Entries by Web Master

,

How to Configure Nectus Syslog Collector to use Local Storage

How to Configure Nectus Syslog Collector to use Local Storage To configure Nectus Syslog collector storage settings go to Main Menu Settings → General Settings → Syslog Settings Configure Storage parameters according to this example: “Syslog Remote Server DB Root Password” should be taken from this file: C:\Program Files\Nectus\Web\Apache24\htdocs\protected\config\database.ini After Configuration is finished press “Test […]

,

How to Configure Nectus NetFlow Collector to use Local Storage

How to Configure Nectus NetFlow Collector to use Local Storage To configure Nectus Netflow collector storage settings go to Main Menu Settings → General Settings → NetFlow Integration Configure Storage parameters according to this example: “NetFlow Remote Server DB Root Password” should be taken from this file: C:\Program Files\Nectus\Web\Apache24\htdocs\protected\config\database.ini After Configuration is finished press “Test […]

, ,

Monitoring DHCP Scope Utilization on Windows DHCP Servers with Nectus

Monitoring Scope Utilization on Windows DHCP Servers with Nectus In this chapter, you’ll learn how to use Nectus to enable and configure DHCP Scopes utilization monitoring on Windows DHCP Servers. Nectus allows network engineers proactively monitor amount of free IP addresses in DHCP scopes and generate E-mail or Text alerts when number of free IP […]

,

Importing subnets to IPAM from DHCP servers

Importing subnets to IPAM from DHCP servers One of the most time-consuming steps in IPAM deployment is initial configuration. Whether you have 5 or 1000 network subnets, most IPAM software products require manual configuration of subnets. Nectus offers unique automated features that make this initial configuration step fast and easy. One such feature is an […]

,

Management Interface Selection for Network Devices

Management Interface Selection for Network Devices In this chapter, you’ll learn how Nectus selects Management Interfaces for Devices that are found during Discovery phase. Nectus will automatically select Management Interfaces using its own default logic. It also supports user-defined selection for cases where this is appropriate. The specific topics we will cover in this chapter […]

,

Cisco SNMP v3 Configuration Example for IOS Devices

This is basic configuration example of the SNMPv3 on IOS device. This enables SNMP v3 with following parameters: Authentication Protocol: MD5 Authentication Username: vconsole Authentication  Password: nectus Privacy (Encryption) Protocol: AES-256 Privacy (Encryption) Password: nectus Configuration Example ==================== snmp-server group NECTUS_V3_GROUP v3 auth read TESTv3 snmp-server view TESTv3 mib-2 included snmp-server user vconsole NECTUS_V3_GROUP v3 […]

,

Locating Orphaned subnets in IPAM

Locating Orphaned IPAM Subnets One of the key features of good IPAM is ability quickly find subnets that are part of the defined address space but have not been explicitly added to list of subnets available for allocation. These subnets are normally called “orphaned” and can be presented as white spaces within address space. Orphaned […]

,

Making IP Reservations in Nectus IPAM

Making IP Reservations in Nectus IPAM In this chapter, you’ll learn how to make IP reservations in Nectus IPAM. The specific topics we will cover in this chapter are: Adding new IP reservation Deleting IP reservation Searching for IP reservations 1. Adding New IP Reservation To create a new IP Reservation, navigate to desired Subnet […]

,

Managing IPAM Containers in Nectus

Managing IPAM Containers in Nectus In this chapter, you’ll learn what IPAM Containers are and how to manage them. The specific topics we will cover in this chapter are: What are IPAM and IPAM Containers? How to Create IPAM Containers How to Move IPAM Containers How to Modify IPAM Containers How to Delete IPAM Containers […]

,

Configuring AD LDAP Integration for User Authentication

Configuring AD/LDAP Integration for User Authentication In this chapter, you’ll learn how to configure Nectus to work with Microsoft Active Directory and the LDAP protocol for user authentication. The specific topics we will cover in this chapter are: What are AD and LDAP? Why Configure Nectus Integration with AD/LDAP? How Nectus Authenticates Users Connecting Nectus […]