Entries by Web Master

Ping plotter is included in Nectus 1.2.6

Starting from Nectus version 1.2.6 Ping plotter functionality was added to a Toolset located in  “Tools” main menu. Specify up to 10  IP address and track latency and availability in real time. Export metrics to a CSV file with 1 second resolution.  

Why my devices are in “All CDP Devices” category only?

All network devices that responds to SNMP queries are being placed in “All SNMP Devices” category, furthermore Nectus tries to obtain list of all CDP neighbors from SNMP enabled devices and  tries to communicate to all CDP neighbors via SNMP. If CDP neighbor does not answer to SNMP queries is is being placed in “ALL […]

Network device icon customization in Nectus

Nectus comes with hundreds of standard device icons but sometimes user may want to change default icon for specific device type to something different. Supported icon format is  SVG with width=”168px” height=”114px. To change device icon, right click on Device Category and select “Properties”     Select “Upload SVG icon from Local Disk  

How to monitor reachibilty of external resources with Nectus?

In addition to monitoring SNMP enabled devices located inside of your network Nectus can be configured to monitor ICMP reachibility of any external IP address by adding it to a list of “IP Monitors” First you need to  define IP Monitor Group name where IP address will be added to: Make sure that “Monitoring” flag […]

Interface Utilization issues on Cisco GRE tunnels (IOS-XR)

By default when you create a GRE tunnel  (tunnel-ip1) on ASR9K routers it gets assigned default Bandwidth value of 8Kbps which usually causes utilization monitoring confusion as Tunnel can carry as much traffic as its hardware parent interface where tunnel is anchored to. You would see utilization values as high a 10,000% percent with default Bandwidth […]

, ,

How to read Cisco device S/N via SNMP?

During network discovery phase Nectus collects S/N for each device that responds to basic SNMP queries. One of the problem with Cisco  Devices is that different platforms uses different OID to store S/N. Following OIDs are being used for Cisco: .1.3.6.1.2.1.47.1.1.1.1.11.1 .1.3.6.1.2.1.47.1.1.1.1.11.2 .1.3.6.1.2.1.47.1.1.1.1.11.10 .1.3.6.1.2.1.47.1.1.1.1.11.22 .1.3.6.1.2.1.47.1.1.1.1.11.1001 .1.3.6.1.2.1.47.1.1.1.1.11.24555730 .1.3.6.1.4.1.14179.1.1.1.4.0 .1.3.6.1.4.1.2467.1.34.4.0 .1.3.6.1.4.1.437.1.1.3.1.22.0 .1.3.6.1.4.1.9.20.1.1.1.1.3.0.1.3.6.1.4.1.7505.1.1.1.0 .1.3.6.1.4.1.9.6.1.101.53.14.1.5.1 .1.3.6.1.4.1.9.9.92.1.1.1.2.1 .1.3.6.1.4.1.9.3.6.3.0 .1.3.6.1.4.1.3076.2.1.2.22.1.63.0 .1.3.6.1.4.1.9.5.1.2.19.0 […]

SNMPv3 AES Cipher bug in IOS-XR 5.3.4 (ASR9000)

Just run into a IOS-XR bug with running SNMP v3 with AES-128 cipher (as well as AES-192 and AES-256) on ASR 9000 Routers running 5.3.4 Code. Apparently Cisco BUG ID CSCvd35831. Fixed in 6.2.xx code. Upgrading ASR9K is fun that can take 4-5 hours per box but having SNMP communications secure is more important. Consider upgrading. […]

,

How to get Interfaces’ ifIndex values via SNMP

To obtain list of ifIndex values for all interfaces for given device SNMP polling agent has to send SNMP GET BULK request for the following OID:  .1.3.6.1.2.1.2.2.1.1 Response Example: ‘.1.3.6.1.2.1.2.2.1.1.1’ => “1” ‘.1.3.6.1.2.1.2.2.1.1.2’ => “2” ‘.1.3.6.1.2.1.2.2.1.1.3’ => “3” ‘.1.3.6.1.2.1.2.2.1.1.4’ => “4” ‘.1.3.6.1.2.1.2.2.1.1.5’ => “5” ‘.1.3.6.1.2.1.2.2.1.1.6’ => “6” ‘.1.3.6.1.2.1.2.2.1.1.7’ => “7” ‘.1.3.6.1.2.1.2.2.1.1.8’ => “8” ‘.1.3.6.1.2.1.2.2.1.1.9’ => […]

,

SNMPv3 Configuration example for IOS-XR (ASR9k)

IOS-XR SNMP v3 configuration example for username “user_des”   snmp-server group admins v3 priv snmp-server user user-des admins v3 auth md5 “authpass” priv des56 “privpass” SystemOwner   this configuration will use MD5 hash for authentication and DES cipher (DES56) for encryption. IOS-XR (as of 5.3.4 code) also supports 3DES  – 168 bit 3DES algorithm for […]