Cisco Network Interface ARP information
Hi Community, wanted to check if anyone had already build something in this direction or to get some additional guidance on how to best realize this. Our company is currently in the process of implementing LogicMonitor to monitor our Network equipment - we already on-boarded all of our network devices and started to grant access to additional groups. We´ve been asked now if there is a way to showthe MAC and IP-address currently been connected to a switch port. Doesnt really matter where we would display that data but having them per switch would be the goal. The data doesnt need to be live a snapshot per day would be good enough.We are Cisco shop and unfortunately i havent figured out an easy way to do this. One challenge is that the IP information are not available on L2 Switches - granted we are able to pull in Port and MAC address information into LM, is there a way to identify the next Core/Distro (L3) Switch to pull the IP address information and add them to the existing information? This would probably require some advanced scripting running comands in the CLI while exporting and merging the results. Also for the pulling of information for the Interface and MAC address i am currently struggling. Is it easier to create a ConfigSource which would display differences and we would try to adjust the existing iOS config pulls to run with the required comands to show MAC and port or try to achieve via Datasource and SNMP. Eitherway it seems we would need to format the MAC output fromCisco to Windows format (dot to colon/dash notation). Anyone out there with similar challenges who might´ve figured it out maybe even partially? Every idea and input is appreciated.174Views12likes2CommentsCisco Umbrella Virtual Appliance Datasource and Proprtysource
Update: I jumped the gun…they aren’t out of security review yet…will update once they are... I have shared a datasource and propertysource I’ve created for monitoring the health of Cisco Umbrella Virtual Appliances in my environment. Thought they could help out other that might be using them as well.135Views11likes4CommentsBGP Neighbor Monitoring in Multi-VRF environment
The core DataSource “BGP-” uses the BGP4-MIB to discover and monitor BGP neighbors on a device. This MIB doesn’t account for VRFs or address families. Does anybody use some advanced DataSources to monitor BGP neighbor state information which considers different VRFs? My use case is: We have some routers with multiple VRFs with overlapping IP subnets (which is obviously the major point of having VRFs...). Hence we do have multiple neighbors with the same neighbor IP within different VRFs. The BGP- DataSource just discovers one neighbor per IP, although there are multiple. I’d like to have a separate instance for each neighbor.556Views8likes4CommentsBGP Description
The Datasource BGP- shows per BGP instance a Description based on snmp OID 1.3.6.1.2.1.15.3.1.1 which is the bgp peer identifier. That is not the actual description that's configured in the switch. Here is an example ofBGP configurations. address-family ipv4 vrf t01-WAN bgp router-id 11.226.11.2 network 10.251.0.0 mask 255.255.255.0 network 10.251.1.0 mask 255.255.255.0 network 10.251.2.0 mask 255.255.255.0 neighbor 10.228.3.53 remote-as 65500 neighbor 10.228.3.53 description t01 wan koppeling naar rack z1.3.23 neighbor 10.228.3.53 password *********** neighbor 10.228.3.53 activate neighbor 10.228.3.53 soft-reconfiguration inbound neighbor 10.228.3.53 prefix-list t01-WAN-IP-BLOKKEN out neighbor 10.228.3.53 maximum-prefix 200 50 exit-address-family address-family ipv4 vrf a07-GTT-sip bgp router-id 11.226.11.2 network 10.100.128.16 mask 255.255.255.240 neighbor 10.100.128.1 remote-as 65135 neighbor 10.100.128.1 description a07 gtt euro fiber neighbor 10.100.128.1 password ********* neighbor 10.100.128.1 activate neighbor 10.100.128.1 send-community neighbor 10.100.128.1 prefix-list a07-TO-GTT out exit-address-family A snmpwalk on SNMP OID 1.3.6.1.2.1.15.3 doesn't show the neighbor description. How can we get the bgp neighbor description into the LogicMonitor BGP instance description ?116Views6likes1CommentPlease add Firepower Device Manager support
Reviewing the modules available, I see SNMP and FMC API support, but there is REST API support for FDM (local version of FMC) and this does not appear to be supported (to be fair, I have not tried pretending it is as all the modules specifically mention CiscoFMC and nothing about FDM). Missing FDM support restricts visibility to some areas, such as environmental monitoring. Please review and update the modules to allow for FDM REST API to work. Hopefully it is not a significant change to the existing CiscoFMC modules…. While I am at it, good to point out that setting up SNMP for the FTD is especially challenging and it would be helpful to users for LM to document the process. If anyone from the docs team wants input please have them contact me.39Views4likes0CommentsMonitoring Intersight managed Cisco UCS (help)
We’ve been monitoring ourCisco UCSfabric interconnects and blade serversvia the traditional “Cisco UCS Monitoring” that targets UCSM (UCS Manager) directly. We’re in the process of movingtoCisco Intersight(which replacesUCS Central). TheIntersightmodules arelimited strictly to monitoringlicensing, advisory alerts, and HyperFlex Clusters. This is leaving me unclear as tohowwe could go about achieving parity visibility in to ournew Fabric Interconnects and blades since there is no UCS Manager API to target when using Intersight. Has anyone else successfully managed this yet (and if so what’s the trick)?132Views3likes0CommentsUsing CUCM CDR Data for Reviewing Call History
I’m new to LogicMonitor and am looking to see if there’s a way to get a table of call history. We have CUCM sending over the CDR data and it looks like some of it is being pulled in, but I don’t see where I could generate a table with who made a call, who received it, the call duration, and timestamp at minimum.237Views3likes15CommentsMeraki MX SD-WAN monitoring
For those who add their Meraki MX devices as LM Envision Resources, we’ve developed and are actively testing modules for: Security Appliance Performance (including Performance Score) Security Appliance Health (including HA status) Security Appliance Tunnels (including intuitively named instances, status, Tx/RX/Utilization,packet loss, latency, jitter, MOS,stats by WAN interface when load balancing…) We currently have a few customers testing these. However, if you would like to test and provide pre-release feedback please DM me or respond here, so I can follow-up with you. We’re very interested in testing on a wide variety of MX models and configurations (HA, non-HA, hub/spoke/mesh, 3rd party VPN, Z-series VPNs…) Thanks.225Views2likes2Comments