Network Configuration Manager 2019.4 Release Notes
Release date: November 5, 2019
These release notes describe the new features, improvements, and fixed issues in Network Configuration Manager 2019.4. They also provide information about upgrades and describe workarounds for known issues.
- For information about NCM hotfixes, see NCM hotfixes.
- If you are looking for previous release notes for NCM, see Previous Version documentation.
- For information about requirements, see NCM 2019.4 system requirements.
New features and improvements in NCM
NCM 2019.4 offers new features and improvements compared to previous releases of NCM.
Policies pushed from Panorama
The Policies and Policy Details views for Palo Alto devices now display information about policies pushed from the Panorama management server.
NCM 2019.4 also identifies the source of a configuration file. Policies pushed from Panorama are classified as either 'Pre Policy (Panorama)' or 'Post Policy (Panorama)'. Policies that are not pushed from Panorama are classified as 'Local'.
New firmware upgrade template setting
Firmware upgrade templates can now specify a delay between a device rebooting and NCM checking that it is up. If you select the
Reboot device after upgrade option, the following new setting is available:
Wait time between reboot and checking that the node is "Up"
This setting can prevent errors for devices that have multiple up/down sequences after they reboot.
Added support for EtherWAN devices
NCM now provides the following support for EtherWAN devices:
- 1 device template (called EtherWAN)
- 1 firmware upgrade template
- 11 config change templates
The config change templates are described below:
|Change Enable Password - EtherWAN||Changes the enable password on EtherWAN devices.|
|Change NTP Settings - EtherWAN||Changes NTP settings on EtherWAN devices.|
|Change SNMP Community Strings - EtherWAN||Changes SNMP community strings (get/set) on EtherWAN devices.|
|Change System Name - EtherWAN||Changes the system name on EtherWAN devices.|
|Change VLAN membership on ports - EtherWAN||Assigns ports to VLANs on EtherWAN devices.|
|Configure interface IP (manual) - EtherWAN||
Changes the IP address of an interface on an EtherWAN device. To specify the interface, the user manually enters the interface name. Use this template to assign the IP address without launching a network inventory job during the process.
|Configure interface IP - EtherWAN||Changes the IP address of an interface on an EtherWAN device. To specify the interface, the user selects the interface name from a list, which is built with a network inventory job.|
|Configure VLAN - EtherWAN||Configures a VLAN and assigns the VLAN name on EtherWAN devices.|
|Enable/Disable LLDP - EtherWAN||Enables or disables LLDP on EtherWAN devices.|
|Enable/Disable NTP - EtherWAN||Enables or disables NTP on EtherWAN devices.|
|Enable/Disable RSTP - EtherWAN||Enables or disables RSTP on EtherWAN devices.|
Added support for Lenovo Campus NOS devices
NCM now provides the following support for Lenovo Campus NOS devices:
- 1 device template (called Lenovo Campus NOS)
- 1 firmware upgrade template
- 6 config change templates
The config change templates are described below:
|Change Enable Password - Lenovo Campus NOS||Changes the enable password on Lenovo Campus NOS devices.|
|Change SNMP Community Strings - Lenovo Campus NOS||Changes SNMP community strings (Read-Only/Read-Write/Super user) on Lenovo Campus NOS devices.|
|Change System Name - Lenovo Campus NOS||Changes the system name on Lenovo Campus NOS devices.|
|Change VLAN membership on ports - Lenovo Campus NOS||Assigns ports to VLANs on Lenovo Campus NOS devices.|
|Configure interface IP - Lenovo Campus NOS||Changes the IP address of the selected interface on Lenovo Campus NOS devices.|
|Configure VLAN - Lenovo Campus NOS||
Configures a VLAN and assigns the VLAN name on Lenovo Campus NOS devices.
New device template for F5 BIG-IP devices
NCM 2019.4 includes a new device template that supports all F5 BIG-IP devices, including those with an OS of 12.0 and later. The name of the new device template is
F5 Big IP 12 and newer. By default, automatic assignment is enabled for this template.
The previous template, named
F5 Big IP, is still available, but automatic assignment is now disabled by default for this template. When you upgrade:
- F5 BIG-IP devices that are set to use Auto Determine to find a device template will use the new
F5 Big IP 12 and newertemplate.
- F5 BIG-IP devices that are manually assigned to the previous
F5 Big IPtemplate will continue to use that template.
SolarWinds encourages all users to begin using the new
F5 Big IP 12 and newer template for their F5 BIG-IP devices by either selecting Auto Determine or manually assigning the new template.
New version numbering for NCM and other Orion Platform products
Version numbering is now consistent across all Orion Platform products. For more information, see the THWACK post What’s in a version number.
- Web performance enhancements improve the load time for NCM views in the Orion Platform.
- Information about NCM macros (also called variables) is available in the NCM admin guide.
New features and improvements in Orion Platform
For information about new features in Orion Platform 2019.4, go to the Orion Platform 2019.4 Release Notes.
New customer installation
For information about installing Network Configuration Manager, see the SolarWinds Orion Installer.
Before you upgrade!
If you are upgrading from a previous version, be aware of the following:
In previous versions, any double-byte characters in configuration files were truncated when the configuration file was downloaded to NCM. In NCM 2019.4, double-byte characters are no longer truncated.
After you upgrade to 2019.4, the first time a configuration file containing double-byte characters is downloaded, NCM will report a change from the previous version because the double-byte characters are no longer truncated.
If your system meets the specifications, you have the option of replacing legacy Syslog & Traps with Log Viewer. This upgrade includes an evaluation of Log Analyzer. For more information, see:
How to upgrade
Use the SolarWinds Orion Installer to upgrade your entire Orion deployment (all Orion Platform products and any scalability engines).
If you are upgrading from NCM 8.0, you can upgrade your entire Orion deployment from the My Orion Deployment page. Downloading the Orion Installer is no longer necessary.
Fixed issues in NCM 2019.4
NCM 2019.4 fixes the following issues.
During an NCM upgrade, the Configuration Wizard no longer fails with error messages about tables or indexes, such as:
Attempting to identify firmware vulnerabilities for Juniper devices no longer fails with an error message.
Downloading a configuration file from a Cisco ASA with FirePOWER Services device (such as Cisco ASA 5508-X) no longer fails with the following error:
When a database maintenance job runs and fails, NCM no longer displays inaccurate
A security issue in the SWQL SDK has been fixed.
The Interface Config widget no longer displays incomplete interface configurations in some cases.
NCM inventory jobs no longer fail when the Orion Platform is configured to use Windows authentication and NCM connects to devices with user level authentication.
Executing a large number of remediation scripts no longer causes additional polling engines to stop communicating with the main polling engine.
The config archive folder is no longer deleted if you run the 'Default database and archive maintenance job' twice and select the 'Purge configs from the config archive folder older than' option.
Using a single group limitation no longer causes the policy violations report to be blank.
Fixed issues in Orion Platform 2019.4
See the Orion Platform 2019.4 Release Notes.
|Firmware vulnerability data|
|Issue: As of October 9, 2019, the National Institute of Standards and Technology (NIST) no longer provides firmware vulnerability data in XML format. Because of this change, NCM 2019.4 and earlier can no longer process and display the most recent firmware vulnerability data from NIST.|
Resolution/Work-around: Install NCM 2019.4 Hotfix 1 to process and display current firmware vulnerability data. This Hotfix enables NCM to process firmware vulnerability data provided in JSON format.
|NCM does not show current information about overlapping ACL rules after an upgrade|
|Issue: After you upgrade from NCM 7.9 or earlier to NCM 8.0 or later, NCM does not display current information about shadowed or redundant access control list (ACL) rules. Older information is displayed.|
|Resolution/Work-around: Download the configuration files from your Cisco ASA and Nexus devices. After you download the config files, NCM displays current information about shadowed and redundant ACL rules.|
|NCM does not show current End of Sale (EOS) and End of Life (EOL) information|
|Issue: Because of a change in Cisco's EOS and EOL RSS feed, NCM is not able to collect current EOS and EOL dates for Cisco devices.|
|Resolution/Work-around: This functionality will be restored in a future version of NCM.|
End of life
|Version||EoL Annoucement||EoE Effective Date||EoL Effective Date|
December 4, 2018
End-of-Life Announcement. Customers should begin transitioning from NCM 7.6 to the latest version.
March 4, 2019
End-of-Engineering. Service releases, bug fixes, workarounds, and service packs for NCM 7.6 and earlier will no longer be actively supported by SolarWinds.
March 4, 2020
End-of-Life. SolarWinds will no longer provide technical support for NCM 7.6 and earlier.
June 6, 2019
End-of-Life Announcement. Customers should begin transitioning from NCM 7.7 to the latest version.
September 6, 2019
End-of-Engineering. Service releases, bug fixes, workarounds, and service packs for NCM 7.7 and earlier will no longer be actively supported by SolarWinds.
September 6, 2020
End-of-Life. SolarWinds will no longer provide technical support for NCM 7.7 and earlier.
© 2020 SolarWinds Worldwide, LLC. All rights reserved.
This document may not be reproduced by any means nor modified, decompiled, disassembled, published or distributed, in whole or in part, or translated to any electronic medium or other means without the prior written consent of SolarWinds. All right, title, and interest in and to the software, services, and documentation are and shall remain the exclusive property of SolarWinds, its affiliates, and/or its respective licensors.
SOLARWINDS DISCLAIMS ALL WARRANTIES, CONDITIONS, OR OTHER TERMS, EXPRESS OR IMPLIED, STATUTORY OR OTHERWISE, ON THE DOCUMENTATION, INCLUDING WITHOUT LIMITATION NONINFRINGEMENT, ACCURACY, COMPLETENESS, OR USEFULNESS OF ANY INFORMATION CONTAINED HEREIN. IN NO EVENT SHALL SOLARWINDS, ITS SUPPLIERS, NOR ITS LICENSORS BE LIABLE FOR ANY DAMAGES, WHETHER ARISING IN TORT, CONTRACT OR ANY OTHER LEGAL THEORY, EVEN IF SOLARWINDS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
The SolarWinds, SolarWinds & Design, Orion, and THWACK trademarks are the exclusive property of SolarWinds Worldwide, LLC or its affiliates, are registered with the U.S. Patent and Trademark Office, and may be registered or pending registration in other countries. All other SolarWinds trademarks, service marks, and logos may be common law marks or are registered or pending registration. All other trademarks mentioned herein are used for identification purposes only and are trademarks of (and may be registered trademarks) of their respective companies.