Network configurations are in a constant flux and any wrong or unauthorized configuration change on live equipment can have profound effects on network security, reliability and the service provided.
Take control of your network configurations and simplify change management.
Note: NCM Plug-in has to be installed over OpManager's 8000 build or later (separate downloads for Windows 32-bit and 64-bit)
Schedule configuration backups and restore trusted configuration versions
With the NCM plug–in, you can either schedule or initiate configuration backups on demand. An automatic versioning of backed up configurations are taken and stored securely in an encrypted format in the database. You can thus carry out side–by–side comparisons between versions, baseline a particular version and when required, roll back to a trusted version in a single click.
Detect network changes in real-time and audit trails
The NCM plug–in alerts you whenever a start–up or running configuration change is done on your network devices. The e–mail alerts come with configuration differences appended allowing you to immediately decide authenticity and effects of the configuration change. On logging into the NCM dashboard you get to see ‘who did the change’, ‘when the change was done’ and ‘what was it’ in a see–quick screen. Other alerts include ‘failure on backing up a device’ and ‘policy violation’ on a scheduled compliance check.
Automate repetitive, labor–intensive tasks
Often administrators enforce configuration changes on their network devices to be in sync with the changing company IT policy. These could vary from a simple port blocking or applying a critical security patch across devices. These critical, repetitive tasks may lead to human errors and impact the network performance. The ‘Configuration Template’ and ‘Script’ execution tools provide automation to these tasks, preventing chances of error.
Analyze and troubleshoot network problems with exhaustive reports
OpManager’s NCM reports contain details on network status, changes done, conflicts found, compliance status, user activity etc. to give you a sound troubleshooting platform for network problems arising out of wrong configuration changes or non–alignment to company IT and security policies. Reports include: hardware, firmware and device inventory reports, device audit reports, configuration change reports, security audit reports, user access reports, compliance reports etc...