Submit a ticketCall us

Have You Auto Renewed? If not, you're missing out.
The SolarWinds Renewal Program comes with a host of benefits including the most recent product updates, 24/7 technical support, virtual instructor-led training and more. Experience all of this with the convenience of Auto Renewal, and never worry about missing any of these great benefits. Learn More.

Home > Success Center > IP Address Manager (IPAM) > IPAM Administrator Guide > Configuring IPAM > Managing CLI Credentials for Cisco DHCP Scope Scans

Managing CLI Credentials for Cisco DHCP Scope Scans

Table of contents
No headers
Created by Nanette.Neal, last modified by Nanette.Neal on Jul 14, 2016

Views: 123 Votes: 1 Revisions: 2

IPAM gathers data from CISCO devices using CLI commands and telnet or ssh protocols. Verify that your CISCO DHCP servers have configurable connection types (ssh or telnet), ports (default depends on type), and a user name and password.

The section details the how to provide the CLI Credentials IPAM will use to connect to your devices.

  • The username and password used is the same user account you would use to log into the device via CLI to perform system configurations.
  • The enable level you select must have privileges to execute configure terminal commands as well as be able to configure IP SLA operations. For information on configuring network devices, please see your manufacturer's documentation.

As you change passwords on managed devices, ensure that you also change them in the IPAM credentials list.

To add a Cisco CLI credential:

  1. Click IP Addresses in the menu bar.
  2. Click IPAM Settings.
  3. Click Manage Credentials for Scope scans.
  4. Click Add New in the tool bar and select Cisco.
  5. Provide an appropriate Display Name for your new credential.
  6. Enter the User Name of your new credential.
  7. Enter the Password of your new credential.
  8. Select the Enable Level.
  9. Enter the Enable Password.
  10. Select the correct protocol.
  11. Select the associated port.
  12. Click Save.
Last modified