Why does the ${StorageFilename} variable cause a F5 .ucs file to get a...
Working on backing up F5 configs and have found that if I keep the ${StorageFilename} variable, the file changes from DeviceName-Date.ucs to a garbled.config file after the file is copied off the F5...
View ArticleFirewall Browser
Every-time I load the firewall browser I get the initial splash screen, it goes away. However it never comes back nor does it load. Any ideas? Ive tried multiple x64 Windows 7 boxes.
View ArticleHow to Automate HSRP Interface Creation / Specify Primary and Secondary Node...
I'm an Orion novice, but committed to using proper tools to templatize and automate our network deployment. To that end, I wanted to write a configuration change template that allows us to push out new...
View ArticleConfig backup for BIGIP F5 devices
Hi All I know this question is not new and have been asked many times, but I am having trouble to get all information in single place and hence not able execute anything to sort things for this problem...
View ArticleHardening Guide
Does a hardening guide exist for NCM? I am on the latest version. Part of my STIG process is asking for documentation for hardening documentation for IIS on the Solarwinds svr
View ArticleNCM Device Template Set Command on Disconnect
Hi Folks,We are facing the current Challenge on some Juniper devices that NCM is setting the following command when getting the config: "set console page 0" This is then stored on the Device and when...
View Article3850 stack switch upgrade
I am trying to find a process to do a IOS update on several stacks of 3850 switches. Has anyone run into this issue? Thanks
View ArticleHow do you SSH to your devices?
When SSHing to devices, do you prefer Credentials-based authentication or Certificate-based authentication?
View ArticleAre you compliant?
Does your network needs to be compliant with any of the official standards, internal standards only, or none?
View ArticleWho is the Network Stig?
As joepoutre commented on Cisco STIGs: Some say he is the one true font of knowledge for all search engines,and that electrons are actually shaped like his head. All we know is, he's not the Stig but...
View ArticleDo you need Network Automation?
I would like to find out details on use cases for network automation, especially in the context of configuration and change management. Please vote and ideally, leave a comment.
View ArticleMSAPI vs LDAP for Authentication against AD
Hi, I'm setting up NCM for the first time. Is there a Pro's \ Con's list or Best Practices doc that helps me understand why I should use MSAPI or LDAP for authenticating NCM users? The Admin Guide...
View ArticleStop passwords from showing up in NCM Transfer Status ->Show Script Results
Hi folks, I wrote a neat script to install some Splunk agents on all our Arista switches. The SCP file transfer needs a password for the remote server which is fine, I called the $GlobalPassword...
View ArticleMotorola AP issue with backup config
Hello, We are getting issue with AP-0622-66030-WR on backing up the configuration. The node status shows up but backing up the config is fail. Please advise about what could be the problem and how can...
View ArticleSolar Winds IP Ranges
Hi I have a requirement that my NCM only is able to talk to the required Internet sites and not to the entire internet. Does SW have a document that shows the IP ranges or FQDNs that the server needs...
View ArticleConfig Change Report Shows ENTIRE Config File
All, A few months ago I updated to NCM 12.1 from an older version (where NCM was still a seperate client application). Once thing that has changed is this: We have a weekly report that gets created...
View ArticleCreate Device Group Via IP Range?
Hi all, My Organization has NCM 7.5 and in it I am trying to create a group that changes dynamically based on any living node found within an IP Range / Subnet. However, it seems that when I put in my...
View Article