Just a nice pic. Cloning network topology..
You can clone network topology diagram to multiple windows for up to 5 x 5 grid an overlay different information in each cell
This author has not written his bio yet.
But we are proud to say that Web Master contributed 223 entries already.
You can clone network topology diagram to multiple windows for up to 5 x 5 grid an overlay different information in each cell
It is important to distinguish between monitored device “down” event and event when monitoring application itself loses network connection. When network monitoring application itself losses network connectivity it should not result in alert emails or text messages with monitored device down events as it would be classified as false positive alerts. To monitor its own […]
Here is the list of the the possible reasons why some of the network devices can be missing after Network Discovery: SNMP is not configured or misconfigured on missing device (Test SNMP operation via Tools -> SNMP Walk). SNMP ACL on missing device does not permit requests from Nectus IP Address (Test SNMP operation via […]
During installation user must provide a standard corporate SNMP v2 or v3 Read-only credentials to be used for network discovery. For each live IP address Nectus tries to use standard SNMP parameters as a first choice but in addition to standard credentials Nectus attempts to use some of the well-known SNMP strings such as v2 […]
Platform_id Product_name Product_category .1.3.6.1.4.1.2496.1.1 Cisco PGW 2200 Softswitch Cisco Protocol Gateways .1.3.6.1.4.1.4413.2.1.6 Motorola Surfboard SBG6580 Cable Modem and Wireless Router Motorola Cable Modem and Wireless Routers .1.3.6.1.4.1.99.1.1.3.34 Cisco Virtual PSTN Gateway Cisco Virtual PSTN Gateways .1.2.826.0.1.4616240.1.1.4515 Cisco TelePresence MCU 4515 Multiparty Conferencing Unit Cisco TelePresence MCU 4500 Series Video Conferencing Units .1.2.826.0.1.4616240.1.1.4505 Cisco TelePresence MCU […]
One of the first steps that we normally perform during POC is timer tuning for ICMP and SNMP for Discovery and Monitoring services. Normally Discovery should have different timer values than Monitoring because Discovery operates in a “pessimistic” model when IP address that is being probed by Discovery engine is likely not to be alive […]
Nectus Network Discovery engine is one of the fastest among all that I worked with .. and I worked with most of them (Cisco Works, Prime, Solarwinds, ManageEngine, Remedy, BMC) I remember when it took Cisco Prime to scan 10.0.0.0/8 whooping 24 hours. Nectus finishes 10.0.0.0/8 in under 3 hours. Speed of the discovery is […]
One of the unique features of Nectus Syslog service is ability to alert users via Email or Text messages not only on Syslog message Severity level but on specific keywords inside Syslog message. For example you can configure a rule to alert via email when there is Syslog message with Severity 2+ and there is […]
I was working with a client today on Nectus POC and he asked me to generate a list of all the routers and switches that have problems with TACACS. Nectus didn’t have “out of the box” report that validates the SSH connection to each device so we had to be creative in this case. Fist […]
We all know how hard it is sometimes to find one single MAC address in the big network.. You have to look through the forwarding tables of many switches. Nectus makes it easy. We scan forwarding tables from all the switches as part of regular Discovery jobs and save all MAC addresses and corresponding Switch […]
We offer free Nectus license to all Students of Cisco Network Academies. All Features Enabled. Restricted to max 20 devices. Contact us at admin@nectus5.com to get your personal licence key.
Some of the users complained about gloomy Nectus color scheme. The reason for dork color scheme is lesser strain on eyes during long troubleshooting sessions but for those who still wants to enjoy more contemporary colors we added ability to switch between dark and light colors scheme for Go to “Settings -> Miscellaneous Settings” and switch […]
If you want to prevent specific device from sending messages to Syslog, you can add its IP address to Syslog Sender Blacklist. All messages from that IP address will be discarded.
If you want to prevent specific Syslog messages from being added to Syslog Database, you can add a specific keyword to a Syslog blacklist and all syslog messages that contain this keyword will be discarded. This does not have retroactive effect on messages that are already in DB.
This is an example on how to obtain list of IP addresses assigned to Interfaces inside specific SNMP Context on Nexus 7000 Step 1. Obtain list of all SNMP Contexts by sending SNMP GET Bulk for cContextMappingVrfName (.1.3.6.1.4.1.9.9.468.1.1.1.2) Response: ‘1.3.6.1.4.1.9.9.468.1.1.1.2.10.109.97.110.97.103.101.109.101.110.116’=>”management” In this response Nexus 7018 Switch has only one SNMP context with a name “management” […]
Following ports needs to be opened for inbound access to Nectus GUI via Firewall HTTPS: TCP 443 WebSockets: TCP 8000, 8100
CST signs partner agreement with Cisco Learning Academy to provide Network Visualization and Discovery tools to be used in training classes.
Very often our customers has to live trough the M&A process where merging networks are configured with different SNMP parameters. It can be just different SNMP v2 community strings of different flavors of ciphers in SNMP v3. To support multiple SNMP settings within the single management domain Nectus implements a concept of SNMP profiles. User […]
You can share graphs generated in Nectus with other people by providing graphs’ direct URLs from the right upper cortner
To reassign device to a different site right click on the device name and select “Move Device to..” option in context menu
