These are some Frequently Asked Questions (FAQs) about the Network Configuration Management (NCM) Feature.

General

1. What is the Network Configuration Management feature?
2. What does the NCM feature do?
3. How does the Network Configuration Management work?
4. Can the Network Configuration Management feature manage Cisco device configurations?
5. Can the Network Configuration Management feature be used to manage router configuration / switch configuration / firewall configuration?
6. What are the devices supported by the Network Configuration Management feature?
7. Who are the vendors supported by the Network Configuration Management feature?
8. What is network backup ?
9. What does network backup mean in network configuration management?
10. What is network automation?
11. Why is network automation through a network configuration management feature important?
12. What are some benefits of using the network configuration management feature?

Inventory (Devices)

1. What is Config Conflict and how to resolve it?
2. What does Compliance Status mean in the network configuration management feature?
3. What is Baseline Conflict and How to resolve it?
4. Can I apply the same credentials to multiple devices?
5. What happens if I unmanage a device?
6. How to check notification for a device?
7. How to check alarms for a device?
8. How to check workflow associated with a particular device?
9. How to check if a device is reachable?
10. What is the "Show Commands" option for a device?
11. Where can I check all the audits for a particular device?

Discovery

1. What happens when existing devices are rediscovered?
2. Why are the reachable devices not added to the Network Configuration Management feature?
3. Where can I view / edit the credential profiles for discovery?
4. Can I choose multiple credential profiles while creating a discovery profile?
5. Can I apply the same set of credentials to multiple devices as a bulk operation?
6. Why are some reachable devices not added to the Network Configuration Management feature?
7. Where can I find and edit all the added discovery profiles?
8. Can I reschedule the already added profile?
9. Where can I view/edit the credential profiles for discovery?
10. Is there any report where I can check the status of previous discoveries?
11. Can I choose multiple credential profiles while creating a discovery profile?

Credentials

1. What should be done if the protocol needed is not listed for the chosen Device(s)?
2. What is the purpose of additional credentials for a device?
3. What is "Prompt" in Credentials?
4. What is "Enable Prompt" in Credentials?
5. What is the difference between Telnet and Telnet-TFTP protocol in credentials?
6. What is the difference between SSH and SSH-TFTP / SSH-SCP protocol in credentials?
7. What is a Credential Profile?
8. What to do if Enable Username and password are not configured?
9.What to do if Enable Username is configured without a password?
10. Can we have multiple values for prompts?
11. Can we have one profile for SNMP/SSH/Telnet protocols?
12. I have applied credentials for a set of devices using a credential profile. How do I change credential for a single device out of that set?

Credential Rule

1. What is a credential Rule?
2. Can I set a priority for a credential rule when a device is fulfilling criteria for multiple credential rules?
3. Can I run a credential rule for existing devices in Inventory?
4. What is the protocol field while adding/modifying the credential rules?
5. Can I apply REST credentials using Credential Rules?
6. What happens when I disable a credential rule?

SysObjectID

1. What is a SysObjectID?
2. What is the use of SysOID in the Network Configuration Management feature?
3. Where can I find the manually added SysOIDs?
4. Can I edit/delete the already added SysOID?
5. Can I update SysOID for a whole group of devices?
6. I have triggered the update option from Update SysOID page but still I can't see the SysOID mapping in Device SysOID Mapping page
7. While adding new SysOID after providing the device hostname/IP address, system is not proceeding to next step

Device Template

1. What is a device template?
2. What are all the important information one needs to know before creating / editing a device template?
3. What are the command template variables used by the Network Configuration Management feature?
4. What are some of the best practices while creating/editing a device template?
5. What is prompt ActionID? When do we mention them and when do we not?
6. What does operation mean? What are the supported DT Operations?
7. What if the Device Template XML file gets imported with just one protocol (Telnet)? Can I use the same commands for SSH protocol?
8. What does Backup Response mean? Why do we have it only for Backup Operation of SSH/Telnet protocol?

Inventory & Change Detection

1. How does the Network Configuration Management feature help me in keeping track of configuration changes?
2. What is real time change detection?
3. What are some troubleshooting steps if real time change detection is not working for my device?
4. The Network Configuration Management feature is showing that 'The selected device(s) do not support Configuration Detection through Syslog'. What should be done?
5. What is logging level and what its value must be set to while enabling real time change detection?
6. Can I enable/disable real time change detection for multiple devices at a time?
7. Why does the Syslog Change Detection Status show "Enable Now" even if Change Detection is enabled in the device?
8. Can more than one Regex Pattern be configured to show "enabled" status?

Label Configurations

1. What is labelled configuration?
2. What is the benefit of using labels for configuration?

Scheduling

1. What are the different types of operations that can be scheduled via the Network Configuration Management feature?
2. Can I disable an already scheduled task for a temporary period?
3. Can I execute a schedule on demand?
4. Can I see the history of Schedule Execution?
5. Can a task be scheduled for multiple devices?
6. I have scheduled a task, but I am not receiving any email notification. What shall I do?

Configlets

1. What is a configlet?
2. Can I import/export a configlet?
3. Can I schedule a configlet execution?
4. What is 'Add To Snapshot' option in the Configlet page?
5. Where can I check the history of Configlet Execution?
6. How to enable SNMP on Cisco switch?
7. How to configure SNMP on Cisco switch?
8. Can I enable SNMP with Configlets?
9. Can I apply same configuration commands in multiple devices using Configlets?
10. What are the types of Configlets execution mode?
11. What happens when the configuration command changes the command prompt?
12. How to provide/define the user input parameters in configlets?
13. What are flow export configlets and how to use them?
14. Can I use $variable in all Configlets?
15. How to escape '$' in Configlets?

REST Configlets

1. What are REST configlets?
2. What are the key benefits of using REST configlets?
3. What are the operations that will be performed using REST once I provide REST credentials?
4. Can I use both REST and CLI credentials to manage my device?
5. What are REST Device Templates?
6. Can I map a particular CLI device template to a REST device Template?
7. NCM doesn't support the REST feature for my device. How to get support for my device?
8. What is the base OS version mentioned on the REST Configlets page?
9. Can I use REST configlets for a device with OS version older than the Base OS Version?
10. What is object explorer under device snapshot?

Firmware Vulnerability

1. How do I see the severity of a Firmware Vulnerability?
2. On what basis does NCM show the vulnerability severity as Critical, Important, Moderate, Low and Unrated?
3. What is a Firmware Vulnerability and how we find it?
4. How does the Network Configuration Management feature synchronize the vulnerability data in DB?
5. Is there a way to update vulnerability data immediately?
6. Is there a way to search for firmware vulnerabilities corresponding to a particular vendor?
7. Where can I see the CVE details of a particular vulnerability and what does it contain?
8. What does State mean in Firmware vulnerability?

Syslog Blocked Host

1. What is Syslog Flood Prevention?
2. What can be done to avoid syslog flooding?
3. What is the default block time for any host that is flooding the Network Configuration Management feature with syslogs?
4. Can I choose to turn off the syslog flood prevention?
5. What is the threshold to block a device?
6. Is threshold for blocking a device configurable?

Exclude Criteria

1. What is Exclude Criteria and where it is used?
2. Can the criteria while creating Exclude Criteria be in Regex form?
3. Can we have multiple exclude criteria for a single device template?
4. Can exclude criteria be applied to a single device and not a device template?
5. What is Block Exclude Criteria and how it is used?
6. What are the uses of Additional Block Criteria?

NCM Terminal feature

1. What is Terminal feature in the Network Configuration Management feature and why is it needed?
2. What are the types of protocol that can be used to make a terminal connection?
3. What is the Inventoried tab, and what can be done with the devices listed there?
4. Can devices with SNMP credentials use terminal?
5. Is it possible to delete Inventoried devices from Terminal feature?
6. What are Terminal Device Groups? How are they used?
7. Where can I see the history of all terminal actions performed in the past?
8. If I add a Custom Terminal Device, will it be visible to all the users?

Export Configuration

1. What is the file format that is being used to export device configuration and can I change it?
2. Can I change the default location to save the exported configurations?
3. Can I select the version of configuration that needs to be exported?
4. Where can I check the history of previous configuration export?
5. What happens when I export the configuration multiple times on the same day?
6. Does the Network Configuration Management feature notify me once the export process is completed?
7. Which configuration will be exported from the selected devices?

Third Party Syslog Server

1. What is the use of third party syslog servers?
2. Can I configure multiple syslog servers at a time?

Database Administration

1. Will any of the deleted records while cleanup be archived or will they be deleted permanently?
2. When does the Network Configuration Management feature perform the cleanup and what is the frequency?
3. Can I reschedule DB cleanup time?
4. Can I change the frequency of the schedule?
5. What happens to the device audit details once the audit history is deleted?
6. What happens to the baseline configuration version of the device when it qualifies for deletion during DB cleanup?

Syslocation and Description

1. What is Syslocation and description and why do we need to update these values?
2. After updation, where can I check the Syslocation and Description value?
3. Can Syslocation and Description values be updated for multiple devices at a time?
4. Can I select multiple SNMP profiles for updating Syslocation and Description values?

Upload Request

1. What is an upload request and when are they created?
2. Can I change the status of an already approved/rejected request?
3. What happens when a request is approved or rejected?

Change Notifications

1. What is change notification?
2. What are the different types of Change Notification Actions?
3. Can multiple actions be carried out for a single change?

Compliance Policies

1. What are Compliance policies?
2. What are Compliance Rules?
3. What is a Remediation Template?
4. What is an Adhoc Test?
5. Can I generate a report for all the policies at once?
6. What is HIPAA compliance?
7. What is required for HIPAA compliance?
8. Why is HIPAA compliance important?
9. How to ensure HIPAA compliance?

Device Group

1. What is a device group?
2. What operations can be performed on device groups?
3. Where can I check the devices associated with a device group?

Reports

1. Can I receive automatically generated reports on Device Configuration in my mailbox?
2. Can the Network Configuration Management feature generate email alerts?
3. Does the Network Configuration Management feature maintain historical data about Device Configuration?
4. What are the different types of reports available in the Network Configuration Management feature?
5. What are the different file formats, in which a report can be exported?

Security Aspects

1. How much security does the Network Configuration Management feature offer to my configuration?

Miscellaneous

1. I have enabled syslog-based change detection for my device. But the feature does not seem to detect any configuration changes.