NCM Config Change Templates and Secure Variables
I have been looking for a way to store and reference secure variables in config change templates. I would like to be able to reference usernames and passwords without having to set a string and lookup...
View ArticleLooking for list of NCM variables
I'm looking for a complete list of built-in variables that I could use in NCM scripts or change templates.Specifically, I'm trying to mass change the hostname and domain of Cisco devices based on the...
View ArticleIndexing In Progress... 0%
Hey guys Having a weird issue with NCM anytime i try and search something it just comes up with a box that says "Indexing In Progress...0%" and its been like that for a while now any ideas?
View ArticleAdd file extensions to NCM Firmware upgrade repo
I feel like I have seen an answer to this before but I just can't figure out where I may have seen it. Or perhaps I'm going insane and that was my alternate reality I dreamt all this up in. Searched...
View ArticleNCM Beta 2 is here!
Hot on the heels of NCM 7.7 Beta 1, I'm excited to announce the availability of NCM 7.7 Beta 2. This beta builds on Beta 1, and includes several exciting features that can be found on the WWWO for...
View ArticleNCM Scheduling a job every 15 minutes
I'm having an issue with a L3 switch which requires that I clear the NAT table every 15 minutes. Is there a way to schedule a job in NCM to run every 15 minutes. I've used the CRON expressions...
View ArticleUsing Compliance Reporting to Verify Juniper Alternate Slice Version
About a year ago I started a quest to figure out how to achieve this goal. Since I've made some major headway I decided to share it out with the community in case it comes in handy. There's probably...
View ArticleHave time to show us how you use NCM?--Read below for details!
Hi NCM people, the User Experience (UX) team is helping some new SolarWinds employees get up to speed on NCM. Rather than us talking to SolarWinds employees about what users do with the product, it...
View ArticleHow do you SSH to your devices?
When SSHing to devices, do you prefer Credentials-based authentication or Certificate-based authentication?
View ArticleDo you need Network Automation?
I would like to find out details on use cases for network automation, especially in the context of configuration and change management. Please vote and ideally, leave a comment.
View ArticleAre you compliant?
Does your network needs to be compliant with any of the official standards, internal standards only, or none?
View ArticleWho is the Network Stig?
As joepoutre commented on Cisco STIGs: Some say he is the one true font of knowledge for all search engines,and that electrons are actually shaped like his head. All we know is, he's not the Stig but...
View Article