network, server and virtualization monitoring software
Network Change and Configuration Management
Network configurations are in a constant flux and any wrong or unauthorized configuration change on live equipment can have profound effects on network security, reliability and the service provided.
Take control of your network configurations and simplify change management.
Network Configuration Managementhelps you automate policy–based change, configuration and compliance on your network devices, making manual configuration errors a thing of the past. The NCM plug–in, with support for over 30 different vendor devices, helps you to:
Note: NCM Plug-in has to be installed over OpManager's 8000 build or later (separate downloads for Windows 32-bit and 64-bit)
I would highly recommend this product for
anyone who would like to successfully manage their network configuration files for all of their devices.
Rob Calhoun, W.C.
Network Configuration Management with OpManager
Schedule configuration backups and restore trusted configuration versions
Detect network changes in real-time and audit trails
Did you know?
NCM plug–in includes a wide variety of tools that execute commands on remote devices to show you the results immediately on the NCM dashboard e.g. You can view the Access list or VLAN of the devices within a single click.
Automate repetitive, labor–intensive tasks
You can remotely upgrade firmware, upload or download OS images using advanced script execution in the NCM plug–in. These script executed upgrades can be scheduled or triggered on demand.
Stop unauthorized configuration changes with approval workflows
OpManager’s NCM plug–in helps you to restrict direct configuration access to your critical network devices. You can implement approval workflows for network configuration changes where a senior administrator reviews and accepts a configuration change before these are pushed to the critical network devices.
Assure complete security and compliance for every configuration change
Enterprises are required to not just follow standard practices, internal security policies, stringent government regulations and industrial guidelines, but also demonstrate that the policies are enforced and network devices remain compliant to the policies defined. The NCM plug–in scans the devices for compliance to the rules⁄ policies defined to provide an overview of the conflicts and compliance status of the device configurations. "Security audit reports" list out findings with their impact and even provide recommendations for better security.
Analyze and troubleshoot network problems with exhaustive reports
See how OpManager together with the NCM Plug–in helped a network administrator to investigate high latency issue between their data center and a remote branch click here.