groups.
• Roll back
To previous version
To baseline version
Export config
• Readable format
• Local/shared storage
• Schedule
Part 2 on 12.00 PM EDT | 28th august
Automation, notification, compliance & reports
Agenda:
• Scheduling configuration tasks
• CLI Configlets
• Compliance (PCI and others)
• Role based Access control (change approval)
• Notification & Alerts
• Reports
Let’s keep in touch!
hemalakshmi.b@manageengine.com
https://www.youtube.com/channel/UCHLusaahd4nS9esD3xBVeUQ
https://forums.manageengine.com/network-configuration-manager
Network Configuration Manager Training - [Season 4] Part 1 - Configuration backup & disaster recovery
Network Configuration Manager Training - [Season 4] Part 1 - Configuration backup & disaster recovery

More Related Content

What's hot

Comparison NVR vs Others
Comparison NVR vs  Others Comparison NVR vs  Others
Comparison NVR vs Others
Fernando Barrientos
 
XPDDS18: Xen Testing at Intel - Xudong Hao, Intel
XPDDS18: Xen Testing at Intel - Xudong Hao, IntelXPDDS18: Xen Testing at Intel - Xudong Hao, Intel
XPDDS18: Xen Testing at Intel - Xudong Hao, Intel
The Linux Foundation
 
SDP_Presentation_template.pptx
SDP_Presentation_template.pptxSDP_Presentation_template.pptx
SDP_Presentation_template.pptx
Shania Asadipour
 
ViewMaster - Industrial Network Configuration Utility | WoMaster
ViewMaster - Industrial Network Configuration Utility | WoMasterViewMaster - Industrial Network Configuration Utility | WoMaster
ViewMaster - Industrial Network Configuration Utility | WoMaster
WoMaster
 
XPDDS18: Xen Project Weather Report 2018
XPDDS18: Xen Project Weather Report 2018XPDDS18: Xen Project Weather Report 2018
XPDDS18: Xen Project Weather Report 2018
The Linux Foundation
 
CiScoPresentation
CiScoPresentationCiScoPresentation
CiScoPresentation
iman vaghefi
 
eFolder Expert Series Webinar — 3 Easy Steps to Configuring Your Own BDR Appl...
eFolder Expert Series Webinar — 3 Easy Steps to Configuring Your Own BDR Appl...eFolder Expert Series Webinar — 3 Easy Steps to Configuring Your Own BDR Appl...
eFolder Expert Series Webinar — 3 Easy Steps to Configuring Your Own BDR Appl...
eFolder
 
Process control daemon
Process control daemonProcess control daemon
Process control daemon
haish
 
CNIT 152: 6. Scope & 7. Live Data Collection
CNIT 152: 6. Scope & 7. Live Data CollectionCNIT 152: 6. Scope & 7. Live Data Collection
CNIT 152: 6. Scope & 7. Live Data Collection
Sam Bowne
 
Current and Future of Non-Volatile Memory on Linux
Current and Future of Non-Volatile Memory on LinuxCurrent and Future of Non-Volatile Memory on Linux
Current and Future of Non-Volatile Memory on Linux
mountpoint.io
 
VMworld 2013: Implementing a Holistic BC/DR Strategy with VMware - Part Two
VMworld 2013: Implementing a Holistic BC/DR Strategy with VMware - Part TwoVMworld 2013: Implementing a Holistic BC/DR Strategy with VMware - Part Two
VMworld 2013: Implementing a Holistic BC/DR Strategy with VMware - Part Two
VMworld
 
Os Deployment With Configuration Manager 2007
Os Deployment With Configuration Manager 2007Os Deployment With Configuration Manager 2007
Os Deployment With Configuration Manager 2007
Amit Gatenyo
 
DeltaV Development Systems in a Virtualized Environment
DeltaV Development Systems in a Virtualized EnvironmentDeltaV Development Systems in a Virtualized Environment
DeltaV Development Systems in a Virtualized Environment
Emerson Exchange
 
Backup Exec Blueprints▶ Deduplication
Backup Exec Blueprints▶ DeduplicationBackup Exec Blueprints▶ Deduplication
Backup Exec Blueprints▶ Deduplication
Symantec
 
Chapter08
Chapter08Chapter08
Chapter08
Muhammad Ahad
 
Bluetube
BluetubeBluetube
Bluetube
Vinoth Chandar
 
Kent Agerlund - Via monstra part 4 become the hero of the day, master configm...
Kent Agerlund - Via monstra part 4 become the hero of the day, master configm...Kent Agerlund - Via monstra part 4 become the hero of the day, master configm...
Kent Agerlund - Via monstra part 4 become the hero of the day, master configm...
Nordic Infrastructure Conference
 
Chaos Engineering
Chaos EngineeringChaos Engineering
Chaos Engineering
Anshul Patel
 
Real time network monitoring
Real time network monitoringReal time network monitoring
Real time network monitoring
Sumit Rajpal
 
MBX Systems Overview
MBX Systems OverviewMBX Systems Overview
MBX Systems Overview
Carl Nothnagel
 

What's hot (20)

Comparison NVR vs Others
Comparison NVR vs  Others Comparison NVR vs  Others
Comparison NVR vs Others
 
XPDDS18: Xen Testing at Intel - Xudong Hao, Intel
XPDDS18: Xen Testing at Intel - Xudong Hao, IntelXPDDS18: Xen Testing at Intel - Xudong Hao, Intel
XPDDS18: Xen Testing at Intel - Xudong Hao, Intel
 
SDP_Presentation_template.pptx
SDP_Presentation_template.pptxSDP_Presentation_template.pptx
SDP_Presentation_template.pptx
 
ViewMaster - Industrial Network Configuration Utility | WoMaster
ViewMaster - Industrial Network Configuration Utility | WoMasterViewMaster - Industrial Network Configuration Utility | WoMaster
ViewMaster - Industrial Network Configuration Utility | WoMaster
 
XPDDS18: Xen Project Weather Report 2018
XPDDS18: Xen Project Weather Report 2018XPDDS18: Xen Project Weather Report 2018
XPDDS18: Xen Project Weather Report 2018
 
CiScoPresentation
CiScoPresentationCiScoPresentation
CiScoPresentation
 
eFolder Expert Series Webinar — 3 Easy Steps to Configuring Your Own BDR Appl...
eFolder Expert Series Webinar — 3 Easy Steps to Configuring Your Own BDR Appl...eFolder Expert Series Webinar — 3 Easy Steps to Configuring Your Own BDR Appl...
eFolder Expert Series Webinar — 3 Easy Steps to Configuring Your Own BDR Appl...
 
Process control daemon
Process control daemonProcess control daemon
Process control daemon
 
CNIT 152: 6. Scope & 7. Live Data Collection
CNIT 152: 6. Scope & 7. Live Data CollectionCNIT 152: 6. Scope & 7. Live Data Collection
CNIT 152: 6. Scope & 7. Live Data Collection
 
Current and Future of Non-Volatile Memory on Linux
Current and Future of Non-Volatile Memory on LinuxCurrent and Future of Non-Volatile Memory on Linux
Current and Future of Non-Volatile Memory on Linux
 
VMworld 2013: Implementing a Holistic BC/DR Strategy with VMware - Part Two
VMworld 2013: Implementing a Holistic BC/DR Strategy with VMware - Part TwoVMworld 2013: Implementing a Holistic BC/DR Strategy with VMware - Part Two
VMworld 2013: Implementing a Holistic BC/DR Strategy with VMware - Part Two
 
Os Deployment With Configuration Manager 2007
Os Deployment With Configuration Manager 2007Os Deployment With Configuration Manager 2007
Os Deployment With Configuration Manager 2007
 
DeltaV Development Systems in a Virtualized Environment
DeltaV Development Systems in a Virtualized EnvironmentDeltaV Development Systems in a Virtualized Environment
DeltaV Development Systems in a Virtualized Environment
 
Backup Exec Blueprints▶ Deduplication
Backup Exec Blueprints▶ DeduplicationBackup Exec Blueprints▶ Deduplication
Backup Exec Blueprints▶ Deduplication
 
Chapter08
Chapter08Chapter08
Chapter08
 
Bluetube
BluetubeBluetube
Bluetube
 
Kent Agerlund - Via monstra part 4 become the hero of the day, master configm...
Kent Agerlund - Via monstra part 4 become the hero of the day, master configm...Kent Agerlund - Via monstra part 4 become the hero of the day, master configm...
Kent Agerlund - Via monstra part 4 become the hero of the day, master configm...
 
Chaos Engineering
Chaos EngineeringChaos Engineering
Chaos Engineering
 
Real time network monitoring
Real time network monitoringReal time network monitoring
Real time network monitoring
 
MBX Systems Overview
MBX Systems OverviewMBX Systems Overview
MBX Systems Overview
 

Similar to Network Configuration Manager Training - [Season 4] Part 1 - Configuration backup & disaster recovery

NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery.
NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery. NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery.
NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery.
ManageEngine, Zoho Corporation
 
Free training on NCM - Discovery & Disaster recovery
Free training on NCM - Discovery & Disaster recovery Free training on NCM - Discovery & Disaster recovery
Free training on NCM - Discovery & Disaster recovery
ManageEngine, Zoho Corporation
 
Overview and features of NCM
Overview and features of NCMOverview and features of NCM
Overview and features of NCM
ManageEngine, Zoho Corporation
 
NCM Training - Part 2 - Automation, Notification, Compliance and Reports
NCM Training - Part 2 - Automation, Notification, Compliance and ReportsNCM Training - Part 2 - Automation, Notification, Compliance and Reports
NCM Training - Part 2 - Automation, Notification, Compliance and Reports
ManageEngine, Zoho Corporation
 
Free training on Network Configuration Manager - Season 2 - Part 2
Free training on Network Configuration Manager - Season 2 - Part 2Free training on Network Configuration Manager - Season 2 - Part 2
Free training on Network Configuration Manager - Season 2 - Part 2
ManageEngine, Zoho Corporation
 
Configlets, compliance, RBAC & reports - Network Configuration Manager
Configlets, compliance, RBAC & reports - Network Configuration ManagerConfiglets, compliance, RBAC & reports - Network Configuration Manager
Configlets, compliance, RBAC & reports - Network Configuration Manager
ManageEngine, Zoho Corporation
 
Network Configuration Management - Mumbai Seminar
Network Configuration Management - Mumbai SeminarNetwork Configuration Management - Mumbai Seminar
Network Configuration Management - Mumbai Seminar
ManageEngine, Zoho Corporation
 
Itsummit2015 blizzard
Itsummit2015 blizzardItsummit2015 blizzard
Itsummit2015 blizzard
kevin_donovan
 
Understanding firewall-policies-their-effectiveness-in-defending-against-netw...
Understanding firewall-policies-their-effectiveness-in-defending-against-netw...Understanding firewall-policies-their-effectiveness-in-defending-against-netw...
Understanding firewall-policies-their-effectiveness-in-defending-against-netw...
ManageEngine, Zoho Corporation
 
Training netbackup6x2
Training netbackup6x2Training netbackup6x2
Training netbackup6x2
M Shariff
 
API Training 10 Nov 2014
API Training 10 Nov 2014API Training 10 Nov 2014
API Training 10 Nov 2014
Digital Bond
 
KoprowskiT_SQLSatMoscow_2AMaDisaterJustBegan
KoprowskiT_SQLSatMoscow_2AMaDisaterJustBeganKoprowskiT_SQLSatMoscow_2AMaDisaterJustBegan
KoprowskiT_SQLSatMoscow_2AMaDisaterJustBegan
Tobias Koprowski
 
Training Slides: 201 - Intermediate - Tungsten Cluster Maintenance
Training Slides: 201 - Intermediate - Tungsten Cluster MaintenanceTraining Slides: 201 - Intermediate - Tungsten Cluster Maintenance
Training Slides: 201 - Intermediate - Tungsten Cluster Maintenance
Continuent
 
Puppet Camp Seattle 2014: Keynote
Puppet Camp Seattle 2014: KeynotePuppet Camp Seattle 2014: Keynote
Puppet Camp Seattle 2014: Keynote
Puppet
 
Software Distribution
Software DistributionSoftware Distribution
Software Distribution
Dell World
 
Puppet Camp London Fall 2014: Keynote
Puppet Camp London Fall 2014: KeynotePuppet Camp London Fall 2014: Keynote
Puppet Camp London Fall 2014: Keynote
Puppet
 
Puppet Camp Atlanta 2014: Keynote
Puppet Camp Atlanta 2014: Keynote  Puppet Camp Atlanta 2014: Keynote
Puppet Camp Atlanta 2014: Keynote
Puppet
 
Symantec Public Meetup
Symantec Public MeetupSymantec Public Meetup
Symantec Public Meetup
Rudrajit Tapadar
 
Managing bitlocker with MBAM
Managing bitlocker with MBAMManaging bitlocker with MBAM
Managing bitlocker with MBAM
Olav Tvedt
 
Good vs power automation frameworks
Good vs power automation frameworksGood vs power automation frameworks
Good vs power automation frameworks
Kumar Swamy Dontamsetti
 

Similar to Network Configuration Manager Training - [Season 4] Part 1 - Configuration backup & disaster recovery (20)

NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery.
NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery. NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery.
NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery.
 
Free training on NCM - Discovery & Disaster recovery
Free training on NCM - Discovery & Disaster recovery Free training on NCM - Discovery & Disaster recovery
Free training on NCM - Discovery & Disaster recovery
 
Overview and features of NCM
Overview and features of NCMOverview and features of NCM
Overview and features of NCM
 
NCM Training - Part 2 - Automation, Notification, Compliance and Reports
NCM Training - Part 2 - Automation, Notification, Compliance and ReportsNCM Training - Part 2 - Automation, Notification, Compliance and Reports
NCM Training - Part 2 - Automation, Notification, Compliance and Reports
 
Free training on Network Configuration Manager - Season 2 - Part 2
Free training on Network Configuration Manager - Season 2 - Part 2Free training on Network Configuration Manager - Season 2 - Part 2
Free training on Network Configuration Manager - Season 2 - Part 2
 
Configlets, compliance, RBAC & reports - Network Configuration Manager
Configlets, compliance, RBAC & reports - Network Configuration ManagerConfiglets, compliance, RBAC & reports - Network Configuration Manager
Configlets, compliance, RBAC & reports - Network Configuration Manager
 
Network Configuration Management - Mumbai Seminar
Network Configuration Management - Mumbai SeminarNetwork Configuration Management - Mumbai Seminar
Network Configuration Management - Mumbai Seminar
 
Itsummit2015 blizzard
Itsummit2015 blizzardItsummit2015 blizzard
Itsummit2015 blizzard
 
Understanding firewall-policies-their-effectiveness-in-defending-against-netw...
Understanding firewall-policies-their-effectiveness-in-defending-against-netw...Understanding firewall-policies-their-effectiveness-in-defending-against-netw...
Understanding firewall-policies-their-effectiveness-in-defending-against-netw...
 
Training netbackup6x2
Training netbackup6x2Training netbackup6x2
Training netbackup6x2
 
API Training 10 Nov 2014
API Training 10 Nov 2014API Training 10 Nov 2014
API Training 10 Nov 2014
 
KoprowskiT_SQLSatMoscow_2AMaDisaterJustBegan
KoprowskiT_SQLSatMoscow_2AMaDisaterJustBeganKoprowskiT_SQLSatMoscow_2AMaDisaterJustBegan
KoprowskiT_SQLSatMoscow_2AMaDisaterJustBegan
 
Training Slides: 201 - Intermediate - Tungsten Cluster Maintenance
Training Slides: 201 - Intermediate - Tungsten Cluster MaintenanceTraining Slides: 201 - Intermediate - Tungsten Cluster Maintenance
Training Slides: 201 - Intermediate - Tungsten Cluster Maintenance
 
Puppet Camp Seattle 2014: Keynote
Puppet Camp Seattle 2014: KeynotePuppet Camp Seattle 2014: Keynote
Puppet Camp Seattle 2014: Keynote
 
Software Distribution
Software DistributionSoftware Distribution
Software Distribution
 
Puppet Camp London Fall 2014: Keynote
Puppet Camp London Fall 2014: KeynotePuppet Camp London Fall 2014: Keynote
Puppet Camp London Fall 2014: Keynote
 
Puppet Camp Atlanta 2014: Keynote
Puppet Camp Atlanta 2014: Keynote  Puppet Camp Atlanta 2014: Keynote
Puppet Camp Atlanta 2014: Keynote
 
Symantec Public Meetup
Symantec Public MeetupSymantec Public Meetup
Symantec Public Meetup
 
Managing bitlocker with MBAM
Managing bitlocker with MBAMManaging bitlocker with MBAM
Managing bitlocker with MBAM
 
Good vs power automation frameworks
Good vs power automation frameworksGood vs power automation frameworks
Good vs power automation frameworks
 

More from ManageEngine, Zoho Corporation

Create seamless customer experiences
Create seamless customer experiencesCreate seamless customer experiences
Create seamless customer experiences
ManageEngine, Zoho Corporation
 
From web interface to database: Monitor what matters
From web interface to database: Monitor what mattersFrom web interface to database: Monitor what matters
From web interface to database: Monitor what matters
ManageEngine, Zoho Corporation
 
NetFlow Analyzer Free Training Series Part I - May 2020
NetFlow Analyzer Free Training Series Part I - May 2020NetFlow Analyzer Free Training Series Part I - May 2020
NetFlow Analyzer Free Training Series Part I - May 2020
ManageEngine, Zoho Corporation
 
Overcome real-time server and VM monitoring challenges
Overcome real-time server and VM monitoring challengesOvercome real-time server and VM monitoring challenges
Overcome real-time server and VM monitoring challenges
ManageEngine, Zoho Corporation
 
Modernizing Cloud and Hyperconverged Infrastructure monitoring
Modernizing Cloud and Hyperconverged Infrastructure monitoringModernizing Cloud and Hyperconverged Infrastructure monitoring
Modernizing Cloud and Hyperconverged Infrastructure monitoring
ManageEngine, Zoho Corporation
 
Deliver seamless digital experience
Deliver seamless digital experienceDeliver seamless digital experience
Deliver seamless digital experience
ManageEngine, Zoho Corporation
 
Free NetFlow Analyzer training Season 1 Part 2 - Feb 2020
Free NetFlow Analyzer training Season 1 Part 2 - Feb 2020Free NetFlow Analyzer training Season 1 Part 2 - Feb 2020
Free NetFlow Analyzer training Season 1 Part 2 - Feb 2020
ManageEngine, Zoho Corporation
 
From web interface to the database:Monitor all that matters
From web interface to the database:Monitor all that mattersFrom web interface to the database:Monitor all that matters
From web interface to the database:Monitor all that matters
ManageEngine, Zoho Corporation
 
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - EST
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - ESTNetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - EST
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - EST
ManageEngine, Zoho Corporation
 
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - GMT
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - GMTNetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - GMT
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - GMT
ManageEngine, Zoho Corporation
 
NetFlow Analyzer Product Overview
NetFlow Analyzer Product OverviewNetFlow Analyzer Product Overview
NetFlow Analyzer Product Overview
ManageEngine, Zoho Corporation
 
Monitoring cloud applications and hyperconverged infrastructure
Monitoring cloud applications and hyperconverged infrastructureMonitoring cloud applications and hyperconverged infrastructure
Monitoring cloud applications and hyperconverged infrastructure
ManageEngine, Zoho Corporation
 
Building the right website monitoring strategy
Building the right website monitoring strategyBuilding the right website monitoring strategy
Building the right website monitoring strategy
ManageEngine, Zoho Corporation
 
Unlock the value of your big data infrastructure
Unlock the value of your big data infrastructureUnlock the value of your big data infrastructure
Unlock the value of your big data infrastructure
ManageEngine, Zoho Corporation
 
Key to optimal end user experience
Key to optimal end user experienceKey to optimal end user experience
Key to optimal end user experience
ManageEngine, Zoho Corporation
 
Monitoring cloud applications and containers
Monitoring cloud applications and containersMonitoring cloud applications and containers
Monitoring cloud applications and containers
ManageEngine, Zoho Corporation
 
implementing the right website monitoring strategy
 implementing the right website monitoring strategy implementing the right website monitoring strategy
implementing the right website monitoring strategy
ManageEngine, Zoho Corporation
 
Big data and non relational database
Big data and non relational databaseBig data and non relational database
Big data and non relational database
ManageEngine, Zoho Corporation
 
Visibility-from web application interface to the database
Visibility-from web application interface to the databaseVisibility-from web application interface to the database
Visibility-from web application interface to the database
ManageEngine, Zoho Corporation
 
Free OpManager training Part 3 - Monitoring Network Performance and Network Maps
Free OpManager training Part 3 - Monitoring Network Performance and Network MapsFree OpManager training Part 3 - Monitoring Network Performance and Network Maps
Free OpManager training Part 3 - Monitoring Network Performance and Network Maps
ManageEngine, Zoho Corporation
 

More from ManageEngine, Zoho Corporation (20)

Create seamless customer experiences
Create seamless customer experiencesCreate seamless customer experiences
Create seamless customer experiences
 
From web interface to database: Monitor what matters
From web interface to database: Monitor what mattersFrom web interface to database: Monitor what matters
From web interface to database: Monitor what matters
 
NetFlow Analyzer Free Training Series Part I - May 2020
NetFlow Analyzer Free Training Series Part I - May 2020NetFlow Analyzer Free Training Series Part I - May 2020
NetFlow Analyzer Free Training Series Part I - May 2020
 
Overcome real-time server and VM monitoring challenges
Overcome real-time server and VM monitoring challengesOvercome real-time server and VM monitoring challenges
Overcome real-time server and VM monitoring challenges
 
Modernizing Cloud and Hyperconverged Infrastructure monitoring
Modernizing Cloud and Hyperconverged Infrastructure monitoringModernizing Cloud and Hyperconverged Infrastructure monitoring
Modernizing Cloud and Hyperconverged Infrastructure monitoring
 
Deliver seamless digital experience
Deliver seamless digital experienceDeliver seamless digital experience
Deliver seamless digital experience
 
Free NetFlow Analyzer training Season 1 Part 2 - Feb 2020
Free NetFlow Analyzer training Season 1 Part 2 - Feb 2020Free NetFlow Analyzer training Season 1 Part 2 - Feb 2020
Free NetFlow Analyzer training Season 1 Part 2 - Feb 2020
 
From web interface to the database:Monitor all that matters
From web interface to the database:Monitor all that mattersFrom web interface to the database:Monitor all that matters
From web interface to the database:Monitor all that matters
 
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - EST
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - ESTNetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - EST
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - EST
 
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - GMT
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - GMTNetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - GMT
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - GMT
 
NetFlow Analyzer Product Overview
NetFlow Analyzer Product OverviewNetFlow Analyzer Product Overview
NetFlow Analyzer Product Overview
 
Monitoring cloud applications and hyperconverged infrastructure
Monitoring cloud applications and hyperconverged infrastructureMonitoring cloud applications and hyperconverged infrastructure
Monitoring cloud applications and hyperconverged infrastructure
 
Building the right website monitoring strategy
Building the right website monitoring strategyBuilding the right website monitoring strategy
Building the right website monitoring strategy
 
Unlock the value of your big data infrastructure
Unlock the value of your big data infrastructureUnlock the value of your big data infrastructure
Unlock the value of your big data infrastructure
 
Key to optimal end user experience
Key to optimal end user experienceKey to optimal end user experience
Key to optimal end user experience
 
Monitoring cloud applications and containers
Monitoring cloud applications and containersMonitoring cloud applications and containers
Monitoring cloud applications and containers
 
implementing the right website monitoring strategy
 implementing the right website monitoring strategy implementing the right website monitoring strategy
implementing the right website monitoring strategy
 
Big data and non relational database
Big data and non relational databaseBig data and non relational database
Big data and non relational database
 
Visibility-from web application interface to the database
Visibility-from web application interface to the databaseVisibility-from web application interface to the database
Visibility-from web application interface to the database
 
Free OpManager training Part 3 - Monitoring Network Performance and Network Maps
Free OpManager training Part 3 - Monitoring Network Performance and Network MapsFree OpManager training Part 3 - Monitoring Network Performance and Network Maps
Free OpManager training Part 3 - Monitoring Network Performance and Network Maps
 

Recently uploaded

Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 

Recently uploaded (20)

Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 

Network Configuration Manager Training - [Season 4] Part 1 - Configuration backup & disaster recovery

  • 1. Welcome to Network Configuration Manager training – Part 1
  • 2. Configuration backup & Disaster recovery Free Network Configuration Manager Training – Part 1
  • 3. Can you hear me? Can you see the presentation? Please confirm by commenting on the chat panel.
  • 5. • Manual Configuration changes • Faulty configuration changes. • Unplanned, unauthorized configuration changes to their network devices • Business needs demand frequent, quick configuration changes. Task becomes complex when multiple administrators manage devices from multi-vendors. • Keeping track of configuration changes Why is a tool needed for configuration management?
  • 6. NCM offers a perfect solution for all the above issues: • Designed to automate the entire lifecycle of device configuration management. • Process of changing configurations, managing changes, ensuring compliance and security are all automated. • Helps in ensuring high levels of security in the network What does NCM do?
  • 7. Minimum system requirements 2.4 GHz dual-core processor, or equivalent 12GB RAM 50GB storage PostgreSQL/MSSQL Windows/Linux The above given specifications are for an environment with 1000 devices. Refer: System requirements
  • 8. Agenda • Initial setup • Device discovery & templates • Credentials • Configuration backups & upload • Real-time change detection & change management • Disaster recovery
  • 9. Initial setup -Ports & protocols SNMP Profile Device discovery and Device template Backup credential
  • 10. Pre-requisites: Ports & Protocols Protocols: SSH, SCP, TFTP Ports: 69 – TFTP | 22 – SSH/SCP | 514 – Syslog 13306 – Postgres database
  • 11. Device discovery SNMP Request SysOID SNMP Profile V1, V2, V3 NCM Discovery Add device & associate with corresponding device template Match received SysOID with default/custom SysOIDS Match found Match not founddevice not added
  • 12. Device discovery Single device: -IP Address Bulk discovery: - IP range - CSV file import
  • 13. ‘Device is not responding for SNMP requests’ Common causes: The device is reachable yet not responding: - Incorrect SNMP read community - Disabled SNMP in the device Possible error:
  • 14. Device not added Common causes: Device reachable & SNMP community is correct but still device is not getting added: 1. Device SysOID not mapped with any device template Fix: Add sysOID to device template at SysOID finder in settings. Possible error: 2. No default device template is available in NCM for the particular device type Fix: Add/clone new device template. or Contact NCM support
  • 15. Device template What are device templates and what are they used for? Device specific configuration commands : • Configuration backup • Configuration upload • Enable/disable syslog change detection • Fetching hardware information
  • 16. Built-in device templates for 4000 device models Customizable device templates Share with network admins around the world.
  • 17. Manual device addition Single device - IP Address/Hostname - Vendor - Device template Bulk addition -CSV File import Format: <Hostname/ IP Address>,<Device Template Name>,<Series>,<Model>
  • 19. Backup credential Possible combinations of protocol for backup: • SSH/TELNET • SSH - TFTP / TELNET - TFTP • SSH - SCP • SNMP - TFTP
  • 20. SSH / TELNET SSH / TELNET Device configuration Encrypted configuration stored in database Config backup commandsNCM
  • 21. SSH/TELNET - TFTP Inbuilt TFTP Server Config backup commands Config file transfer using TFTP Encrypted configuration file stored in DB NCM SSH/TELNET - TFTP
  • 22. SSH - SCP SCP Server Config backup commands Config file transfer using SCP Encrypted configuration file stored in DB NCM SSH - SCP
  • 23. SNMP - TFTP SNMP Request for config backup Configuration file transfer using TFTP TFTP Server Encrypted configuration file stored in DB NCM
  • 24. How to provide credentials? Refer: https://download.manageengine.com/network-configuration-manager/Device-Expert-Credentials-Tutorial.pdf
  • 25. When password & enable password is configured:
  • 27. Password & enable password configured: enable
  • 28. Directly going to enable mode enable admin
  • 30. Credentials are valid but file transfer is failed Common cause: 1. TFTP or SCP servers have not been started. Fix: Check running status of TFTP or SCP servers in NCM server settings. (69 & 22) 2. Timeout due to config file size Fix: Increase backup timeout value in the corresponding device template. Possible error:
  • 31. Configuration backup • Why should you backup? • Instant (Single & Bulk) • Real-time change detection • Scheduled
  • 32. Real-time change detection • What is it? Configuration change made Configuration change made Configuration backup • Why is it important? • How does it work?
  • 34. We don’t support Enable Change Detection for this device. Common cause: NCM doesn’t support syslog for the particular model. - Fix: Enable syslog by connecting to the device and executing the enable syslog commands manually. or Contact NCM support. Possible error:
  • 35. Change detection is enabled but change is not detected Common cause: When the device & NCM support syslog, - Mismatched ports - Check NCM syslog server running status in NCM server settings Possible error:
  • 36. Scheduled backup • Routine everyday backups • Monthly / Weekly / Daily / Hourly / Once
  • 37. Schedule failure Common causes: Particular device credentials incorrect.
  • 38. Backup failure Common causes: 1. Credentials are changed or invalid. 2. Ports blocked or TFTP/SCP server not started • Check port 69 & 22 (TFTP & SCP) in NCM server settings 3. Huge config file • Fix: Change the timeout settings in the corresponding device template. 4. Unsupported backup commands • Edit the commands in device template or create a new device template by cloning the closest template.
  • 39. Change management • Change tracking, versioning & history • Compare configurations
  • 40. Change tracking, versioning, & history • View all changes made in a device • Automatic configuration versioning • Know the who, when & what of each change • Know the historical change trend of a device • View the number of modified, deleted & added config lines
  • 41. Compare configurations • Compare different versions of same device • Compare different devices configurations • View colour coded differences: added, modified & deleted
  • 42. Disaster recovery What’s a disaster in networks? • A network outage • A security breach • Performance degradation of business critical services and applications
  • 43. How to be prepared? • Baseline configuration • Startup/running sync • Change notification & rollback • Export configuration | Upload draft
  • 44. Baseline configuration • What is it? • Why is it important? • How to use it in times of disaster?
  • 45. ‘We don’t support upload feature for this device’ Common causes: • TELNET/SSH protocol doesn’t support upload • Fix: Edit the credential and Change the protocol from SSH, TELNET to SSH - TFTP, SSH - SCP , TELNET -TFTP depending the devices. • When SCP/TFTP protocol is used: • Device vendor supports but NCM device template doesn’t have upload commands for the specific device. • Fix: Clone/create a new device template with suitable SCP/TFTP commands or Contact NCM support Possible error:
  • 46. Startup/running sync • Why is it important? • Loss of changes made in running configuration during device reboot • How NCM helps? • Detects conflict • Sync configurations
  • 47. ‘Upload failure’ Common causes: 1. Command timeout Fix: Change timeout in device template command settings for the device type. 2. Based on the protocol, check the running status of TFTP & SCP servers in Server Settings. Possible error:
  • 48. ‘Change happens, but startup-running conflict is not detected by NCM in real-time.’ Common cause: Disabled real-time change detection. Fix: - Enable change detection if syslog is supported. - If syslog is not supported, the startup-running conflict will be detected and reported after the next successful schedule backup or manual backup operation. Possible error:
  • 49. Change notification & roll back Configure change notifications • Email • SNMP Trap for change event • Trouble ticket • Generate syslog message for change event Associate notification profile to devices/device groups. • Roll back To previous version To baseline version
  • 50. Export config • Readable format • Local/shared storage • Schedule
  • 51. Part 2 on 12.00 PM EDT | 28th august Automation, notification, compliance & reports Agenda: • Scheduling configuration tasks • CLI Configlets • Compliance (PCI and others) • Role based Access control (change approval) • Notification & Alerts • Reports
  • 52. Let’s keep in touch! hemalakshmi.b@manageengine.com https://www.youtube.com/channel/UCHLusaahd4nS9esD3xBVeUQ https://forums.manageengine.com/network-configuration-manager