About us

Optrics is an authorized ManageEngine Partner with expertise in customized network solutions.

read more

Optrics Call Answer Guarantee
Toll Free: 1-877-386-3763
Direct: 1-780-430-6240

If you have any questions, call us during regular business hours, and you will always speak with a person.
Monday to Friday, 8am - 5pm MST

Take Control of Your Network Configurations

Automated Network Configuration Management

NCM is a trusted solution for network administrators to take total control of the entire life cycle of device configuration management. It is a web-based, multi vendor network configuration, change and compliance management (NCCCM) solution for switches, routers, firewalls and other network devices. It servers as a secure repository for device configuration, helps in continuous monitoring of changes, provides change notifications and reports, helps in easy and safe recovery to trusted configurations and in automating all configuration management tasks.

"Network Configuration manager is a complete solution that helps us solve multiple problems related to change-control of our network infrastructure."
- Chad Lindsay, Union Hospital Health Group

Network Configuration Manager Helps With:

Manage Configurations

Maintain versions of configurations and view, compare, edit, label and upload them from a centralized web GUI.

Provides an integrated solution for complete change and configuration management for devices from multiple hardware vendors. At present, it supports device models from more than 22 device vendors including Cisco, HP, Nortel, Juniper, Force10, 3Com, D-link, Foundry, Dell, Aruba, Extreme, ADTRAN, Enterasys, Huawei, Blue Coat, Proxim, NetScreen, NETGEAR, FortiNet, ALAXALA, Brocade, Radware, DAX, H3C, Yamaha, Vanguard, Allied Telesis.

Take Control of Changes

Monitor configuration changes in real-time, get notifications, prevent unauthorized changes, approve genuine changes

Unauthorized configuration changes often wreak havoc to the business continuity and hence detecting changes is a crucial task. This software monitors the managed devices continuously and detects configuration changes on real-time by listening to the syslog messages generated by the devices. The real-time change detection enables you to have better control over your network.

Devices Supported by NCM

Ensure Compliance

Define standard practices and policies and automatically check configurations for compliance. Get reports on compliance status and satisfy your auditors.

With increasing security threats to mission-critical network resources and serious legal consequences of information mis-management, enterprises everywhere are required not just to follow standard practices, internal security policies, stringent Government regulations and industrial guidelines, but also demonstrate that the policies are enforced and network devices remain compliant to the policies defined.

Automate

Automate all repetitive, time-consuming configuration tasks.

It provides a high level of automation for all time-consuming and labor-intensive tasks. Quite often administrators wish to apply same set of changes to multiple devices - for example, applying a security patch. Network Configuration Manager provides templates & scripts to carry out these tasks.

Audit

Get completed record of who, what and when of configuration changes.

All actions performed by the software users are properly recorded as audit trails. Information on 'who' changed 'what' and 'when' can be easily deciphered. This will ensure accountability for actions in the organization.

Improve Network Visibility

Get comprehensive reports on devices inventory, configuration changes and compliance auditing.

Improve Efficiency

Ensure network uptime, reduce unplanned configuration changes, improve network security increase overall efficiency.

Network configurations are critical because they decide how devices across LAN and WAN should communicate to deliver business critical services to end users. Any error in the configuration could affect application accessibility and the speed at which they are delivered. Such errors are lethal for business and should be identified in real-time and corrected quickly.

Get a Quote  or  Download Free Trial

Network Configuration Manager Customers

Features

Automating Configuration Tasks

Provides a high level of automation for all time-consuming and labor-intensive tasks. Quite often administrators wish to apply same set of changes to multiple devices – for example, applying a security patch. Network Configuration Manager provides templates & scripts to carry out these tasks.

Searching Devices, Configuration

In enterprises having a large number of devices, there will be requirements to do a quick search for a particular device in the inventory. Sometimes, the configuration database needs to be searched for specific words, strings, phrases or a combination of these in device configuration files. Network Configuration Manager comes with a powerful search mechanism to facilitate these.

Switch port mapper

Provides the 'Switch Port Mapper' tool that helps network administrators identify the list of devices connected to each port of the managed switch. This eliminates the need for manually tracing the network cables.

Command Execution Tools

Provides utilities and tools to execute various commands on the devices and display the output. For example, to view the Access Lists or VLANs of a device, administrators will have to just click a button in the GUI instead of manually connecting to the device in the command line interface.

Database Backup & Disaster Recovery

However robust the application may be, there should always be provision for a reliable disaster recovery mechanism. It provides option for taking backup of entire database and also offers scripts to do a quich disaster recovery.

Provision for examining configurations for compliance to a defined set of internal / external policies and standards

With increasing security threats to mission-critical network resources and serious legal consequences of information mis-management, enterprises everywhere are required not just to follow standard practices, internal security policies, stringent Government regulations and industrial guidelines, but also demonstrate that the policies are enforced and network devices remain compliant to the policies defined. Ensuring compliance has become a priority for network administrators nowadays. This drives them take extra care while changing configurations.

Network Configuration Manager helps administrators to define and enforce standards. The standards could be anything - ensuring the presence or absence of certain strings, commands or values. It will scan the configuration for compliance to the rules/ policy defined and report violations. Reports on policy compliance and violations are generated.

Change Management Rules & Notification

Monitoring the changes done to the configuration is a crucial function in Change Management. NCM provides convenient change management options. Once a configuration change in a device is detected, it is important that notifications are sent to those responsible for change management. Network Configuration Manager leverages the sylog messages to detect configuration changes in real-time and sends notifications.

Network Configuration Manager helps in sending notifications in four ways:

  • Sending Email
  • Sending SNMP Traps
  • Generating trouble Tickets
  • Rolling back to the previous version or the baseline version

And these notifications can be sent whenever there happens a change in

  • Startup or Running Configuration
  • Startup Configuration alone
  • Running Configuration alone

Do you accept credit card or debit card payments?

Merchants who accept credit or debit card payment from customers (online or offline) are REQUIRED to be in compliance with PCI Security Council standards.

There are 12 major requirements for PCI DSS compliance, however the size of your business and volume of transactions made determines the specific compliance requirements that must be met by you.

If your organization fails to comply with PCI DSS - you can be in serious trouble.

  • Imagine your organization having to pay a monthly fine of $5,000 to $ 500,00 for not complying
  • The reputation of your firm can get seriously damaged
  • What would be the impace of your clients losing trust in your firm?

User Activity Tracking

"Who, what and when" of configuration changes.

Users perform various operations on device configuration such as backing up the configuration, uploading configuration to device, enabling real-time change detection etc., When something goes wrong due to faulty configuration change or when a security breach occurs, it is important to trace user actions to ensure accountability in the organization. To ensure this, it is essential to record the information on who invoked what operation, on what device, at what time and the result of the operation. This is done by the Audit module of NCM and this is termed as "Device Operation Audit".

Besides, information about the various scheduled tasks executed by NCM, along with details such as schedule name, result of execution etc., are listed by the Audit Module under "Schedule Audit".

Detailed reports on Inventory, configuration changes, compliances

The information on the entire network configuration management process in your enterprise is presented in the form of comprehensive reports. The status and summaries of the different activities such as device configuration details, changes in configuration, network inventory, conflict between startup and running configuration, device audit details, policy compliance details etc are provided in the form of tables and graphs, which assist the network administrators to make a well-informed decisions on device configuration.

Network Configuration Manager provides over 12 reports under four categories:

  • Network Reports
  • Configuration Reports
  • User Reports
  • Policy Compliance Reports
Get a Quote  or  Download Free Trial

System Requirements

1.8 GHz Penitum (R) processor, 512 MB RAM, 200 MB disk space for product installation and 10 GB for database on Windows 2003, XP, RH Linux 7.2/8.0/9.0, AS 2.1 & 3.0, ES 2.1 & 3.0, IE 7 and above, Firefox 2.0 and above.

Documentation

Here you can find product documentation, brochures and guides. If you have any questions please feel free to contact us and one of our specialists will address your inquiry as soon as possible.

Get a Quote  or  Download Free Trial

Pricing

Perpetual Model
Products
License Fee
AMS*
$1,995
$399
$3,495
$699
$5,995
$1,199
$9,995
$1,999
$14,995
$2,999
$19,995
$3,999
$29,995
$5,999
$39,995
$7,999

* Annual Maintenance & Support Fee

  or  Download Free Trial