Documentation forNetwork Configuration Manager

Network Configuration Manager 2019.4 Release Notes

Release date: November 5, 2019

These release notes describe the new features, improvements, and fixed issues in Network Configuration Manager 2019.4. They also provide information about upgrades and describe workarounds for known issues.

Learn more: 

New features and improvements in NCM

Return to top

NCM 2019.4 offers new features and improvements compared to previous releases of NCM.

Policies pushed from Panorama

The Policies and Policy Details views for Palo Alto devices now display information about policies pushed from the Panorama management server.

NCM 2019.4 also identifies the source of a configuration file. Policies pushed from Panorama are classified as either 'Pre Policy (Panorama)' or 'Post Policy (Panorama)'. Policies that are not pushed from Panorama are classified as 'Local'.

New firmware upgrade template setting

Firmware upgrade templates can now specify a delay between a device rebooting and NCM checking that it is up. If you select the Reboot device after upgrade option, the following new setting is available:

Wait time between reboot and checking that the node is "Up"

This setting can prevent errors for devices that have multiple up/down sequences after they reboot.

Added support for EtherWAN devices

NCM now provides the following support for EtherWAN devices:

  • 1 device template (called EtherWAN)
  • 1 firmware upgrade template
  • 11 config change templates

The config change templates are described below:

Name Description
Change Enable Password - EtherWAN Changes the enable password on EtherWAN devices.
Change NTP Settings - EtherWAN Changes NTP settings on EtherWAN devices.
Change SNMP Community Strings - EtherWAN Changes SNMP community strings (get/set) on EtherWAN devices.
Change System Name - EtherWAN Changes the system name on EtherWAN devices.
Change VLAN membership on ports - EtherWAN Assigns ports to VLANs on EtherWAN devices.
Configure interface IP (manual) - EtherWAN

Changes the IP address of an interface on an EtherWAN device. To specify the interface, the user manually enters the interface name. Use this template to assign the IP address without launching a network inventory job during the process.

Configure interface IP - EtherWAN Changes the IP address of an interface on an EtherWAN device. To specify the interface, the user selects the interface name from a list, which is built with a network inventory job.
Configure VLAN - EtherWAN Configures a VLAN and assigns the VLAN name on EtherWAN devices.
Enable/Disable LLDP - EtherWAN Enables or disables LLDP on EtherWAN devices.
Enable/Disable NTP - EtherWAN Enables or disables NTP on EtherWAN devices.
Enable/Disable RSTP - EtherWAN Enables or disables RSTP on EtherWAN devices.

Added support for Lenovo Campus NOS devices

NCM now provides the following support for Lenovo Campus NOS devices:

  • 1 device template (called Lenovo Campus NOS)
  • 1 firmware upgrade template
  • 6 config change templates

The config change templates are described below:

Name Description
Change Enable Password - Lenovo Campus NOS Changes the enable password on Lenovo Campus NOS devices.
Change SNMP Community Strings - Lenovo Campus NOS Changes SNMP community strings (Read-Only/Read-Write/Super user) on Lenovo Campus NOS devices.
Change System Name - Lenovo Campus NOS Changes the system name on Lenovo Campus NOS devices.
Change VLAN membership on ports - Lenovo Campus NOS Assigns ports to VLANs on Lenovo Campus NOS devices.
Configure interface IP - Lenovo Campus NOS Changes the IP address of the selected interface on Lenovo Campus NOS devices.
Configure VLAN - Lenovo Campus NOS

Configures a VLAN and assigns the VLAN name on Lenovo Campus NOS devices.

New device template for F5 BIG-IP devices

NCM 2019.4 includes a new device template that supports all F5 BIG-IP devices, including those with an OS of 12.0 and later. The name of the new device template is F5 Big IP 12 and newer. By default, automatic assignment is enabled for this template.

The previous template, named F5 Big IP, is still available, but automatic assignment is now disabled by default for this template. When you upgrade:

  • F5 BIG-IP devices that are set to use Auto Determine to find a device template will use the new F5 Big IP 12 and newer template.
  • F5 BIG-IP devices that are manually assigned to the previous F5 Big IP template will continue to use that template.

SolarWinds encourages all users to begin using the new F5 Big IP 12 and newer template for their F5 BIG-IP devices by either selecting Auto Determine or manually assigning the new template.

New version numbering for NCM and other Orion Platform products

Version numbering is now consistent across all Orion Platform products. For more information, see the THWACK post What’s in a version number.

Other improvements

  • Web performance enhancements improve the load time for NCM views in the Orion Platform.
  • Information about NCM macros (also called variables) is available in the NCM admin guide.

New features and improvements in Orion Platform

Return to top

For information about new features in Orion Platform 2019.4, go to the Orion Platform 2019.4 Release Notes.


New customer installation

Return to top

For information about installing Network Configuration Manager, see the SolarWinds Orion Installer.

Before you upgrade!

If you are upgrading from a previous version, be aware of the following:

How to upgrade

Use the SolarWinds Orion Installer to upgrade your entire Orion deployment (all Orion Platform products and any scalability engines).

If you are upgrading from NCM 8.0, you can upgrade your entire Orion deployment from the My Orion Deployment page. Downloading the Orion Installer is no longer necessary.


Fixed issues in NCM 2019.4

Return to top

NCM 2019.4 fixes the following issues.

Case Number Description

00329375
00345587

During an NCM upgrade, the Configuration Wizard no longer fails with error messages about tables or indexes, such as:

An explicit DROP INDEX is not allowed on index

00337962
00351989
00343837

Attempting to identify firmware vulnerabilities for Juniper devices no longer fails with an error message.

00308660

Downloading a configuration file from a Cisco ASA with FirePOWER Services device (such as Cisco ASA 5508-X) no longer fails with the following error:

Unknown access list type 'advanced'

00331035

When a database maintenance job runs and fails, NCM no longer displays inaccurate Licensing Expired messages.

00313104

A security issue in the SWQL SDK has been fixed.

00303244

The Interface Config widget no longer displays incomplete interface configurations in some cases.

00291349
00265798

NCM inventory jobs no longer fail when the Orion Platform is configured to use Windows authentication and NCM connects to devices with user level authentication.

00258916

Executing a large number of remediation scripts no longer causes additional polling engines to stop communicating with the main polling engine.

00242792

The config archive folder is no longer deleted if you run the 'Default database and archive maintenance job' twice and select the 'Purge configs from the config archive folder older than' option.

00057858

Using a single group limitation no longer causes the policy violations report to be blank.


Fixed issues in Orion Platform 2019.4

Return to top

See the Orion Platform 2019.4 Release Notes.


Known issues

Return to top

Firmware vulnerability data
Issue: As of October 9, 2019, the National Institute of Standards and Technology (NIST) no longer provides firmware vulnerability data in XML format. Because of this change, NCM 2019.4 and earlier can no longer process and display the most recent firmware vulnerability data from NIST.

Resolution/Work-around: Install NCM 2019.4 Hotfix 1 to process and display current firmware vulnerability data. This Hotfix enables NCM to process firmware vulnerability data provided in JSON format.

 

NCM does not show current information about overlapping ACL rules after an upgrade
Issue: After you upgrade from NCM 7.9 or earlier to NCM 8.0 or later, NCM does not display current information about shadowed or redundant access control list (ACL) rules. Older information is displayed.
Resolution/Work-around: Download the configuration files from your Cisco ASA and Nexus devices. After you download the config files, NCM displays current information about shadowed and redundant ACL rules.

 

NCM does not show current End of Sale (EOS) and End of Life (EOL) information
Issue: Because of a change in Cisco's EOS and EOL RSS feed, NCM is not able to collect current EOS and EOL dates for Cisco devices.
Resolution/Work-around: This functionality will be restored in a future version of NCM.

End of life

Return to top

Version EoL Annoucement EoE Effective Date EoL Effective Date
NCM 7.6

December 4, 2018

End-of-Life Announcement. Customers should begin transitioning from NCM 7.6 to the latest version.

March 4, 2019

End-of-Engineering. Service releases, bug fixes, workarounds, and service packs for NCM 7.6 and earlier will no longer be actively supported by SolarWinds.

March 4, 2020

End-of-Life. SolarWinds will no longer provide technical support for NCM 7.6 and earlier.

NCM 7.7

June 6, 2019

End-of-Life Announcement. Customers should begin transitioning from NCM 7.7 to the latest version.

September 6, 2019

End-of-Engineering. Service releases, bug fixes, workarounds, and service packs for NCM 7.7 and earlier will no longer be actively supported by SolarWinds.

September 6, 2020

End-of-Life. SolarWinds will no longer provide technical support for NCM 7.7 and earlier.

See the End of Life Policy for information about SolarWinds product phases. For supported versions and EoL announcements for all SolarWinds products, see Currently supported software versions.


Legal notices

Return to top

© 2020 SolarWinds Worldwide, LLC. All rights reserved.

This document may not be reproduced by any means nor modified, decompiled, disassembled, published or distributed, in whole or in part, or translated to any electronic medium or other means without the prior written consent of SolarWinds. All right, title, and interest in and to the software, services, and documentation are and shall remain the exclusive property of SolarWinds, its affiliates, and/or its respective licensors.

SOLARWINDS DISCLAIMS ALL WARRANTIES, CONDITIONS, OR OTHER TERMS, EXPRESS OR IMPLIED, STATUTORY OR OTHERWISE, ON THE DOCUMENTATION, INCLUDING WITHOUT LIMITATION NONINFRINGEMENT, ACCURACY, COMPLETENESS, OR USEFULNESS OF ANY INFORMATION CONTAINED HEREIN. IN NO EVENT SHALL SOLARWINDS, ITS SUPPLIERS, NOR ITS LICENSORS BE LIABLE FOR ANY DAMAGES, WHETHER ARISING IN TORT, CONTRACT OR ANY OTHER LEGAL THEORY, EVEN IF SOLARWINDS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

The SolarWinds, SolarWinds & Design, Orion, and THWACK trademarks are the exclusive property of SolarWinds Worldwide, LLC or its affiliates, are registered with the U.S. Patent and Trademark Office, and may be registered or pending registration in other countries. All other SolarWinds trademarks, service marks, and logos may be common law marks or are registered or pending registration. All other trademarks mentioned herein are used for identification purposes only and are trademarks of (and may be registered trademarks) of their respective companies.