Reviews (1-25 of 97)
1. Back up configurations.
2. Check that they meet our security requirements.
3. Make sure no one has made unauthorized changes.
- Works with a variety of vendor products.
- Allows us to tailor the config comparisons.
- SolarWinds completely broke the baseline function. It no longer meets our needs.
- Can no longer baseline an entire network in one step.
- Configuration Standardization
- Quick and Mass Configuration Changes
- A better implementation of using variables in jobs would be awesome.
- Being able to take the output of a command and feed it into a second command.
- DOT has devices all over the state with no easy way to back up the device configuration. NCM allows us to perform those tasks.
- I am still learning the product, so some of the issues may be due to not fully understanding the product functionality.
- At-a-glance overview of hosts alongside performance metrics.
- Allows for granular details of a host down to a service process if needed.
- Allows for backup of config files for the host.
- Great support from SolarWinds.
- I wish the navigation was a lot quicker. Once the database of SolarWinds gets used, it slows down a lot. Loading and navigation are frustrating.
- The wizard to set up a host is too complicated. There's so much to choose from, and it's not easy to set one up.
- Most of the time when setting up a host to monitor, you need support to be on the phone.
SolarWinds is not an exact time monitoring product. It gives you a window for reporting and a view for performance, but it is not in real-time. You will have to look at the host for real-time. In addition to using SolarWinds, we have also used vCenter to set up rules for CPU, Disks, Memory, and Bandwidth usage. The reports from vCenter are more accurate to real time.
I would recommend SolarWinds if you are looking to save time in monitoring a lot of nodes. You get email reports when each node reaches a spike so you can act on it. The support is awesome. They are extremely helpful.
- Change identification
- Visibility to authorized users
- Licensing. Bought a 500 node license to manage a US only deployment. However that 500 node/device license only allows 500 ports/items to be monitored. That seems a bit restricted. I understand you need to make money but if I want to buy 500 nodes, at least allow me to monitor 5x ports, etc.
- Expensive remote worker servers. I already paid for an unlimited deployment, let me have the remote servers so performance statistics are measured close to the source. We have 80+ global locations but we have to measure everything from our data center server. Not useful to our remote site technicians trying to measure or monitor local performance.
- Making backups of our networking equipment.
- Takes backups on a daily basis and retains those backups. Both the frequency and retention can be customized to our needs.
- It automated backups on a daily basis, I don't need to worry when I make changes to my equipment as I know all my changes are being backed up.
- If it would notify be when backups stop working on a node. I have encountered looking at NCM and discovered that backups were not being taken for weeks or months on a switch and I had no notification that this was the case.
- Centralized custom package deployment
- Builds on WSUS' capabilities
- Improves WSUS' limitations
- The time it takes to do inventory patches is a little much.
- The amount of system resources required is a little much.
- Device inventory setup isn't very intuitive
1. If you have a large multi-site IT infrastructure deployment, Solarwinds Patch Manager is great for centralized update management and takes a lot of the headache out of the process.
2. If you deploy a lot of custom-developed app packages, Patch Manager can push them out.
1. If your infrastructure is smaller, it's not worth the cost.
- Stores historical configuration information.
- The compliance checking allows us to ensure our configurations are standard across the board.
- It allows us to easily automate and schedule configuration changes across our environment.
- The configuration comparison tool is just clunky. I ended up using the compliance tools instead because the comparison tool became easily confused when the configurations weren't identical. No two switches are alike in terms of ports or configured networks.
- The concept of GROUPS is disconnected from the settings other tools use to manage groups of switches. Groups and departments should not be separate.
- Some screens can multi-select nodes conveniently and some look as if they were created by an entirely different group because they do not use the same metaphor. If you have multi-select for nodes when applying something, it should be the same screen universally.
- Script management. The ability to save scripts & script results in this tool is a great.
- Change management. The feature to compare old and new configurations which gives us a good graphical glimpse of what changed with respect to configurations.
- This tool comes really handy if an engineer wants to SWARM config. changes.
- Configuration comparison.
- Configuration display.
- Color coding change comparison.
- Pings IPS
- Records when links go down
- Custom node properties so you can create your own due to the serious lack of premade ones by SolarWinds
- Their Support team is slow and usually tries to close a case multiple times before actually looking into it.
- The system can be given well beyond recommended resources and still crashes constantly and needs services restarted. Support is never able to find a cause
- It's one of the more expensive solutions out there and I feel you do not get your money worth.
- They have a legacy report builder that runs on the main polling server as well as a built-in report builder as part of the interface. Both builders can do things the other cannot so you cannot live in one environment and as it turns out the reports give false numbers which can lead you to mislead clients.
- Configuration Comparison Tool is great since you can quickly compare configs in a single pane of glass. To make things easier to identify, NCM will highlight the differences.
- Vulnerability reporting on all current versions of Cisco IOS/NXOS software. NCM will identify the version of firmware you are using and also list the most well known CVE vulnerabilities that are associated with each version.
- I appreciate NCM is vendor agnostic. It will consume configs from any network device. It can also be customized to look for certain strings that are missing or to look for certain strings that are present. Very flexible and since it isn't vendor specific, I don't feel like I'm being forced to buy a certain manufacturer to obtain all of the 'features' like I do with other products.
- Improve the visibility into other popular platforms beside Cisco. It does seem to be Cisco leaning just a little.
- Baseline management is a little clunky. I'd like to see it made just a little more user friendly. For example, when writing the baseline configuration, identifying lines that you want to ignore can be very cumbersome.
- Perform daily configuration backups.
- Perform massive wide configuration changes.
- Backup configurations
- Organize devices
- Maps could use some improvement. Make it easier to document the network and view status.
- Scripting is another area where it can improve. Maybe have a UI with drag and drop.
- Automatic IOS config backups.
- Bulk IOS changes for adds/subtracts in a Cisco environment.
- Peace of mind that you have a good config in equipment failures.
- We always have speed issues, not sure if that is out issue or it is a SolarWinds interface issue.
- Stores historical configuration information.
- Easy to use across our entire corporation.
- Allows automation of configuration changes and standardization.
- It requires a lot of configuration which can be time-consuming.
- Deployment of firmware updates or other config upgrades for one or more devices
- Network device configuration and audit through automation, backup and policy management
- Integration with SolarWinds NPM that helps in detecting faults proactively as well as correcting configuration errors, if any
- Integration with a single sign-on solution
- Ability to store data in various formats
SolarWinds Network Configuration Manager Scorecard Summary
About SolarWinds Network Configuration Manager
Network Configuration Manager enables IT Pros with:
- Out-of-the-box support for major network device vendors, including Cisco®, Juniper®, HP®, Huawei®, F5®, Avaya®, Ruckus®, and more.
- Automated bulk deployment of standardized device configs.
- Automatic backups of device configurations, and rollback to the last-known good configurations, if necessary.
- Identifying IOS® devices with potential vulnerabilities, utilizing the NIST CVE repository service, and even provides the tools to manage the investigation, remediation, or waiver of each vulnerability.
- Auditing device configs for NIST FISMA, DISA STIG, and DSS PCI compliance.
- Built on the Orion® Platform, NCM provides the ability to purchase and fully integrate with additional network monitoring modules (network performance monitoring, NetFlow traffic analysis, WAN management, VoIP, device tracking, and IP address management), as well as systems, storage, and virtualization management, all in a single web console.
SolarWinds Network Configuration Manager Screenshots
SolarWinds Network Configuration Manager Video
SolarWinds Network Configuration Manager Downloadables
SolarWinds Network Configuration Manager Integrations
SolarWinds Network Configuration Manager Competitors
- Has featureFree Trial Available?Yes
- Does not have featureFree or Freemium Version Available?No
- Does not have featurePremium Consulting/Integration Services Available?No
- Entry-level set up fee?Optional
SolarWinds Network Configuration Manager Support Options
|Free Version||Paid Version|
|Video Tutorials / Webinar|
SolarWinds Network Configuration Manager Technical Details
|Operating Systems:||Windows, Windows Server|