SlideShare a Scribd company logo
1 of 46
Welcome to free Network Configuration Manager training session
Trainer
Hemalakshmi
Product Expert
ITOM - Network Configuration Manager
Training schedule
Week Module Date Schedule Status
1st Configuration backup and Disaster
recovery
Mar 12th 11.30 am EDT In progress
2nd Configlets, compliance, RBAC, and
reports
Mar 19th 11:30am EDT Upcoming
https://www.manageengine.com/itom/free-training/network-configuration-
manager.html
Configuration backup & Disaster recovery
Part 1
Why is a tool needed for configuration
management?
Minimize configuration errors
Detect changes in real time
Roll back to trusted configuration
Stay compliant to your policies and standards
Streamline the maintenance process
What does NCM do?
Network
Configuratio
n Manager
Configuration
rollback
Configuration
comparison
Real time
change detection
Change review
and approval
mechanism
Remote firmware
upgrade
Job
scheduling
User based
access
Policy compliance
verification
Agenda
• Requirements for installing Network Configuration Manager
• Device discovery & templates
• Credentials
• Configuration backups & upload
• Real-time change detection & change management
• Disaster recovery
2 GHz dual-core
processor
4 GB RAM 10 GB storage • PostgreSQL
• MSSQL
Windows/Linux
The above given specifications are for an environment with 50 devices. Refer: System requirements
Prerequisites - Minimum System requirement
Pre-requisites - Ports & Protocols
Protocols:
SSH, SCP, TFTP
Ports:
69 – TFTP | 22 – SSH/SCP | 514 – Syslog
13306 – Postgres database | HTTP-(80)
Device discovery
SNMP Request
SysOID
SNMP Profile
V1, V2, V3
NCM
Discovery
Add device & associate with
corresponding device template
Match received
SysOID with
default/custom
SysOID
Match found
Match not
foundDevice not
added
Device discovery
SNMP Discovery
-IP Address
- IP range
- CSV file import
Manual Addition
- IP Address/Hostname
- Vendor
- Device template
- CSV File import
Format: <Hostname/ IP Address>,<Device Template>, <Name>,<Series>,<Model>
‘Device is not responding for SNMP requests’
Common causes:
The device is reachable yet not
responding:
- Incorrect SNMP read community
- Disabled SNMP in the device
Possible error :
‘Device not added’
Common causes :
Device reachable & SNMP community is correct but still device is not
getting added:
1. Device SysOID not mapped with any device template
Fix : Add sysOID to device template at SysOID finder in settings.
Possible error :
2. No default device template is available in NCM for the particular device
type
Fix : Add/clone new device template.
or Contact NCM support
Device template
What are device templates and what are they used for?
Device specific configuration commands :
• Configuration backup
• Configuration upload
• Enable/disable syslog change
detection
• Fetching hardware information
Backup credential
Possible combinations of protocol for backup :
• SSH
• TELNET
• SSH - TFTP
• TELNET - TFTP
• SSH - SCP
• SNMP - TFTP
SSH / TELNET
SSH / TELNET
Device
configuration
Encrypted
configuration
stored in
database
Config
backup
commandsNCM
SSH - SCP
SCP
Server
Config backup
commands
Config file transfer
using SCP
Encrypted
configuration file
stored in DB
NCM
SSH - SCP
SSH/TELNET - TFTP
TFTP
Server
Config backup
commands
Config file transfer
using TFTP
Encrypted
configuration file
stored in DB
NCM
SSH/TELNET -
TFTP
SNMP - TFTP
SNMP Request for
config backup
Configuration
file transfer
using TFTP
TFTP
Server
Encrypted
configuration file
stored in DB
NCM
How to provide credentials?
Refer: https://download.manageengine.com/network-configuration-manager/Device-Expert-Credentials-Tutorial.pdf
When password &
enable password
is configured :
Directly going to
enable mode :
admin
#
3Com router
:
manager
Credentials are valid but
file transfer is failed
Common cause :
1. TFTP or SCP servers have not been
started.
Fix : Check running status of TFTP or SCP
servers in NCM server settings. (69 & 22)
2. Timeout due to config file size
Fix : Increase backup timeout value in the
corresponding device template.
Possible error :
Configuration backup
• Instant (Single & Bulk)
• Real-time change detection
• Scheduled
Real-time change detection
Configuration
change made
Configuration backup
How does it
work?
We don’t support Enable Change Detection for
this device.
Common cause:
NCM doesn’t support syslog for the
particular model.
Fix : Enable syslog by connecting to
the device and executing the enable
syslog commands manually.
or
Contact NCM support.
Possible error:
Change detection is enabled but change is not
detected
Common cause :
When the device & NCM support syslog,
- Mismatched ports
- Check NCM syslog server running status in NCM server settings
Possible error:
Scheduled backup
• Routine everyday backups
• Monthly / Weekly / Daily / Hourly / Once
Schedule failure
Common causes:
Particular device credentials incorrect.
Backup failure
Common causes:
1. Credentials are changed or invalid.
2. Ports blocked or TFTP/SCP server not started
• Check port 69 & 22 (TFTP & SCP) in NCM server settings
3. Huge config file
• Fix: Change the timeout settings in the corresponding device template.
4. Unsupported backup commands
• Edit the commands in device template or create a new device template
by cloning the closest template.
Change management
• Change tracking, versioning & history
• Compare configurations
Change tracking, versioning, & history
• View all changes made in a device
• Automatic configuration versioning
• Know the who, when & what of each change
• Know the historical change trend of a device
• View the number of modified, deleted & added config lines
Compare configurations
• Compare different versions of same device
• Compare different devices configurations
• View colour coded differences: added, modified
& deleted
Disaster recovery
What’s a disaster in networks?
• A network outage
• A security breach
• Performance degradation of
business critical services and
applications
How to be prepared?
• Baseline configuration
• Startup/running sync
• Change notification & rollback
• Export configuration | Upload draft
Baseline configuration
• What is it?
• Why is it important?
• How to use it in times of disaster?
‘We don’t support upload feature for this device’
Common causes:
• TELNET/SSH protocol doesn’t support upload
• Fix: Edit the credential and Change the protocol from SSH,
TELNET to SSH - TFTP, SSH - SCP , TELNET -TFTP depending the
devices.
• When SCP/TFTP protocol is used:
• Device vendor supports but NCM device template
doesn’t have upload commands for the specific
device.
• Fix: Clone/create a new device template with
suitable SCP/TFTP commands or Contact NCM
support
Possible error:
Startup/running sync
• Why is it important?
• Loss of changes made in running
configuration during device
reboot
• How NCM helps?
• Detects conflict
• Sync configurations
‘Upload failure’
Common causes :
1. Command timeout
Fix: Change timeout in device template command settings for the
device type.
2. Based on the protocol, check the running status of TFTP & SCP servers in
Server Settings.
Possible error:
‘Change happens, but startup-running conflict is not
detected by NCM in real-time.’
Common cause :
Disabled real-time change detection.
Fix :
- Enable change detection if syslog is supported.
- If syslog is not supported, the startup-running conflict will be
detected and reported after the next successful schedule backup or
manual backup operation.
Possible error:
Change notification & roll back
Configure change notifications
• Email
• SNMP Trap for change event
• Trouble ticket
• Generate syslog message for change event
Roll back
To previous version
To baseline version
Associate notification profile to devices/device groups.
Export config
• Readable format
• Local/shared storage
• Schedule
Questions?

More Related Content

What's hot

Upgrading Your System: A Telco User Perspectiv
Upgrading Your System: A Telco User PerspectivUpgrading Your System: A Telco User Perspectiv
Upgrading Your System: A Telco User PerspectivOPNFV
 
Nagios Conference 2012 - Scott Wilkerson - Passive Monitoring Solutions For R...
Nagios Conference 2012 - Scott Wilkerson - Passive Monitoring Solutions For R...Nagios Conference 2012 - Scott Wilkerson - Passive Monitoring Solutions For R...
Nagios Conference 2012 - Scott Wilkerson - Passive Monitoring Solutions For R...Nagios
 
Process control daemon
Process control daemonProcess control daemon
Process control daemonhaish
 
XPDDS18: Xen Testing at Intel - Xudong Hao, Intel
XPDDS18: Xen Testing at Intel - Xudong Hao, IntelXPDDS18: Xen Testing at Intel - Xudong Hao, Intel
XPDDS18: Xen Testing at Intel - Xudong Hao, IntelThe Linux Foundation
 
Nagios Conference 2014 - Jim Prins - Passive Monitoring with Nagios
Nagios Conference 2014 - Jim Prins - Passive Monitoring with NagiosNagios Conference 2014 - Jim Prins - Passive Monitoring with Nagios
Nagios Conference 2014 - Jim Prins - Passive Monitoring with NagiosNagios
 
Nagios Conference 2011 - Mike Weber - Training: Reducing Nagios Server Load ...
Nagios Conference 2011 - Mike Weber - Training:  Reducing Nagios Server Load ...Nagios Conference 2011 - Mike Weber - Training:  Reducing Nagios Server Load ...
Nagios Conference 2011 - Mike Weber - Training: Reducing Nagios Server Load ...Nagios
 
System performance monitoring pcp + vector
System performance monitoring   pcp + vectorSystem performance monitoring   pcp + vector
System performance monitoring pcp + vectorSandeep Kunkunuru
 
Server Hardening Primer - Eric Vanderburg - JURINNOV
Server Hardening Primer - Eric Vanderburg - JURINNOVServer Hardening Primer - Eric Vanderburg - JURINNOV
Server Hardening Primer - Eric Vanderburg - JURINNOVEric Vanderburg
 
TI TechDays 2010: swiftBoot
TI TechDays 2010: swiftBootTI TechDays 2010: swiftBoot
TI TechDays 2010: swiftBootandrewmurraympc
 
Inside Dolphin Test Infrastructure
Inside Dolphin Test InfrastructureInside Dolphin Test Infrastructure
Inside Dolphin Test InfrastructureTao Jiang
 
[CB16] COFI break – Breaking exploits with Processor trace and Practical cont...
[CB16] COFI break – Breaking exploits with Processor trace and Practical cont...[CB16] COFI break – Breaking exploits with Processor trace and Practical cont...
[CB16] COFI break – Breaking exploits with Processor trace and Practical cont...CODE BLUE
 
Your Inner Sysadmin - Tutorial (SunshinePHP 2015)
Your Inner Sysadmin - Tutorial (SunshinePHP 2015)Your Inner Sysadmin - Tutorial (SunshinePHP 2015)
Your Inner Sysadmin - Tutorial (SunshinePHP 2015)Chris Tankersley
 
CNIT 152: 6. Scope & 7. Live Data Collection
CNIT 152: 6. Scope & 7. Live Data CollectionCNIT 152: 6. Scope & 7. Live Data Collection
CNIT 152: 6. Scope & 7. Live Data CollectionSam Bowne
 
Netflix SRE perf meetup_slides
Netflix SRE perf meetup_slidesNetflix SRE perf meetup_slides
Netflix SRE perf meetup_slidesEd Hunter
 
Nagios Conference 2012 - Mike Guthrie - Nagios Fusion 2012
Nagios Conference 2012 - Mike Guthrie - Nagios Fusion 2012Nagios Conference 2012 - Mike Guthrie - Nagios Fusion 2012
Nagios Conference 2012 - Mike Guthrie - Nagios Fusion 2012Nagios
 
Got Problems? Let's Do a Health Check
Got Problems? Let's Do a Health CheckGot Problems? Let's Do a Health Check
Got Problems? Let's Do a Health CheckLuis Guirigay
 
BP103 - Got Problems? Let's Do a Health Check
BP103 - Got Problems? Let's Do a Health CheckBP103 - Got Problems? Let's Do a Health Check
BP103 - Got Problems? Let's Do a Health CheckLuis Guirigay
 
Intel processor trace - What are Recorded?
Intel processor trace - What are Recorded?Intel processor trace - What are Recorded?
Intel processor trace - What are Recorded?Pipat Methavanitpong
 
Remote core locking-Andrea Lombardo
Remote core locking-Andrea LombardoRemote core locking-Andrea Lombardo
Remote core locking-Andrea LombardoAndrea Lombardo
 

What's hot (20)

Upgrading Your System: A Telco User Perspectiv
Upgrading Your System: A Telco User PerspectivUpgrading Your System: A Telco User Perspectiv
Upgrading Your System: A Telco User Perspectiv
 
Nagios Conference 2012 - Scott Wilkerson - Passive Monitoring Solutions For R...
Nagios Conference 2012 - Scott Wilkerson - Passive Monitoring Solutions For R...Nagios Conference 2012 - Scott Wilkerson - Passive Monitoring Solutions For R...
Nagios Conference 2012 - Scott Wilkerson - Passive Monitoring Solutions For R...
 
Process control daemon
Process control daemonProcess control daemon
Process control daemon
 
XPDDS18: Xen Testing at Intel - Xudong Hao, Intel
XPDDS18: Xen Testing at Intel - Xudong Hao, IntelXPDDS18: Xen Testing at Intel - Xudong Hao, Intel
XPDDS18: Xen Testing at Intel - Xudong Hao, Intel
 
Nagios Conference 2014 - Jim Prins - Passive Monitoring with Nagios
Nagios Conference 2014 - Jim Prins - Passive Monitoring with NagiosNagios Conference 2014 - Jim Prins - Passive Monitoring with Nagios
Nagios Conference 2014 - Jim Prins - Passive Monitoring with Nagios
 
Nagios Conference 2011 - Mike Weber - Training: Reducing Nagios Server Load ...
Nagios Conference 2011 - Mike Weber - Training:  Reducing Nagios Server Load ...Nagios Conference 2011 - Mike Weber - Training:  Reducing Nagios Server Load ...
Nagios Conference 2011 - Mike Weber - Training: Reducing Nagios Server Load ...
 
System performance monitoring pcp + vector
System performance monitoring   pcp + vectorSystem performance monitoring   pcp + vector
System performance monitoring pcp + vector
 
Server Hardening Primer - Eric Vanderburg - JURINNOV
Server Hardening Primer - Eric Vanderburg - JURINNOVServer Hardening Primer - Eric Vanderburg - JURINNOV
Server Hardening Primer - Eric Vanderburg - JURINNOV
 
Apache Cloudstack QA Strategy
Apache Cloudstack QA StrategyApache Cloudstack QA Strategy
Apache Cloudstack QA Strategy
 
TI TechDays 2010: swiftBoot
TI TechDays 2010: swiftBootTI TechDays 2010: swiftBoot
TI TechDays 2010: swiftBoot
 
Inside Dolphin Test Infrastructure
Inside Dolphin Test InfrastructureInside Dolphin Test Infrastructure
Inside Dolphin Test Infrastructure
 
[CB16] COFI break – Breaking exploits with Processor trace and Practical cont...
[CB16] COFI break – Breaking exploits with Processor trace and Practical cont...[CB16] COFI break – Breaking exploits with Processor trace and Practical cont...
[CB16] COFI break – Breaking exploits with Processor trace and Practical cont...
 
Your Inner Sysadmin - Tutorial (SunshinePHP 2015)
Your Inner Sysadmin - Tutorial (SunshinePHP 2015)Your Inner Sysadmin - Tutorial (SunshinePHP 2015)
Your Inner Sysadmin - Tutorial (SunshinePHP 2015)
 
CNIT 152: 6. Scope & 7. Live Data Collection
CNIT 152: 6. Scope & 7. Live Data CollectionCNIT 152: 6. Scope & 7. Live Data Collection
CNIT 152: 6. Scope & 7. Live Data Collection
 
Netflix SRE perf meetup_slides
Netflix SRE perf meetup_slidesNetflix SRE perf meetup_slides
Netflix SRE perf meetup_slides
 
Nagios Conference 2012 - Mike Guthrie - Nagios Fusion 2012
Nagios Conference 2012 - Mike Guthrie - Nagios Fusion 2012Nagios Conference 2012 - Mike Guthrie - Nagios Fusion 2012
Nagios Conference 2012 - Mike Guthrie - Nagios Fusion 2012
 
Got Problems? Let's Do a Health Check
Got Problems? Let's Do a Health CheckGot Problems? Let's Do a Health Check
Got Problems? Let's Do a Health Check
 
BP103 - Got Problems? Let's Do a Health Check
BP103 - Got Problems? Let's Do a Health CheckBP103 - Got Problems? Let's Do a Health Check
BP103 - Got Problems? Let's Do a Health Check
 
Intel processor trace - What are Recorded?
Intel processor trace - What are Recorded?Intel processor trace - What are Recorded?
Intel processor trace - What are Recorded?
 
Remote core locking-Andrea Lombardo
Remote core locking-Andrea LombardoRemote core locking-Andrea Lombardo
Remote core locking-Andrea Lombardo
 

Similar to Network Configuration Manager Training - [Season 7] Part 1 - Configuration backup & disaster recovery

NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery.
NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery. NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery.
NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery. ManageEngine, Zoho Corporation
 
NCM Training - Part 2 - Automation, Notification, Compliance and Reports
NCM Training - Part 2 - Automation, Notification, Compliance and ReportsNCM Training - Part 2 - Automation, Notification, Compliance and Reports
NCM Training - Part 2 - Automation, Notification, Compliance and ReportsManageEngine, Zoho Corporation
 
Configlets, compliance, RBAC & reports - Network Configuration Manager
Configlets, compliance, RBAC & reports - Network Configuration ManagerConfiglets, compliance, RBAC & reports - Network Configuration Manager
Configlets, compliance, RBAC & reports - Network Configuration ManagerManageEngine, Zoho Corporation
 
Training netbackup6x2
Training netbackup6x2Training netbackup6x2
Training netbackup6x2M Shariff
 
Understanding firewall-policies-their-effectiveness-in-defending-against-netw...
Understanding firewall-policies-their-effectiveness-in-defending-against-netw...Understanding firewall-policies-their-effectiveness-in-defending-against-netw...
Understanding firewall-policies-their-effectiveness-in-defending-against-netw...ManageEngine, Zoho Corporation
 
Itsummit2015 blizzard
Itsummit2015 blizzardItsummit2015 blizzard
Itsummit2015 blizzardkevin_donovan
 
Uvm presentation dac2011_final
Uvm presentation dac2011_finalUvm presentation dac2011_final
Uvm presentation dac2011_finalsean chen
 
KoprowskiT_SQLSatMoscow_2AMaDisaterJustBegan
KoprowskiT_SQLSatMoscow_2AMaDisaterJustBeganKoprowskiT_SQLSatMoscow_2AMaDisaterJustBegan
KoprowskiT_SQLSatMoscow_2AMaDisaterJustBeganTobias Koprowski
 
Training Slides: Basics 107: Simple Tungsten Replicator Installation to Extra...
Training Slides: Basics 107: Simple Tungsten Replicator Installation to Extra...Training Slides: Basics 107: Simple Tungsten Replicator Installation to Extra...
Training Slides: Basics 107: Simple Tungsten Replicator Installation to Extra...Continuent
 
Managing bitlocker with MBAM
Managing bitlocker with MBAMManaging bitlocker with MBAM
Managing bitlocker with MBAMOlav Tvedt
 
Puppet Camp Seattle 2014: Keynote
Puppet Camp Seattle 2014: KeynotePuppet Camp Seattle 2014: Keynote
Puppet Camp Seattle 2014: KeynotePuppet
 
Puppet Camp Atlanta 2014: Keynote
Puppet Camp Atlanta 2014: Keynote  Puppet Camp Atlanta 2014: Keynote
Puppet Camp Atlanta 2014: Keynote Puppet
 
Positive Hack Days. Pavlov. Network Infrastructure Security Assessment
Positive Hack Days. Pavlov. Network Infrastructure Security AssessmentPositive Hack Days. Pavlov. Network Infrastructure Security Assessment
Positive Hack Days. Pavlov. Network Infrastructure Security AssessmentPositive Hack Days
 
Training Slides: 201 - Intermediate - Tungsten Cluster Maintenance
Training Slides: 201 - Intermediate - Tungsten Cluster MaintenanceTraining Slides: 201 - Intermediate - Tungsten Cluster Maintenance
Training Slides: 201 - Intermediate - Tungsten Cluster MaintenanceContinuent
 
Considerations when implementing_ha_in_dmf
Considerations when implementing_ha_in_dmfConsiderations when implementing_ha_in_dmf
Considerations when implementing_ha_in_dmfhik_lhz
 
Season 4 [Free OpManager training] Part1- Discovery and classification
Season 4 [Free OpManager training] Part1- Discovery and classificationSeason 4 [Free OpManager training] Part1- Discovery and classification
Season 4 [Free OpManager training] Part1- Discovery and classificationManageEngine, Zoho Corporation
 

Similar to Network Configuration Manager Training - [Season 7] Part 1 - Configuration backup & disaster recovery (20)

Free training on NCM - Discovery & Disaster recovery
Free training on NCM - Discovery & Disaster recovery Free training on NCM - Discovery & Disaster recovery
Free training on NCM - Discovery & Disaster recovery
 
NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery.
NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery. NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery.
NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery.
 
Overview and features of NCM
Overview and features of NCMOverview and features of NCM
Overview and features of NCM
 
NCM Training - Part 2 - Automation, Notification, Compliance and Reports
NCM Training - Part 2 - Automation, Notification, Compliance and ReportsNCM Training - Part 2 - Automation, Notification, Compliance and Reports
NCM Training - Part 2 - Automation, Notification, Compliance and Reports
 
Configlets, compliance, RBAC & reports - Network Configuration Manager
Configlets, compliance, RBAC & reports - Network Configuration ManagerConfiglets, compliance, RBAC & reports - Network Configuration Manager
Configlets, compliance, RBAC & reports - Network Configuration Manager
 
Training netbackup6x2
Training netbackup6x2Training netbackup6x2
Training netbackup6x2
 
Understanding firewall-policies-their-effectiveness-in-defending-against-netw...
Understanding firewall-policies-their-effectiveness-in-defending-against-netw...Understanding firewall-policies-their-effectiveness-in-defending-against-netw...
Understanding firewall-policies-their-effectiveness-in-defending-against-netw...
 
Network Configuration Management - Mumbai Seminar
Network Configuration Management - Mumbai SeminarNetwork Configuration Management - Mumbai Seminar
Network Configuration Management - Mumbai Seminar
 
Itsummit2015 blizzard
Itsummit2015 blizzardItsummit2015 blizzard
Itsummit2015 blizzard
 
Uvm presentation dac2011_final
Uvm presentation dac2011_finalUvm presentation dac2011_final
Uvm presentation dac2011_final
 
KoprowskiT_SQLSatMoscow_2AMaDisaterJustBegan
KoprowskiT_SQLSatMoscow_2AMaDisaterJustBeganKoprowskiT_SQLSatMoscow_2AMaDisaterJustBegan
KoprowskiT_SQLSatMoscow_2AMaDisaterJustBegan
 
Training Slides: Basics 107: Simple Tungsten Replicator Installation to Extra...
Training Slides: Basics 107: Simple Tungsten Replicator Installation to Extra...Training Slides: Basics 107: Simple Tungsten Replicator Installation to Extra...
Training Slides: Basics 107: Simple Tungsten Replicator Installation to Extra...
 
Managing bitlocker with MBAM
Managing bitlocker with MBAMManaging bitlocker with MBAM
Managing bitlocker with MBAM
 
Ncm Middle East Workshop
Ncm Middle East WorkshopNcm Middle East Workshop
Ncm Middle East Workshop
 
Puppet Camp Seattle 2014: Keynote
Puppet Camp Seattle 2014: KeynotePuppet Camp Seattle 2014: Keynote
Puppet Camp Seattle 2014: Keynote
 
Puppet Camp Atlanta 2014: Keynote
Puppet Camp Atlanta 2014: Keynote  Puppet Camp Atlanta 2014: Keynote
Puppet Camp Atlanta 2014: Keynote
 
Positive Hack Days. Pavlov. Network Infrastructure Security Assessment
Positive Hack Days. Pavlov. Network Infrastructure Security AssessmentPositive Hack Days. Pavlov. Network Infrastructure Security Assessment
Positive Hack Days. Pavlov. Network Infrastructure Security Assessment
 
Training Slides: 201 - Intermediate - Tungsten Cluster Maintenance
Training Slides: 201 - Intermediate - Tungsten Cluster MaintenanceTraining Slides: 201 - Intermediate - Tungsten Cluster Maintenance
Training Slides: 201 - Intermediate - Tungsten Cluster Maintenance
 
Considerations when implementing_ha_in_dmf
Considerations when implementing_ha_in_dmfConsiderations when implementing_ha_in_dmf
Considerations when implementing_ha_in_dmf
 
Season 4 [Free OpManager training] Part1- Discovery and classification
Season 4 [Free OpManager training] Part1- Discovery and classificationSeason 4 [Free OpManager training] Part1- Discovery and classification
Season 4 [Free OpManager training] Part1- Discovery and classification
 

More from ManageEngine, Zoho Corporation

NetFlow Analyzer Free Training Series Part I - May 2020
NetFlow Analyzer Free Training Series Part I - May 2020NetFlow Analyzer Free Training Series Part I - May 2020
NetFlow Analyzer Free Training Series Part I - May 2020ManageEngine, Zoho Corporation
 
Overcome real-time server and VM monitoring challenges
Overcome real-time server and VM monitoring challengesOvercome real-time server and VM monitoring challenges
Overcome real-time server and VM monitoring challengesManageEngine, Zoho Corporation
 
Modernizing Cloud and Hyperconverged Infrastructure monitoring
Modernizing Cloud and Hyperconverged Infrastructure monitoringModernizing Cloud and Hyperconverged Infrastructure monitoring
Modernizing Cloud and Hyperconverged Infrastructure monitoringManageEngine, Zoho Corporation
 
Free NetFlow Analyzer training Season 1 Part 2 - Feb 2020
Free NetFlow Analyzer training Season 1 Part 2 - Feb 2020Free NetFlow Analyzer training Season 1 Part 2 - Feb 2020
Free NetFlow Analyzer training Season 1 Part 2 - Feb 2020ManageEngine, Zoho Corporation
 
From web interface to the database:Monitor all that matters
From web interface to the database:Monitor all that mattersFrom web interface to the database:Monitor all that matters
From web interface to the database:Monitor all that mattersManageEngine, Zoho Corporation
 
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - EST
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - ESTNetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - EST
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - ESTManageEngine, Zoho Corporation
 
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - GMT
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - GMTNetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - GMT
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - GMTManageEngine, Zoho Corporation
 
Monitoring cloud applications and hyperconverged infrastructure
Monitoring cloud applications and hyperconverged infrastructureMonitoring cloud applications and hyperconverged infrastructure
Monitoring cloud applications and hyperconverged infrastructureManageEngine, Zoho Corporation
 
Visibility-from web application interface to the database
Visibility-from web application interface to the databaseVisibility-from web application interface to the database
Visibility-from web application interface to the databaseManageEngine, Zoho Corporation
 
Free OpManager training Part 4 - Monitoring Network Performance and Network Maps
Free OpManager training Part 4 - Monitoring Network Performance and Network MapsFree OpManager training Part 4 - Monitoring Network Performance and Network Maps
Free OpManager training Part 4 - Monitoring Network Performance and Network MapsManageEngine, Zoho Corporation
 

More from ManageEngine, Zoho Corporation (20)

Create seamless customer experiences
Create seamless customer experiencesCreate seamless customer experiences
Create seamless customer experiences
 
From web interface to database: Monitor what matters
From web interface to database: Monitor what mattersFrom web interface to database: Monitor what matters
From web interface to database: Monitor what matters
 
NetFlow Analyzer Free Training Series Part I - May 2020
NetFlow Analyzer Free Training Series Part I - May 2020NetFlow Analyzer Free Training Series Part I - May 2020
NetFlow Analyzer Free Training Series Part I - May 2020
 
Overcome real-time server and VM monitoring challenges
Overcome real-time server and VM monitoring challengesOvercome real-time server and VM monitoring challenges
Overcome real-time server and VM monitoring challenges
 
Modernizing Cloud and Hyperconverged Infrastructure monitoring
Modernizing Cloud and Hyperconverged Infrastructure monitoringModernizing Cloud and Hyperconverged Infrastructure monitoring
Modernizing Cloud and Hyperconverged Infrastructure monitoring
 
Deliver seamless digital experience
Deliver seamless digital experienceDeliver seamless digital experience
Deliver seamless digital experience
 
Free NetFlow Analyzer training Season 1 Part 2 - Feb 2020
Free NetFlow Analyzer training Season 1 Part 2 - Feb 2020Free NetFlow Analyzer training Season 1 Part 2 - Feb 2020
Free NetFlow Analyzer training Season 1 Part 2 - Feb 2020
 
From web interface to the database:Monitor all that matters
From web interface to the database:Monitor all that mattersFrom web interface to the database:Monitor all that matters
From web interface to the database:Monitor all that matters
 
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - EST
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - ESTNetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - EST
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - EST
 
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - GMT
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - GMTNetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - GMT
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - GMT
 
NetFlow Analyzer Product Overview
NetFlow Analyzer Product OverviewNetFlow Analyzer Product Overview
NetFlow Analyzer Product Overview
 
Monitoring cloud applications and hyperconverged infrastructure
Monitoring cloud applications and hyperconverged infrastructureMonitoring cloud applications and hyperconverged infrastructure
Monitoring cloud applications and hyperconverged infrastructure
 
Building the right website monitoring strategy
Building the right website monitoring strategyBuilding the right website monitoring strategy
Building the right website monitoring strategy
 
Unlock the value of your big data infrastructure
Unlock the value of your big data infrastructureUnlock the value of your big data infrastructure
Unlock the value of your big data infrastructure
 
Key to optimal end user experience
Key to optimal end user experienceKey to optimal end user experience
Key to optimal end user experience
 
Monitoring cloud applications and containers
Monitoring cloud applications and containersMonitoring cloud applications and containers
Monitoring cloud applications and containers
 
implementing the right website monitoring strategy
 implementing the right website monitoring strategy implementing the right website monitoring strategy
implementing the right website monitoring strategy
 
Big data and non relational database
Big data and non relational databaseBig data and non relational database
Big data and non relational database
 
Visibility-from web application interface to the database
Visibility-from web application interface to the databaseVisibility-from web application interface to the database
Visibility-from web application interface to the database
 
Free OpManager training Part 4 - Monitoring Network Performance and Network Maps
Free OpManager training Part 4 - Monitoring Network Performance and Network MapsFree OpManager training Part 4 - Monitoring Network Performance and Network Maps
Free OpManager training Part 4 - Monitoring Network Performance and Network Maps
 

Recently uploaded

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 

Recently uploaded (20)

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 

Network Configuration Manager Training - [Season 7] Part 1 - Configuration backup & disaster recovery

  • 1.
  • 2. Welcome to free Network Configuration Manager training session
  • 3. Trainer Hemalakshmi Product Expert ITOM - Network Configuration Manager
  • 4. Training schedule Week Module Date Schedule Status 1st Configuration backup and Disaster recovery Mar 12th 11.30 am EDT In progress 2nd Configlets, compliance, RBAC, and reports Mar 19th 11:30am EDT Upcoming https://www.manageengine.com/itom/free-training/network-configuration- manager.html
  • 5. Configuration backup & Disaster recovery Part 1
  • 6. Why is a tool needed for configuration management? Minimize configuration errors Detect changes in real time Roll back to trusted configuration Stay compliant to your policies and standards Streamline the maintenance process
  • 7. What does NCM do? Network Configuratio n Manager Configuration rollback Configuration comparison Real time change detection Change review and approval mechanism Remote firmware upgrade Job scheduling User based access Policy compliance verification
  • 8. Agenda • Requirements for installing Network Configuration Manager • Device discovery & templates • Credentials • Configuration backups & upload • Real-time change detection & change management • Disaster recovery
  • 9. 2 GHz dual-core processor 4 GB RAM 10 GB storage • PostgreSQL • MSSQL Windows/Linux The above given specifications are for an environment with 50 devices. Refer: System requirements Prerequisites - Minimum System requirement
  • 10. Pre-requisites - Ports & Protocols Protocols: SSH, SCP, TFTP Ports: 69 – TFTP | 22 – SSH/SCP | 514 – Syslog 13306 – Postgres database | HTTP-(80)
  • 11. Device discovery SNMP Request SysOID SNMP Profile V1, V2, V3 NCM Discovery Add device & associate with corresponding device template Match received SysOID with default/custom SysOID Match found Match not foundDevice not added
  • 12. Device discovery SNMP Discovery -IP Address - IP range - CSV file import Manual Addition - IP Address/Hostname - Vendor - Device template - CSV File import Format: <Hostname/ IP Address>,<Device Template>, <Name>,<Series>,<Model>
  • 13. ‘Device is not responding for SNMP requests’ Common causes: The device is reachable yet not responding: - Incorrect SNMP read community - Disabled SNMP in the device Possible error :
  • 14. ‘Device not added’ Common causes : Device reachable & SNMP community is correct but still device is not getting added: 1. Device SysOID not mapped with any device template Fix : Add sysOID to device template at SysOID finder in settings. Possible error : 2. No default device template is available in NCM for the particular device type Fix : Add/clone new device template. or Contact NCM support
  • 15. Device template What are device templates and what are they used for? Device specific configuration commands : • Configuration backup • Configuration upload • Enable/disable syslog change detection • Fetching hardware information
  • 16. Backup credential Possible combinations of protocol for backup : • SSH • TELNET • SSH - TFTP • TELNET - TFTP • SSH - SCP • SNMP - TFTP
  • 17. SSH / TELNET SSH / TELNET Device configuration Encrypted configuration stored in database Config backup commandsNCM
  • 18. SSH - SCP SCP Server Config backup commands Config file transfer using SCP Encrypted configuration file stored in DB NCM SSH - SCP
  • 19. SSH/TELNET - TFTP TFTP Server Config backup commands Config file transfer using TFTP Encrypted configuration file stored in DB NCM SSH/TELNET - TFTP
  • 20. SNMP - TFTP SNMP Request for config backup Configuration file transfer using TFTP TFTP Server Encrypted configuration file stored in DB NCM
  • 21. How to provide credentials? Refer: https://download.manageengine.com/network-configuration-manager/Device-Expert-Credentials-Tutorial.pdf
  • 22. When password & enable password is configured :
  • 23. Directly going to enable mode : admin #
  • 25. Credentials are valid but file transfer is failed Common cause : 1. TFTP or SCP servers have not been started. Fix : Check running status of TFTP or SCP servers in NCM server settings. (69 & 22) 2. Timeout due to config file size Fix : Increase backup timeout value in the corresponding device template. Possible error :
  • 26. Configuration backup • Instant (Single & Bulk) • Real-time change detection • Scheduled
  • 29. We don’t support Enable Change Detection for this device. Common cause: NCM doesn’t support syslog for the particular model. Fix : Enable syslog by connecting to the device and executing the enable syslog commands manually. or Contact NCM support. Possible error:
  • 30. Change detection is enabled but change is not detected Common cause : When the device & NCM support syslog, - Mismatched ports - Check NCM syslog server running status in NCM server settings Possible error:
  • 31. Scheduled backup • Routine everyday backups • Monthly / Weekly / Daily / Hourly / Once
  • 32. Schedule failure Common causes: Particular device credentials incorrect.
  • 33. Backup failure Common causes: 1. Credentials are changed or invalid. 2. Ports blocked or TFTP/SCP server not started • Check port 69 & 22 (TFTP & SCP) in NCM server settings 3. Huge config file • Fix: Change the timeout settings in the corresponding device template. 4. Unsupported backup commands • Edit the commands in device template or create a new device template by cloning the closest template.
  • 34. Change management • Change tracking, versioning & history • Compare configurations
  • 35. Change tracking, versioning, & history • View all changes made in a device • Automatic configuration versioning • Know the who, when & what of each change • Know the historical change trend of a device • View the number of modified, deleted & added config lines
  • 36. Compare configurations • Compare different versions of same device • Compare different devices configurations • View colour coded differences: added, modified & deleted
  • 37. Disaster recovery What’s a disaster in networks? • A network outage • A security breach • Performance degradation of business critical services and applications
  • 38. How to be prepared? • Baseline configuration • Startup/running sync • Change notification & rollback • Export configuration | Upload draft
  • 39. Baseline configuration • What is it? • Why is it important? • How to use it in times of disaster?
  • 40. ‘We don’t support upload feature for this device’ Common causes: • TELNET/SSH protocol doesn’t support upload • Fix: Edit the credential and Change the protocol from SSH, TELNET to SSH - TFTP, SSH - SCP , TELNET -TFTP depending the devices. • When SCP/TFTP protocol is used: • Device vendor supports but NCM device template doesn’t have upload commands for the specific device. • Fix: Clone/create a new device template with suitable SCP/TFTP commands or Contact NCM support Possible error:
  • 41. Startup/running sync • Why is it important? • Loss of changes made in running configuration during device reboot • How NCM helps? • Detects conflict • Sync configurations
  • 42. ‘Upload failure’ Common causes : 1. Command timeout Fix: Change timeout in device template command settings for the device type. 2. Based on the protocol, check the running status of TFTP & SCP servers in Server Settings. Possible error:
  • 43. ‘Change happens, but startup-running conflict is not detected by NCM in real-time.’ Common cause : Disabled real-time change detection. Fix : - Enable change detection if syslog is supported. - If syslog is not supported, the startup-running conflict will be detected and reported after the next successful schedule backup or manual backup operation. Possible error:
  • 44. Change notification & roll back Configure change notifications • Email • SNMP Trap for change event • Trouble ticket • Generate syslog message for change event Roll back To previous version To baseline version Associate notification profile to devices/device groups.
  • 45. Export config • Readable format • Local/shared storage • Schedule