NETWORK MANAGEMENT
MADE EASY
WITH
NCM V12.3
Why do you need NCM?
Network configuration Manager(NCM) is a tool that controls the entire
life cycle of device configuration management by managing and changing
configurations,compliances etc, in routers,switches,firewall and other
network devices.
The 5 magical words to keep your network devices under check:
CONFIGURATION
BACKUP
CONFIGURATION
CHANGE
MANAGEMENT
CONFIGLETS
MANAGING
COMPLIANCE
REPORTS
N
C
M
Discovering and Adding devices in
NCM
Devices can be discovered in NCM using one of the three ways:
Device Discovery,Manual Addition,Import file.
DEVICE DISCOVERY:
Devices can be discovered by giving the IP address of any
networking device.
Steps:
1.Go to settings->
Discovery,under discovery,
Add the IP address and IP
Range,then the
Devices will be discovered.
A CSV import file can also be used
while discovering.
Adding Devices and Applying
Credentials
It is mandatory to specify the snmp credentials for communication,in order to
discover and add devices in the inventory.
Manual Addition
Another way of adding device is by clicking the
Icon on the top right of inventory.This opens a box that
requires the user to add a device.
Give the necessary Hostname/IP address
to add the device.
Import File
Devices can be added without giving credentials,by just knowing the
device’s Host name/Ip Address and the device template name,Series
and it’s model.The file containing this can be imported.
Applying Credentials
Now,let us apply credentials.Credentials can be applied
By clicking on
all the devices
that needs to
be configured
after the devices get
added to the
Inventory.
Start managing the network devices right after the
device you discover gets added to the Inventory!
CONFIGURATION
BACKUP
WHY YOU NEED TO BACKUP?
Backing up helps to:
• Prevent Loss of data due to a disaster/Network outage
• Prevent Starting a configuration from scratch
• Compare two configurations
Backup can be done in 3 ways:
• Manual backups
• Scheduled backups
• Syslog based automatic backup
The Backup status of every configuration is updated after every backup.
Manual and Syslog based automatic
backups
Manual backup:
Selecting the devices and backing up the
devices manually.
Syslog based automatic backup:When
a user makes changes in a device
configuration, syslog notifications are
received for the actions performed and
backup will be taken.
Scheduled Backups
• NCM offers scheduled backups,where one can set up a specific time to backup
configurations
• Hourly,daily,weekly,monthly scheduled backing up is possible
• Automatically starts backing up at the given time and sends Email notifications
Baseline Configuration
A baseline version is the best among all configuration versions and
1.Can be used as a configuration after an unexpected network outage.
2.Can be used to compare with the latest configurations to see the
changes made and to check for difference between the baseline and
other configurations.
CONFIGURATION CHANGE
MANAGEMENT
REAL TIME CHANGE DETECTION(RTCD)
Any change made in a configuration of any network device triggers automatic
backup of that device by RTCD.
BENEFITS:
• Get notification on who made the change
• Get Time and date of change
• Immediate configuration back up after the changes are saved
Working of “Enabling Change Detection”
When “Enabling Change Detection” is given
• NCM tracks it when a User logs in/logs out
• Tracks the changes made and Takes a backup after the User logs out
• Compares the backup with the current version and in the event of no
change,backup gets discarded and when there is a change,a backup will be
stored in Database.
• Syslog messages are received for every action the user performs on the device
COMPARING CONFIGURATIONS
Comparison can be done between any type of configurations,any two
devices(working and non-working) also.
The image given below shows a comparison of all the changes made between a
running and a startup configuration.
ROLE-BASED ACCESS CONTROL
(RBAC)
NCM offers access to three types of users to prevent misusing of data
• Administrator:Permission to access all devices/make changes
• Rstricted admin(power user):Permission to access specific devices/make
changes,cannot add or delete other devices.
• Operator:Limited permission and should wait for approval from power user or the
admin,to upload or make changes in the device.
Editing and Uploading drafts:After the admin approves the change made by user,it
gets uploaded and backups are taken but an admin can upload them directly.
CONFIGLETS
Configlets and its Uses
Configlets are script templates that can be executed in multiple devices at one go.
BENEFITS:
• Configlets are available as templates and can be added manually
in 3 modes-File transfer,script execution,Advanced script execution modes
• Helps to fix malfunctioning devices at one go
• Helps to execute sequence of commands in many devices at one go
TEMPLATES:
Manual Addition of Configlets
FILE TRANSFER MODE
The advantage of using file transfer mode is,it allows the user to upload the same
configuration in many devices at one go.
Script Execution Mode
Helps in:
• Executing basic trouble shooting commands
• Changing passwords,banners
• Enabling/Disabling SNMP
Example:Selecting a particular network device and Executing it in script execution
mode changes the password of all the devices associated.
Advanced Script Execution Mode
This mode is used when:
1.There is a change of prompt after command execution
2.A command requires a prompt user confirmation
3.There is a delay in response after command execution.
Example:In the given example,the command will be executed after a particular
prompt and the timeout is also set.
Executing The Configlets
• After modifying the configlets,they are executed by applying the configlets on
the respective devices and execution results can be checked in the“execution
history”.
• After creating the configlets,they can be added to “snapshots” for easy
access.
Compliance Management
Why is compliance necessary?
Benefits:
• They help to avoid vulnerabilities
• Avoids loop holes in a network
• Avoids legal consequences
Default compliance policies:
Cisco IoS policy,HIPAA,SOX,PCI.
Custom Policies
Custom policies can be added by:
• Creating a custom rule
• Grouping the custom rules to create a rule group
• Grouping rule groups to create policies
Custom rule is added based on 3 criteria:
• Simple criteria
• Advanced criteria
• Advanced custom criteria
Simple Criteria with an Example
Uses of simple Criteria:
• Checking for any line in a configuration
• Should/Should not contain exact set
• The number of times the line has to appear
Example:In the given example the word
“Public” is checked .
Advanced Criteria with an Example
This is used to check for a particular line,in a configuration using complex
Regular expressions.
Supports:
• AND/OR
• Patterns
Example:Pattern Search
is implemented.
Advanced Custom Criteria with an Example
This is used when you want to run a compliance check in particular sections of
the configuration file.Along with the features of Advanced Criteria it also
supports:
1.Block criteria(specifies the beginning and ending of the block)
2.Additional block criteria
Example:In this example,we are
defining the blocks for NCM to run
the compliance check only on the
interfaces that are not “shut down”
Remediation Template
Remediation Templates are used when a particular rule is violated during
Compliance check.In case of violation,remediation templates are used to fix the
issue.
Eg:While checking for “public” in snmp,if it finds a word “public” in any
configuration,this remediation template can be used to fix.
Creating Rule groups and Policies
The custom rules are grouped into rule groups which are in turn grouped into
policies.These policies can now be associated with the selected Network devices.
Compliance Reports
Once you associate the policies to the devices,you can generate reports on how
compliant the devices are using compliance reports.You can also check the violated
policies and the compliant devices.
REPORTS
NCM Reports
NCM generates reports for many operations.Some
important reports are:
1.Configuration ChangesReport
2.Configuration Change Trend
3.EOL/EOS Report
4.Compliance Report
5.Configuration Analysis Report
6.Security Audit Report
Detailed Reports
NCM generates detailed reports in Pdf format.
Eg:Device Management status Report
Scheduling in NCM
• Scheduling can be done for all operations in NCM.
• Devices to be scheduled are added,Schedule time is specified.
• Notifications are turned on for that Schedule.
Dashboard and Inventory
Dashboard in NCM displays the status of your Network,Inventory consists of the
configuration files in a hierarchical order.
Settings in NCM
Settings consists of Basic,discovery and NCM settings and majority of
operations are performed through this.
Alarms
NCM sends an alarm when an operational activity gets violated.
Benefits of NCM
User Friendly!
NCM is a user friendly GUI, it makes
the configuration change
management simple and easy with
intuitive dials and graphs.
Simple installation and usage!
NCM is easy to install and it
manages the devices right away.
Transparent Pricing!
NCM comes at an affordable and
transparent pricing based on the number
of devices to be managed.
24x5 Technical Support!
NCM offers 24x5 technical support,
making it easier for customers to gain the
maximum use of the product.
A Complete Package!
It effectively manages many network
devices thus paving way to an efficient
working platform and offers Complete
satisfaction to the clients.
Thank you
!

More Related Content

DOC
systems_administrator test
PPTX
Understanding the Windows Server Administration Fundamentals (Part-2)
PPT
Network administration and Management
PPSX
Server training
PPT
The Basics of Network Troubleshooting
PPTX
Network monitoring system
PPTX
network monitoring system ppt
PDF
Windows Server 2019 -InspireTech 2019
systems_administrator test
Understanding the Windows Server Administration Fundamentals (Part-2)
Network administration and Management
Server training
The Basics of Network Troubleshooting
Network monitoring system
network monitoring system ppt
Windows Server 2019 -InspireTech 2019

What's hot (20)

PPTX
Software developement life cycle ppt
PDF
AppSphere 15 - Deep Dive into AppDynamics Application Analytics
PPTX
Secure Software Development Lifecycle
 
PPT
5.1 mining data streams
PDF
Complexity metrics and models
PPT
Process Models IN software Engineering
PPT
Chapter 5
PPTX
Security Policies and Standards
PPTX
Data Mining: Mining ,associations, and correlations
PPT
Chapter 15 software product metrics
PDF
Object oriented-systems-development-life-cycle ppt
PDF
Parallel Algorithms
PPT
Software Quality Challenge
PDF
Vulnerability Management: A Comprehensive Overview
PPTX
Software Configuration Management
PDF
Data Mining: Association Rules Basics
PPT
Introduction to information security
PPTX
Parallel programming model
PPTX
Software Quality Assurance
PPT
BIL406-Chapter-7-Superscalar and Superpipeline processors.ppt
Software developement life cycle ppt
AppSphere 15 - Deep Dive into AppDynamics Application Analytics
Secure Software Development Lifecycle
 
5.1 mining data streams
Complexity metrics and models
Process Models IN software Engineering
Chapter 5
Security Policies and Standards
Data Mining: Mining ,associations, and correlations
Chapter 15 software product metrics
Object oriented-systems-development-life-cycle ppt
Parallel Algorithms
Software Quality Challenge
Vulnerability Management: A Comprehensive Overview
Software Configuration Management
Data Mining: Association Rules Basics
Introduction to information security
Parallel programming model
Software Quality Assurance
BIL406-Chapter-7-Superscalar and Superpipeline processors.ppt
Ad

Similar to Overview and features of NCM (20)

PPTX
Network Configuration Management - Mumbai Seminar
PPTX
5 Ways NCM Can Save You From A Disaster
PPTX
Free training on NCM - Discovery & Disaster recovery
PPTX
Network Configuration Manager Training - [Season 4] Part 1 - Configuration ba...
PPTX
NCM Training - Part 2 - Automation, Notification, Compliance and Reports
PPTX
NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery.
PPTX
Configlets, compliance, RBAC & reports - Network Configuration Manager
PPTX
Network Configuration Manager Training - [Season 7] Part 1 - Configuration ba...
PPTX
Free training on Network Configuration Manager - Season 2 - Part 2
PPTX
Telecom provider germany ncm casestudy
PPTX
Why Configuration Management Matters
PPTX
Ncm Middle East Workshop
PDF
Implementing and auditing security controls part 2
PPTX
SCCM 2019 Demo.pptx
PPTX
Commissioning, Managing & Troubleshooting Industrial Networks
PPTX
Network Management - IntroductionIntorduction to network management
PPT
network-management Web base.ppt
DOCX
Basic Concepts and Types of Network Management
PPT
IT Best Practices for Community Colleges Part 3: Configuration Management 2010
PDF
Configuration management 101 - A tale of disaster recovery using CFEngine 3
Network Configuration Management - Mumbai Seminar
5 Ways NCM Can Save You From A Disaster
Free training on NCM - Discovery & Disaster recovery
Network Configuration Manager Training - [Season 4] Part 1 - Configuration ba...
NCM Training - Part 2 - Automation, Notification, Compliance and Reports
NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery.
Configlets, compliance, RBAC & reports - Network Configuration Manager
Network Configuration Manager Training - [Season 7] Part 1 - Configuration ba...
Free training on Network Configuration Manager - Season 2 - Part 2
Telecom provider germany ncm casestudy
Why Configuration Management Matters
Ncm Middle East Workshop
Implementing and auditing security controls part 2
SCCM 2019 Demo.pptx
Commissioning, Managing & Troubleshooting Industrial Networks
Network Management - IntroductionIntorduction to network management
network-management Web base.ppt
Basic Concepts and Types of Network Management
IT Best Practices for Community Colleges Part 3: Configuration Management 2010
Configuration management 101 - A tale of disaster recovery using CFEngine 3
Ad

More from ManageEngine, Zoho Corporation (20)

PPTX
Create seamless customer experiences
PDF
From web interface to database: Monitor what matters
PDF
NetFlow Analyzer Free Training Series Part I - May 2020
PDF
Overcome real-time server and VM monitoring challenges
PPTX
Modernizing Cloud and Hyperconverged Infrastructure monitoring
PPTX
Deliver seamless digital experience
PDF
Free NetFlow Analyzer training Season 1 Part 2 - Feb 2020
PPTX
From web interface to the database:Monitor all that matters
PDF
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - EST
PDF
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - GMT
PDF
NetFlow Analyzer Product Overview
PPTX
Monitoring cloud applications and hyperconverged infrastructure
PPTX
Building the right website monitoring strategy
PPTX
Unlock the value of your big data infrastructure
PPTX
Key to optimal end user experience
PPTX
Monitoring cloud applications and containers
PPTX
implementing the right website monitoring strategy
PPTX
Big data and non relational database
PPTX
Visibility-from web application interface to the database
PPTX
Free OpManager training Part 4 - Monitoring Network Performance and Network Maps
Create seamless customer experiences
From web interface to database: Monitor what matters
NetFlow Analyzer Free Training Series Part I - May 2020
Overcome real-time server and VM monitoring challenges
Modernizing Cloud and Hyperconverged Infrastructure monitoring
Deliver seamless digital experience
Free NetFlow Analyzer training Season 1 Part 2 - Feb 2020
From web interface to the database:Monitor all that matters
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - EST
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - GMT
NetFlow Analyzer Product Overview
Monitoring cloud applications and hyperconverged infrastructure
Building the right website monitoring strategy
Unlock the value of your big data infrastructure
Key to optimal end user experience
Monitoring cloud applications and containers
implementing the right website monitoring strategy
Big data and non relational database
Visibility-from web application interface to the database
Free OpManager training Part 4 - Monitoring Network Performance and Network Maps

Recently uploaded (20)

PDF
Human Computer Interaction Miterm Lesson
PDF
A hybrid framework for wild animal classification using fine-tuned DenseNet12...
PDF
EIS-Webinar-Regulated-Industries-2025-08.pdf
PDF
zbrain.ai-Scope Key Metrics Configuration and Best Practices.pdf
PDF
Electrocardiogram sequences data analytics and classification using unsupervi...
PDF
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
PDF
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
PDF
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
PDF
substrate PowerPoint Presentation basic one
PDF
ment.tech-Siri Delay Opens AI Startup Opportunity in 2025.pdf
PDF
Advancing precision in air quality forecasting through machine learning integ...
PPTX
Presentation - Principles of Instructional Design.pptx
PDF
A symptom-driven medical diagnosis support model based on machine learning te...
PPTX
Build automations faster and more reliably with UiPath ScreenPlay
PPTX
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
PDF
Build Real-Time ML Apps with Python, Feast & NoSQL
PDF
Rapid Prototyping: A lecture on prototyping techniques for interface design
PDF
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
PDF
Altius execution marketplace concept.pdf
PDF
Early detection and classification of bone marrow changes in lumbar vertebrae...
Human Computer Interaction Miterm Lesson
A hybrid framework for wild animal classification using fine-tuned DenseNet12...
EIS-Webinar-Regulated-Industries-2025-08.pdf
zbrain.ai-Scope Key Metrics Configuration and Best Practices.pdf
Electrocardiogram sequences data analytics and classification using unsupervi...
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
substrate PowerPoint Presentation basic one
ment.tech-Siri Delay Opens AI Startup Opportunity in 2025.pdf
Advancing precision in air quality forecasting through machine learning integ...
Presentation - Principles of Instructional Design.pptx
A symptom-driven medical diagnosis support model based on machine learning te...
Build automations faster and more reliably with UiPath ScreenPlay
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
Build Real-Time ML Apps with Python, Feast & NoSQL
Rapid Prototyping: A lecture on prototyping techniques for interface design
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
Altius execution marketplace concept.pdf
Early detection and classification of bone marrow changes in lumbar vertebrae...

Overview and features of NCM

  • 2. Why do you need NCM? Network configuration Manager(NCM) is a tool that controls the entire life cycle of device configuration management by managing and changing configurations,compliances etc, in routers,switches,firewall and other network devices. The 5 magical words to keep your network devices under check: CONFIGURATION BACKUP CONFIGURATION CHANGE MANAGEMENT CONFIGLETS MANAGING COMPLIANCE REPORTS N C M
  • 3. Discovering and Adding devices in NCM Devices can be discovered in NCM using one of the three ways: Device Discovery,Manual Addition,Import file. DEVICE DISCOVERY: Devices can be discovered by giving the IP address of any networking device. Steps: 1.Go to settings-> Discovery,under discovery, Add the IP address and IP Range,then the Devices will be discovered. A CSV import file can also be used while discovering.
  • 4. Adding Devices and Applying Credentials It is mandatory to specify the snmp credentials for communication,in order to discover and add devices in the inventory.
  • 5. Manual Addition Another way of adding device is by clicking the Icon on the top right of inventory.This opens a box that requires the user to add a device. Give the necessary Hostname/IP address to add the device.
  • 6. Import File Devices can be added without giving credentials,by just knowing the device’s Host name/Ip Address and the device template name,Series and it’s model.The file containing this can be imported.
  • 7. Applying Credentials Now,let us apply credentials.Credentials can be applied By clicking on all the devices that needs to be configured after the devices get added to the Inventory.
  • 8. Start managing the network devices right after the device you discover gets added to the Inventory!
  • 10. WHY YOU NEED TO BACKUP? Backing up helps to: • Prevent Loss of data due to a disaster/Network outage • Prevent Starting a configuration from scratch • Compare two configurations Backup can be done in 3 ways: • Manual backups • Scheduled backups • Syslog based automatic backup The Backup status of every configuration is updated after every backup.
  • 11. Manual and Syslog based automatic backups Manual backup: Selecting the devices and backing up the devices manually. Syslog based automatic backup:When a user makes changes in a device configuration, syslog notifications are received for the actions performed and backup will be taken.
  • 12. Scheduled Backups • NCM offers scheduled backups,where one can set up a specific time to backup configurations • Hourly,daily,weekly,monthly scheduled backing up is possible • Automatically starts backing up at the given time and sends Email notifications
  • 13. Baseline Configuration A baseline version is the best among all configuration versions and 1.Can be used as a configuration after an unexpected network outage. 2.Can be used to compare with the latest configurations to see the changes made and to check for difference between the baseline and other configurations.
  • 15. REAL TIME CHANGE DETECTION(RTCD) Any change made in a configuration of any network device triggers automatic backup of that device by RTCD. BENEFITS: • Get notification on who made the change • Get Time and date of change • Immediate configuration back up after the changes are saved
  • 16. Working of “Enabling Change Detection” When “Enabling Change Detection” is given • NCM tracks it when a User logs in/logs out • Tracks the changes made and Takes a backup after the User logs out • Compares the backup with the current version and in the event of no change,backup gets discarded and when there is a change,a backup will be stored in Database. • Syslog messages are received for every action the user performs on the device
  • 17. COMPARING CONFIGURATIONS Comparison can be done between any type of configurations,any two devices(working and non-working) also. The image given below shows a comparison of all the changes made between a running and a startup configuration.
  • 18. ROLE-BASED ACCESS CONTROL (RBAC) NCM offers access to three types of users to prevent misusing of data • Administrator:Permission to access all devices/make changes • Rstricted admin(power user):Permission to access specific devices/make changes,cannot add or delete other devices. • Operator:Limited permission and should wait for approval from power user or the admin,to upload or make changes in the device. Editing and Uploading drafts:After the admin approves the change made by user,it gets uploaded and backups are taken but an admin can upload them directly.
  • 20. Configlets and its Uses Configlets are script templates that can be executed in multiple devices at one go. BENEFITS: • Configlets are available as templates and can be added manually in 3 modes-File transfer,script execution,Advanced script execution modes • Helps to fix malfunctioning devices at one go • Helps to execute sequence of commands in many devices at one go TEMPLATES:
  • 21. Manual Addition of Configlets FILE TRANSFER MODE The advantage of using file transfer mode is,it allows the user to upload the same configuration in many devices at one go.
  • 22. Script Execution Mode Helps in: • Executing basic trouble shooting commands • Changing passwords,banners • Enabling/Disabling SNMP Example:Selecting a particular network device and Executing it in script execution mode changes the password of all the devices associated.
  • 23. Advanced Script Execution Mode This mode is used when: 1.There is a change of prompt after command execution 2.A command requires a prompt user confirmation 3.There is a delay in response after command execution. Example:In the given example,the command will be executed after a particular prompt and the timeout is also set.
  • 24. Executing The Configlets • After modifying the configlets,they are executed by applying the configlets on the respective devices and execution results can be checked in the“execution history”. • After creating the configlets,they can be added to “snapshots” for easy access.
  • 26. Why is compliance necessary? Benefits: • They help to avoid vulnerabilities • Avoids loop holes in a network • Avoids legal consequences Default compliance policies: Cisco IoS policy,HIPAA,SOX,PCI.
  • 27. Custom Policies Custom policies can be added by: • Creating a custom rule • Grouping the custom rules to create a rule group • Grouping rule groups to create policies Custom rule is added based on 3 criteria: • Simple criteria • Advanced criteria • Advanced custom criteria
  • 28. Simple Criteria with an Example Uses of simple Criteria: • Checking for any line in a configuration • Should/Should not contain exact set • The number of times the line has to appear Example:In the given example the word “Public” is checked .
  • 29. Advanced Criteria with an Example This is used to check for a particular line,in a configuration using complex Regular expressions. Supports: • AND/OR • Patterns Example:Pattern Search is implemented.
  • 30. Advanced Custom Criteria with an Example This is used when you want to run a compliance check in particular sections of the configuration file.Along with the features of Advanced Criteria it also supports: 1.Block criteria(specifies the beginning and ending of the block) 2.Additional block criteria Example:In this example,we are defining the blocks for NCM to run the compliance check only on the interfaces that are not “shut down”
  • 31. Remediation Template Remediation Templates are used when a particular rule is violated during Compliance check.In case of violation,remediation templates are used to fix the issue. Eg:While checking for “public” in snmp,if it finds a word “public” in any configuration,this remediation template can be used to fix.
  • 32. Creating Rule groups and Policies The custom rules are grouped into rule groups which are in turn grouped into policies.These policies can now be associated with the selected Network devices.
  • 33. Compliance Reports Once you associate the policies to the devices,you can generate reports on how compliant the devices are using compliance reports.You can also check the violated policies and the compliant devices.
  • 35. NCM Reports NCM generates reports for many operations.Some important reports are: 1.Configuration ChangesReport 2.Configuration Change Trend 3.EOL/EOS Report 4.Compliance Report 5.Configuration Analysis Report 6.Security Audit Report
  • 36. Detailed Reports NCM generates detailed reports in Pdf format. Eg:Device Management status Report
  • 37. Scheduling in NCM • Scheduling can be done for all operations in NCM. • Devices to be scheduled are added,Schedule time is specified. • Notifications are turned on for that Schedule.
  • 38. Dashboard and Inventory Dashboard in NCM displays the status of your Network,Inventory consists of the configuration files in a hierarchical order.
  • 39. Settings in NCM Settings consists of Basic,discovery and NCM settings and majority of operations are performed through this.
  • 40. Alarms NCM sends an alarm when an operational activity gets violated.
  • 41. Benefits of NCM User Friendly! NCM is a user friendly GUI, it makes the configuration change management simple and easy with intuitive dials and graphs.
  • 42. Simple installation and usage! NCM is easy to install and it manages the devices right away.
  • 43. Transparent Pricing! NCM comes at an affordable and transparent pricing based on the number of devices to be managed.
  • 44. 24x5 Technical Support! NCM offers 24x5 technical support, making it easier for customers to gain the maximum use of the product.
  • 45. A Complete Package! It effectively manages many network devices thus paving way to an efficient working platform and offers Complete satisfaction to the clients.