Admin Hierarchy Diagram
Admin Hierarchy Structure
TCPWave IPAM provides a structured interface to view and manage the administrative hierarchy. Accessible via the login drop-down, this interface displays key elements of the admin structure:
Administrator: Individual users who manage and operate the system.
Administrator Group: A collection of administrators grouped based on certain criteria or functions.
Administrator Role: Specific roles assigned to administrators, encompassing a set of predefined functions.
Functions: The specific tasks or operations that administrators can perform.
Administrator Roles
Purpose: Assign a set of predefined functions to one or more administrator groups. Functionality: Enables efficient and role-specific task management within the administrative structure.
Administrator Groups
Role: Group administrators together for organized management. Benefit: Simplifies the process of assigning permissions and roles to multiple administrators.
Administrator Permissions
TCPWave IPAM allows flexible assignment of permissions at two levels:
Administrators: Individual users managing specific system aspects.
Administrator Groups: Groups containing multiple administrators.
Types of Privileges
Administrators and groups can be granted the following privileges:
Read: - Permission to view and search for records. - Ideal for oversight and monitoring without allowing modifications.
Write: - Allows full access including adding, modifying, deleting, viewing, and searching records. - Suitable for administrators responsible for system changes and updates.
Deny: - Restricts administrators/groups from adding, modifying, deleting, or even viewing records. - Used to safeguard critical system parts or restrict access based on role requirements.
Summary
The admin hierarchy in TCPWave IPAM is designed for clear and efficient management of users and roles. By delineating administrators into specific roles and groups, and assigning appropriate permissions, the system ensures a secure, organized, and effective administrative structure tailored to the unique operational needs of the organization.
Asset Management
Purpose
TCPWave Asset Management is designed to enhance an organization’s understanding and oversight of its assets throughout their lifecycle. This includes assessing asset needs, monitoring performance, and managing the stages of asset life. It’s particularly useful for tracking hardware assets, aiding in efficient license management, and providing insights through various reports related to usage, warranties, maintenance, and expiry.
Key Functionalities
Within the Asset Management interface, the following operations can be performed:
Add Assets: Introduce new assets into the system. This could include entering details about new hardware pieces or software licenses acquired by the organization.
Edit Assets: Update information on existing assets. This is useful for reflecting changes in asset status, location, user assignment, etc.
Delete Assets: Remove assets from the system that are no longer in use or part of the organization’s inventory. This helps keep the asset database current and accurate.
Bookmark Assets: Mark specific assets for easy and quick access in the future. This feature is beneficial for frequently referenced or high-priority assets.
Import Assets: Bulk upload asset data, typically from a spreadsheet or a similar format. This is an efficient way to add multiple assets to the system at once, saving time and reducing manual entry errors.
Usage Scenarios
License Management: Avoid purchasing unnecessary licenses by having a clear view of existing software assets.
Hardware Utilization Reports: Gain insights into how hardware assets are being used within the organization.
Warranty Tracking: Keep track of warranty periods to manage repairs and replacements effectively.
Maintenance Scheduling: Schedule and track maintenance activities to prolong asset life and ensure optimal performance.
Expiry Alerts: Receive notifications about asset expiry, ensuring timely renewal or decommissioning.
Conclusion
TCPWave Asset Management offers a comprehensive solution for tracking and managing an organization’s assets. By leveraging these tools, businesses can make informed decisions about asset procurement, usage, and maintenance, ultimately leading to cost savings and enhanced efficiency.
Adding an Asset in TCPWave Asset Management Overview
TCPWave’s Asset Management system allows organizations to track and manage their hardware assets efficiently. This includes monitoring asset performance, managing inventory, and generating reports on usage, warranty, maintenance, and expiration. Here’s how to add a new asset:
Steps to Add an Asset
Navigation:
Go to Administration >> Asset Management.
The system will display the Assets >> Create Asset page.
Entering Asset Attributes:
Service Tag: Input the asset’s service tag.
Serial Number: Enter the asset’s unique serial number (Mandatory).
Vendor: Specify the vendor’s name.
Name: Provide the name of the asset.
Model: State the model of the asset.
Acquisition Type: Indicate how the asset was acquired.
CPU: Enter the number of CPU cores.
Capacity: Specify the asset’s capacity.
OS Version: Indicate the supported operating system version.
Maintenance Cost: Enter the cost of maintaining the asset.
Purchase Cost: Specify the purchase cost.
Purchase Date: Record the date of purchase.
Warranty-End-Date: State the warranty’s expiration date.
Disposal-Date: If applicable, enter the date of disposal.
Disposal-Reason: Provide the reason for disposal.
City: Enter the city where the asset is located.
Green-Zone: Check if the asset is in a green zone.
Description: Add a brief description of the asset.
Confirmation:
Click OK. A prompt will appear for confirmation: “Are you sure you want to add the asset? Click Yes to proceed.”
Click YES. A message will confirm the successful creation of the asset: “Asset has been created successfully”.
Result
The new asset will now appear in the Asset Management grid. This grid features search functionality and sortable column headers for easy navigation and management.
Importance
Adding assets in TCPWave Asset Management ensures a comprehensive overview of hardware resources, facilitating informed decision-making regarding asset utilization, maintenance, and lifecycle management.
Contact Management
Purpose
The TCPWave Contact Management system is designed to store and organize contact information crucial for managing network services. This includes details of application owners, system administrators, database administrators, network personnel, shift supervisors, and support teams. The system plays a vital role in ensuring quick and effective communication during system outages or critical escalations affecting network operations.
Key Functionalities
Add Contacts: Introduce new contact entries into the system.
Edit Contacts: Update existing contact information as required.
Delete Contacts: Remove outdated or unnecessary contact details.
Bookmark Contacts: Mark frequently referenced contacts for quick access.
Import Contacts: Bulk upload contact information from external sources.
Use Cases
System Outages: Quickly reach relevant personnel or support teams during network disruptions.
Escalation Processes: Facilitate swift escalation by having easy access to contact information of key stakeholders.
Network Management: Enhance communication channels for routine and emergency network service management.
How It Works
Navigate to the Contact Management interface within the TCPWave system.
Perform the desired operation (Add, Edit, Delete, Bookmark, or Import) using the user-friendly interface.
Maintain an organized database of contacts relevant to various network services and responsibilities.
Importance
In dynamic IT environments, having a centralized, accessible, and up-to-date contact database is invaluable. It ensures that communication lines are always open and efficient, especially in situations where timely response is crucial.
By leveraging TCPWave’s Contact Management system, organizations can significantly improve their network service management and response times to critical issues, thereby maintaining high operational standards.
Adding a Contact in TCPWave Contact Management
Overview
TCPWave’s Contact Management system is designed to store and organize key contact details for various personnel, such as application owners, system administrators, network personnel, and support teams. This system is particularly useful for quickly reaching out to the relevant contacts during system outages or escalations that affect critical network services.
Steps to Add a Contact
Navigation:
Go to Administration >> Contact Management.
This action will open the Contacts >> Create Contact page.
Filling in Contact Details:
Organization: Select the appropriate organization from the dropdown menu.
First Name: Enter the first name (up to 20 characters).
Middle Name: (Optional) Enter the middle name (up to 20 characters).
Last Name: Enter the last name (up to 20 characters).
Note: Organization, First Name, Last Name, and Email are mandatory fields.
Email: Provide the contact’s email address.
Phone Number: Input the contact’s phone number.
Confirming Contact Addition:
Click OK. A message will ask for confirmation: “Are you sure you want to add the contact? Click Yes to proceed.”
Click YES. A confirmation message will then appear: “Contact has been created successfully.”
Result
The newly added contact will be listed in the Contact Management grid. This grid allows for easy searching and sorting of contact information.
Importance
Adding contacts in the TCPWave system ensures that all relevant personnel information is readily accessible. This functionality is crucial for effective communication and rapid response in the event of network issues, ensuring minimal disruption to mission-critical services.
Configuration Management
Audit Logging Configuration
Overview
Default Setting: Audit logging is enabled by default for all components.
Automatic Disabling: The system automatically disables audit logging for all components if the IPAM’s disk utilization exceeds 90%.
Undo Operations: When undoing actions, audit data is batch-processed with a 1-minute delay.
Access Control: Only users with FADM or SADM roles can modify audit logging settings.
Disabling Audit Logging
To turn off audit logging for specific components:
Deselect Components: From the displayed grid, uncheck the boxes next to the components for which you want to disable logging.
Confirmation Request: After deselection, click “OK”. A message will appear asking for confirmation: “Confirm that you want to update the audit logging configuration settings.”
Finalize Changes: Click “YES” to confirm. A final message will confirm the successful modification of settings: “Audit Logging Configuration has been modified successfully.”
Enabling Audit Logging
To enable audit logging for specific components:
Select Components: Choose the desired components by ticking their boxes in the grid.
Confirmation Request: After selection, click “OK”. A validation message will prompt you to confirm the changes: “Confirm that you want to update the audit logging configuration settings.”
Finalize Changes: Click “YES” to confirm. A message will then confirm that the audit logging configuration has been successfully updated: “Audit Logging Configuration has been updated successfully.” (Note: The original text erroneously states “deleted”; this should be “updated.”)
Central Logging
Overview
Splunk, a software tool, is used for big data analysis generated by machines. It offers a web interface for data search, monitoring, and analysis, generating real-time reports, graphs, and more. TCPWave IPAM supports two methods to transfer logs to a Splunk server: Splunk Forwarding and Splunk HTTP Event Collector (HEC).
Splunk Forwarding
Integration: TCPWave IPAM and remote appliances are integrated with Splunk forwarders for log transfers.
Configuration: Requires the Splunk server’s IP address and receiving port.
Default Setting: This feature is off by default.
- Activation:
Enable by ticking the “Enable Splunk Forwarding” checkbox.
Enter Splunk Log Host: IP address of the Splunk server.
Enter Splunk Log Port: The configured receiving port on the Splunk server.
Splunk HTTP Event Collector (HEC)
Functionality: Splunk HEC receives data via HTTP/HTTPS for indexing and real-time analysis in Splunk.
- Configuration:
Splunk server’s address
HTTP Port
HEC Token
Default Setting: Disabled by default.
- Activation:
Enable by checking the “Send Logs to Splunk HEC” box.
Enter Splunk Log Host: IP address of the Splunk server.
Enter Splunk HTTP Port: The HTTP port configured on the Splunk server.
Enter Splunk HEC Token: The HEC token value set on the Splunk server.
Log Options
Enabling: Either or both logging methods can be enabled simultaneously.
Selection: Choose required logs from the grid to send to the Splunk server.
Additional Configuration: Enable Central Logging on individual DNS/DHCP appliances to transfer logs. IPAM Logs require no extra settings.
IPAM Logs
Logs that can be sent from the IPAM Appliance include:
TIMS Log
Audit Log
Messages Log
System Log
Data Engine Log
CLI Engine Log
TCPWave Scheduler Log
Discovery Engine Log
High Availability Log
DDNS Log
DNS Logs
Logs that can be sent from the DNS Appliance include:
DNS Log
Query Log
DNS Task Log
DNS Messages Log
System Log
NSD Log
TWCDNS Log
RPZ Log
DDNS Log
DHCP Logs
Logs that can be sent from the DHCP Appliance include:
DHCP Task Log
DHCP Messages Log
System Log
Sending Logs to Splunk Server
Select Logs: Choose logs from IPAM/DNS/DHCP appliances.
Confirmation: Click OK, then confirm by clicking YES on the prompt: “Confirm that you want to update the centralized logging configuration settings.”
Success Message: A confirmation message displays: “Central Logging Configuration has been modified successfully.”
This detailed guide provides clarity on setting up central logging with Splunk in the TCPWave IPAM system, including the types of logs that can be sent and the steps for configuring Splunk Forwarding and Splunk HEC.
Extended Attribute Management
Overview
Extended attributes in TCPWave IPAM allow for the customization of various entities with user-defined properties. Supported entities for extension include Network, Subnet, Object, Admin, Zone, Reverse Zone, and Resource Record.
Access Control
Role-Based Access: The availability of this section depends on the permissions associated with your user role.
Role Information: To understand your assigned role and permissions, go to Administrator Roles.
Operations
You can perform three key operations:
Add
Edit
Delete
For additional functionalities like Refresh, Column Visibility, Reset Preferences, and More options, see the Common Functionalities section.
Adding Extended Attributes
To create a new extended attribute:
Navigation: Go to Administration >> Configuration Management >> Extended Attribute Management.
Create Attribute: Click the ‘Create’ button. A pop-up for creating a new extension appears.
- Configuration:
Attribute Name: Enter the name under the ‘Attribute’ field.
Type: Choose from String, Numeric, Date, IP Address, List, or Regular Expression.
Mandatory: Select Yes or No to indicate if the attribute is mandatory.
Description: Provide a description for the attribute.
Show on Grid: Check this box if you want the attribute to be displayed in the management grid.
Confirmation: Click OK. A message confirms successful creation: “Extension has been created successfully”.
Editing Extended Attributes
To modify an existing extended attribute:
Select Record: Choose the attribute from the grid to enable the Edit and Delete options.
Edit Attribute: Click the ‘Edit’ button. An ‘Update Extensions’ pop-up appears.
Make Changes: Edit fields such as Attribute Name, Type, Mandatory status, and Description.
Confirmation: Click OK. A message confirms successful updating: “Extension has been updated successfully”.
Deleting Extended Attributes
To remove an extended attribute:
Select Record: Choose the attribute from the grid.
- Delete: Click the ‘Delete’ button. A validation message asks for confirmation.
Delete References: If applicable, select ‘Delete all extension references’.
Confirm Deletion: Click YES. A confirmation message appears: “Extension has been deleted successfully.”
Context Menu
For additional options:
Right-Click: Right-click on a record in the Extended Attribute Management grid.
Options: The context menu offers Edit and Delete options, mirroring the functionality described in the sections above.
Global Policy Management
Overview
The Global Options in TCPWave IPAM are pivotal for configuring overarching settings that impact the functioning of IPAM, DNS, and DHCP services. These options, categorized for ease of navigation, play a significant role in network infrastructure management. Due to their substantial influence on system behavior, managing these options is typically reserved for users with Super Administrator (SADM) or Functional Administrator (FADM) roles.
Key Guidelines
Change Management: Implement changes in a test environment first to prevent disruptions in live network operations.
Expert Advice: For complex configurations, consult with TCPWave Technical Support or Professional Services.
Role-Based Access: Adjustments to Global Options are limited to users with SADM or FADM privileges.
Categories and Options
Appliance Configuration - Maximum Open Files: Sets the system’s limit on open files, critical for resource allocation. - OS Buffer Sizes: Dictates data transfer buffer sizes, influencing network service performance. - Listen Queue Size: Defines backend socket capacity, affecting incoming connection handling. - OS Swappiness: Manages memory page swapping to disk, impacting performance under heavy load. - Maximum Shared Memory Segment Size: Limits memory allocation for processes, important for resource-intensive operations.
Bookmarks - Maximum Allowed Bookmarks: Restricts user-created bookmarks, aiding in interface organization.
Cloud Configuration - Options for managing cloud instances, including object deletion handling, API request retries, and auto-import features.
Dashboard and Database - License Warnings: Alerts about license usage and expiry. - Database Connection Pooling: Manages database connectivity and performance settings.
DHCP and DNS - Settings for DHCP lease times, dynamic updates, DNS security, and performance tuning.
Discovery - Controls for network auto-discovery processes, including timeout settings and alert configurations.
Security Configuration - Configurations for authentication methods (LDAP, RADIUS, Kerberos, SAML) and access control, including user session management.
SMTP and SNMP - Email Notifications: Settings for email alert configurations. - SNMP Polling: Manages SNMP response and retry settings for network device monitoring.
Best Practices
Documentation: Record all changes for accountability and future reference.
Incremental Implementation: Apply and evaluate changes step by step; revert if necessary.
Collaboration: Involve relevant stakeholders in decision-making processes.
Regular Review: Continuously reassess Global Options to align with evolving organizational needs and policies.
In summary, the management of TCPWave Global Options is a critical aspect of network administration, requiring careful consideration, expert consultation, and thorough documentation to optimize performance and maintain security within the IPAM system.
IPV4 License Management
Overview
License management in TCPWave IPAM is crucial for maintaining the validity and functionality of the system. The type of license purchased determines the maximum number of IPs that can be managed and the duration of the license’s validity.
License Update
License updates are necessary when a license has expired or is nearing its expiration. An expired license will trigger a system alert stating, “Product License Expired. Please contact support.”
Steps to Update the License:
Navigation: Go to Administration >> Configuration Management >> License Management.
Accessing the Update Interface: Click on License to open the Update License pop-up.
Entering the License Key: Input the new license key into the provided field.
Finalizing the Update: Click OK to complete the process. A confirmation message, “License has been updated successfully with total number of days,” will appear.
Note:
If a remote appliance serves as both DNS and DHCP or ADC, updating its license also updates the license for the other service.
When timsdns or timsdhcp services fail due to an invalid license, they will wait for an update from IPAM, allowing for remote appliance license updates even without active heartbeats.
IPAM Grid Details
The License Management grid provides detailed information, with columns like:
Appliance Name: Identifier of the appliance.
Appliance IP: Associated IP address.
License Validity: Duration of the license’s validity.
Date of Expiry: Specific expiration date of the license.
Licensed IP: IP address for which the license is issued.
Licensed Service Tag: Unique identifier for the licensed service.
Major/Minor Version: Software or firmware version.
Customer Name/ID: Owning customer’s details.
Maximum IPs: Maximum manageable IP addresses.
HA License: Indicates High Availability license status.
ADC Themis License: Status of ADC Themis license.
Chatbot License: Indicates a license for chatbot functionality.
DNS Titan End User Security: Details about DNS Titan security.
DNS Titan Security Expiry/Type: Expiry date and type of DNS Titan security.
DNS/DHCP/ADC Grid Details
Similarly, this grid includes details like appliance name, IP, license validity, expiry date, and more, specific to DNS, DHCP, or ADC appliances.
Context Menu
To access additional options, right-click on a record in the grid.
The context menu, including the option to Update License, will be displayed.
This structured approach to License Management in TCPWave IPAM ensures that all appliances are kept up-to-date with valid licenses, maintaining the system’s operational integrity.
Organizations
Overview
In TCPWave IPAM, the ‘Organization’ feature is essential for managing Users and Networks. Each organization can be linked with multiple networks and has the option to enable or disable the root zone.
Key Operations
Adding Organizations: Create new organizational records.
Editing Organizations: Modify existing organizational details.
Deleting Organizations: Remove organizations from the system.
Bookmarking Organizations: Bookmark organizations for quick access.
Adding an Organization in TCPWave IPAM
Overview
In TCPWave IPAM, organizations are fundamental entities used to group and manage users and networks. Each organization can be linked to multiple networks. Additionally, you have the option to enable or disable the creation of a root zone within an organization.
Steps to Add an Organization
Navigation: Go to Administration >> Configuration Management. The Organizations page should be the default view.
Initiating Creation: Click the appropriate button to begin the process of adding a new organization. This action opens the ‘Create Organization’ page.
Filling in Organization Details:
Name: Enter the organization’s name. This is a mandatory field.
Root Zone: - Check the box if you want to enable the creation of a root zone in the organization. The DNS root zone is the highest-level DNS zone in the Internet’s Domain Name System (DNS) hierarchy.
Description: Provide a brief description of the organization.
Confirmation Process:
After entering details, click OK.
A prompt will appear: “Are you sure you want to add the organization? Click Yes to proceed.”
Click YES to confirm.
Completion:
Upon confirmation, a message will display: “Organization has been created successfully.”
Post-Addition Details
The new organization will now be visible in the Organizations grid, equipped with search and sortable column headers.
In the “Root Zone” column: - A green tick (equivalent to 1) indicates that root zone creation is enabled for the organization. - A red tick (equivalent to 0) signifies that root zone creation is disabled.
Key Notes
This process is subject to the permissions associated with your user role. Refer to “Administrator Roles” for more details on your permissions.
The interface may also provide options for refreshing, adjusting column visibility, resetting preferences, and accessing more options as part of its common functionalities.
By following these steps, you can successfully add an organization to the TCPWave IPAM, tailoring it to your network management needs by configuring root zone settings and providing relevant details.
Grid Features
Number Dropdown: Allows selecting the number of records to view.
Common Functionalities: Includes options like Refresh, Column Visibility, Reset Preferences, and More options.
Role-Based Access
Access to these functionalities depends on the permissions of your user role. To understand your role permissions, navigate to Administrator Roles.
Deleting Organizations
Selecting: Choose an organization record from the grid. Edit, Delete, and Bookmark icons will be enabled.
Initiating Deletion: Click the delete icon. A message will appear for confirmation: “Are you sure you want to delete the selected Organization(s)? Click Yes to proceed.”
Confirming Deletion: Click YES. A confirmation message will display: “Organization has been deleted successfully.”
Precondition: If the organization has associated domains, locations, contacts, networks, templates, etc., these must be deleted before the organization can be removed.
Bookmarking Organizations
Selecting: Choose an organization from the grid. Edit, Delete, and Bookmark options become available.
Adding Bookmark: Click the bookmark icon. A confirmation message appears: “Bookmark has been added successfully.”
Context Menu
Accessing: Right-click on an organization record to open the context menu.
Options: - Edit: Modify selected organization. - Delete: Remove the organization. - Enable/Disable Root Zone: Toggle the root zone status for the organization. - Add Bookmark: Bookmark the organization.
Summary
The Organizations interface in TCPWave IPAM is a comprehensive tool for managing organizational entities related to users and networks. It includes capabilities for adding, editing, deleting, and bookmarking organizations, along with the ability to enable or disable root zones. This section’s accessibility is based on user roles, ensuring secure and appropriate management within the IPAM environment.
Object Types
Overview
In TCPWave IPAM, object types are essential for classifying network entities. They help categorize IP addresses into distinct groups, like network objects (single IP or subnet) or service objects (TCP/UDP ports, protocols). Users can utilize predefined object types or create custom ones.
Managing Object Types
From the Object Type interface, you can:
Add New Object Types: Create custom categories for network entities.
Edit Existing Object Types: Modify details of existing categories.
Delete Object Types: Remove unused or redundant categories.
Bookmark Object Types: Save frequently used types for quick access.
Adding an Object Type in TCPWave IPAM
Overview
Creating an Object Type in TCPWave IPAM involves defining a new category for organizing network entities. This process allows you to customize how network objects are classified, enhancing the system’s adaptability to specific network management needs.
Steps to Add an Object Type
Navigation: - Go to Administration >> Configuration Management >> Object Types. - The Object Types management page will be displayed.
Initiate Object Type Creation: - Click on the designated button to access the Create Object Type page.
Entering Basic Attributes: - Object Type: Input the name for the new object type. - Auto-generation Prompt: Upon entering the object type, a message asks if you want to auto-generate prefix and suffix strings based on the object type. Click Yes to enable this feature, and the system will automatically fill in the prefix and suffix fields. - Description: Provide a brief overview of the object type. - Prefix and Suffix: Enter or review auto-generated values for these fields. - Zeros as Prefix: Choose Yes or No to decide if zeros should be used as a prefix in the initial sequence number. - Initial Sequence Number: Set the starting number for objects of this type. - Object Type Logo: Upload or select a logo to represent this object type.
Confirm Addition: - Click OK to proceed. A validation message prompts for confirmation: “Are you sure you want to add the object type? Click Yes to proceed.”
Finalize Addition: - Click YES. A confirmation message will display: “Object Type has been added successfully.”
Key Points
Customization: The auto-generation of prefix and suffix based on the object type name simplifies the process and ensures consistency.
Flexibility: The ability to set a prefix for the initial sequence number offers flexibility in numbering objects.
Visual Identification: Associating a logo with an object type aids in quick identification within the system.
Using the Interface
Number Dropdown: Select the desired number to view corresponding records.
Common Functionalities: Access features like Refresh, Column Visibility, and Reset Preferences for user convenience.
Permissions
Role-Based Access: Access to this section depends on user role permissions. Check your permissions under “Administrator Roles”.
Adding Object Type
To add an Object Type:
Navigation: Go to Administration >> Configuration Management. The system displays the Object Type page.
Initiate Addition: Click the addition icon to open the “Create Object Type” page.
Input Details: - Name: Mandatory field. Enter the object type name. - Description: Provide a brief description.
Confirm Addition: Click OK and then confirm with YES when prompted.
Completion: A message confirms successful creation: “Organization has been created successfully.”
Editing Object Type
To edit an Object Type:
Select Object Type: Choose an object type from the grid.
Initiate Editing: Click the edit icon. Modify the required fields.
Save Changes: Click OK and confirm the changes.
Deleting Object Type
To delete an Object Type:
Select for Deletion: Choose the object type from the grid.
Initiate Deletion: Click the delete icon. Confirm the action when prompted.
Completion: A confirmation message appears upon successful deletion.
Bookmarking Object Type** ** To bookmark an Object Type:
Select to Bookmark: Choose the desired object type from the grid.
Add Bookmark: Click the bookmark icon. A confirmation message will appear.
Context Menu
Access: Right-click on a record to open the context menu.
Options Available: Edit, Delete, Add Bookmark.
Important Note
Usage Check: The system prevents deletion of object types currently in use to maintain data integrity.
This streamlined process for managing object types in TCPWave IPAM enables efficient and orderly categorization of network entities, enhancing overall network management and organization.
VRF
Overview
Virtual Routing and Forwarding (VRF) is a key technology in routers for creating multiple, distinct routing tables. It allows network paths to be separated within a single device, enhancing network organization and functionality.
VRF Interface Operations
In the VRF interface of TCPWave IPAM, you can:
Add VRF: Create new VRF instances.
Edit VRF: Modify existing VRF configurations.
Delete VRF: Remove VRF instances that are no longer needed.
Bookmark VRF: Save VRF records for quick access.
Adding a Virtual Routing and Forwarding (VRF) Instance in TCPWave IPAM
Overview
Adding a VRF in TCPWave IPAM involves creating a new instance of Virtual Routing and Forwarding, which allows for multiple, isolated routing tables within a single network infrastructure. This process is crucial for enhancing network path segmentation and organizational efficiency.
Step-by-Step Guide to Add a VRF
Navigation:
Access the VRF management area by going to Administration >> Configuration Management >> VRF.
This action opens the VRF management page.
Initiate VRF Creation:
Click on the appropriate icon to access the Create VRF page.
Completing VRF Attributes:
Select Organization: Choose the organization under which the VRF will be created.
VRF Name:
Enter a unique name for the VRF, distinct from other VRFs.
The name should not exceed 255 characters and can include any valid ASCII characters.
Route Distinguisher:
Input the Autonomous System (AS) number or IP address.
This component ensures uniqueness among identical routes across different VRFs, as outlined in RFC 4364.
Interface:
Assign the VRF to an interface, such as a loopback or VLAN. For instance, f0/0.82.
Route Target Settings:
Import: Set up to import routing information from specified target extended communities.
Export: Configure to export routing information to these communities.
This setting, an integer, identifies routes for export/import as per RFC 4364.
Description: Provide a brief description of the VRF’s purpose or characteristics.
Confirming VRF Addition:
Click OK to proceed. A validation message will appear for confirmation: “Are you sure you want to add the VRF type? Click Yes to proceed.”
Finalize Creation:
Click YES. Upon successful creation, a confirmation message “VRF has been created successfully” will display.
Post-Creation
VRF Display: The newly added VRF will be listed in the VRF grid, complete with searchable and sortable columns for easy management.
Additionally, the interface includes a Number Dropdown for selecting and viewing a specific number of records.
Common Functionalities
Refer to this section for actions like Refresh, Adjusting Column Visibility, Resetting Preferences, and accessing More options.
Permissions and Access
Access to the VRF section depends on the permissions associated with your user role. For details, consult the “Administrator Roles” section.
Specific VRF Operations
Deleting VRF 1. Selection: Choose the VRF record from the grid. 2. Initiate Deletion: Click the delete icon. A prompt will appear asking for confirmation: “Are you sure you want to delete the selected VRF? Click Yes to proceed.” 3. Confirmation: Click YES. A message will confirm successful deletion: “VRF has been deleted successfully.”
Note: If the VRF is linked to any subnets, the system will notify you. To proceed with deletion, first remove these references from the subnet.
Bookmarking VRF 1. Select VRF: Choose a VRF record from the grid. 2. Add Bookmark: Click the bookmark icon. A confirmation message will appear: “Bookmark has been added successfully.”
Context Menu 1. Accessing: Right-click on a VRF record to open the context menu. 2. Options: Includes Edit, Delete, and Add Bookmark.
For more details, refer to respective sections on Editing VRF, Deleting VRF, and Bookmarking VRF.
Summary
This VRF management interface in TCPWave IPAM simplifies the process of handling multiple routing table instances, allowing for an efficient and organized network infrastructure. The straightforward options for adding, editing, deleting, and bookmarking VRFs cater to various network configuration needs, ensuring flexibility and control for network administrators.
Change Management
Overview
TIMS IPAM’s integration with ServiceNow, a popular IT management platform, utilizes REST API to interface with ServiceNow for validating Change Request Numbers. This integration ensures that all actions performed during a user session in TIMS IPAM are aligned with an approved ServiceNow Change Request, reinforcing accountability and traceability in change management processes.
Operations in Change Management Interface
The Change Management interface in TIMS IPAM allows users to:
Add Change Management Credentials: Set up new credentials for integrating with ServiceNow. This involves providing necessary information to establish a connection between TIMS IPAM and ServiceNow, ensuring that changes made in TIMS are tracked against valid ServiceNow Change Requests.
Edit Existing Credentials: Modify the details of an existing ServiceNow integration. This might be necessary if there are changes in ServiceNow’s configuration, like updated API keys, change in account details, or alteration in the scope of tracked changes.
Delete Credentials: Remove existing integration settings. This could be useful when changing ServiceNow accounts or discontinuing the integration with a particular ServiceNow instance.
Bookmark Credentials: Mark certain integration settings for quick access. This feature is helpful for users who frequently need to access specific credentials due to regular changes or updates in the integration setup.
Purpose and Benefits
Streamlined Change Management: Integrating TIMS IPAM with ServiceNow simplifies tracking and validating changes, making the process more efficient and transparent.
Compliance and Audit Trails: Ensures that all changes are authorized and recorded, aiding in compliance and audit activities.
Reduced Errors and Downtime: By validating changes against approved requests, the likelihood of unauthorized or erroneous changes is minimized, reducing potential system downtime and issues.
This integration feature is particularly useful for large enterprises and IT departments that rely on structured change management processes to maintain system integrity and compliance.
Adding Change Management Credentials for ServiceNow Integration in TIMS IPAM
Overview
Setting up change management credentials in TIMS IPAM is a crucial step for integrating with ServiceNow. This process involves defining authentication details that allow TIMS IPAM to communicate with a ServiceNow instance, thereby ensuring that changes are tracked and validated against ServiceNow’s Change Request Numbers.
Steps to Add Change Management Credentials
Accessing Change Management Settings:
Navigate to Administration >> Change Management in TIMS IPAM.
This action opens the Change Management Credentials page.
Initiating Credential Setup:
Click the relevant button to open the Define Change Management Credentials page.
Filling in Authentication Details:
Change Management Provider: This field will automatically be set to ServiceNow.
Instance URL: Enter the URL of your ServiceNow personal developer instance.
Username: Input the username associated with the ServiceNow instance.
Password: Provide the password for the ServiceNow instance.
Description: Add a brief description for reference. This might include details like the purpose or scope of these credentials.
Saving Credentials:
Click OK to save the details.
Upon clicking, a validation message will confirm the successful addition: “Change Management Credential has been added successfully.”
Result
The newly added change management credentials will facilitate communication between TIMS IPAM and the specified ServiceNow instance. This setup ensures that any changes made in TIMS IPAM are corroborated with ServiceNow’s Change Management system, adhering to organizational procedures and audit requirements.
Importance
Incorporating these credentials into TIMS IPAM’s workflow is vital for maintaining controlled and transparent change management processes, particularly in environments where compliance, traceability, and documentation of IT changes are essential.
Firmware Management
Purpose
TCPWave’s Firmware Management system equips users with the capability to securely update essential operating system software. This feature is particularly valuable for managing and automating firmware or BIOS upgrades across various remotely managed devices in the network.
Core Functions
In the Firmware Management interface of TCPWave IPAM, you can carry out two primary operations:
Add Firmware Updates:
This function allows you to upload new firmware or BIOS updates to the system. It is essential for keeping your network devices up-to-date with the latest security patches and features.
The process typically involves specifying the firmware file and setting parameters for the upgrade process, ensuring compatibility with the targeted devices.
Delete Firmware Versions:
This option is used to remove previously uploaded firmware versions from the system. It might be necessary in cases where a firmware version is outdated, no longer supported, or has been superseded by more recent updates.
Deleting older firmware versions can help in decluttering the management interface and avoiding confusion over which firmware versions are current and applicable for upgrades.
Key Considerations
Automated Upgrades: TCPWave IPAM’s interface facilitates automated firmware upgrades, simplifying the process and reducing manual intervention.
Safety and Reliability: The system is designed to ensure that firmware updates are carried out securely, minimizing the risk of interruptions or failures during the update process.
Device Compatibility: Users must ensure that the firmware they are adding is compatible with the devices they intend to update. Incorrect firmware can lead to system malfunctions or downtime.
Summary
TCPWave’s Firmware Management feature is a critical tool for network administrators, offering a streamlined and secure approach to managing firmware upgrades across networked devices. By simplifying the process of adding and deleting firmware versions, it helps maintain network stability and security.
Uploading and Deploying a Firmware or BIOS Patch in TCPWave IPAM Overview
Uploading and deploying firmware or BIOS patches in TCPWave IPAM involves a series of steps to ensure the secure and successful update of network appliances. This process is critical for maintaining the integrity and performance of network systems.
Steps to Upload a Firmware or BIOS Patch
Accessing Firmware Management:
Navigate to Administration >> Firmware Management in TCPWave IPAM.
Initiating Upload:
Click the appropriate button to open the Upload Patch pop-up window.
Uploading the Patch:
Drag the firmware or BIOS file into the designated area. The system automatically populates details like Patch Version, Patch Level, and Description in the respective fields.
Steps to Deploy the Firmware Patch
Navigate to Network Management:
Go to Network Management >> DNS/DHCP/IPAM Management.
Select Appliances:
From the appliance management page, select the appliances that require the firmware update.
Initiate Deployment:
Click Deploy Firmware. A Deploy Firmware Patch pop-up window will appear, listing available firmware patches.
Choosing the Patch:
Select the desired firmware patch for deployment on the chosen appliances.
Deploy the Patch:
Click Deploy to begin the update process.
The Deployment Process
Once the deployment is initiated, TCPWave IPAM sends the selected firmware patch to the chosen remote appliances through a secure messaging tunnel.
The system executes the necessary firmware upgrade commands.
After the upgrade, the remote appliances report back to TCPWave IPAM regarding the success or failure of the update.
If the upgrade is successful, the remote appliances automatically reboot to apply and integrate the latest firmware patch.
Key Considerations
Security: The firmware upgrade process is conducted via a secure channel, ensuring the integrity of the appliances.
Automatic Field Population: The system’s ability to auto-populate patch details streamlines the upload process.
Feedback Mechanism: The reporting of success or failure post-upgrade is crucial for monitoring and verification purposes.
Auto-Reboot Feature: The automatic reboot ensures that the appliance starts running on the new firmware without manual intervention.
By following these steps, administrators can effectively manage firmware or BIOS patches in the TCPWave IPAM environment, maintaining up-to-date and secure network appliances.
Location Management
Overview
The Location Management feature in DDI (DNS, DHCP, and IP Address Management) systems allows administrators to manage various locations defined across different organizations within the network. This centralized management of locations aids in streamlining operations and maintaining an organized network infrastructure.
Key Operations in Location Management
Add Locations:
This function enables you to define new locations within the system. Adding a location typically involves specifying details such as the location’s name, address, associated organization, and other relevant attributes.
Adding locations is crucial for segmenting and managing network resources based on geographical or organizational divisions.
Edit Locations:
Editing allows for modifications to existing location details. This might be necessary to update information about a location, such as changes in its name, address, or associated organizational units.
Regularly updating location information ensures that the network infrastructure remains aligned with the actual physical or organizational layout.
Delete Locations:
This option is used to remove locations that are no longer relevant or needed. Deletion might occur due to organizational restructuring, closure of sites, or other operational changes.
Care should be taken to ensure that deleting a location does not adversely impact network management or associated configurations.
Bookmark Locations:
Bookmarking facilitates quick access to frequently referenced locations. It is particularly useful in large networks with numerous locations, helping administrators swiftly navigate to specific entries.
Import Locations:
Importing allows for bulk addition or update of location information from external data sources. This feature is highly useful for initial setup or large-scale updates to the location database.
Importing must be done carefully to ensure data integrity and accuracy.
Location Management Interface
The Location Management interface typically features a grid or list view displaying all defined locations.
It includes options for search, filter, and sort to easily locate and manage specific entries.
The interface is usually accessible to administrators or users with specific roles, emphasizing its importance in network management.
Benefits
Enhanced Organization: Centralized management of locations aids in the systematic organization of network resources.
Operational Efficiency: Efficient location management streamlines tasks related to network planning, deployment, and troubleshooting.
Comprehensive Network View: It provides a holistic view of the network’s geographical or organizational spread.
In summary, Location Management in DDI systems is a fundamental aspect of network administration, playing a key role in organizing and maintaining an efficient, well-structured network infrastructure.
Adding a Location in TCPWave IPAM’s Location Management
Overview
Location Management in TCPWave IPAM allows you to catalog various geographical locations associated with different organizations in your network infrastructure. This can include offices, data centers, or other relevant sites.
Steps to Add a Location
Accessing Location Management:
Go to Administration >> Configuration Management >> Location Management. This action brings you to the Location Management section.
Initiating Location Addition:
Click on the icon or button to add a new location. The system will display the Location >> New page.
Filling Out Location Details:
Organization: Select the relevant organization from a dropdown menu.
Street1: Enter the primary street address of the location.
Street2: Provide additional address information if necessary.
City: Specify the city where the location is situated.
State: Enter the state or region of the location.
Zip Code: Provide the area’s zip or postal code.
Country: State the country of the location.
Confirmation of Addition:
After entering all the details, click OK. A validation message will appear: “Are you sure you want to add the location? Click Yes to proceed.” If you need to make no changes to the data, select No.
Finalizing the Addition:
Click YES to confirm. A confirmation message will display: “Location has been created successfully.”
Result
The newly added location will appear in the Location Management grid. This grid includes search and sorting capabilities, making it easy to find and manage locations.
Importance
Adding locations is crucial for effective network management, particularly in organizations with multiple sites. It aids in organizing network infrastructure by geographical area, enhancing clarity in network planning and operations.
By following these steps, you can efficiently add and manage geographical locations within TCPWave IPAM’s Location Management interface, contributing to better organization and oversight of network resources and activities.
Patch Management
Overview
TCPWave Patch Management provides a comprehensive system for safely and efficiently applying software updates. It’s specifically designed to support the patching of systems within the IPAM ecosystem, including IPAM Appliance itself. Key features include the use of TCPWave approved patches, encrypted installation images to prevent tampering, and the ability to schedule deployments and rollbacks during non-peak hours to minimize service disruptions.
Patch Management Operations
You can perform several operations within this module:
Upload Patches: Introduce new patches into the system.
Delete Patches: Remove patches from the system.
Patch Content and Properties
Each patch in TCPWave includes:
Metadata File: Contains patch properties and information for validation, formatted in name-value pairs.
Installation Image: An encrypted rpm format image, decrypted prior to installation.
deployPreInstall File: A script executed before patch deployment.
deployPostInstall File: A script executed after patch deployment.
rollbackPreInstall File: A script executed before rolling back a patch.
rollbackPostInstall File: A script executed after a patch is rolled back.
Uploading a Patch
Access Patch Management: Go to Administration >> Patch Management.
Initiate Upload: Click to open the Upload Patch pop-up. Drag and drop or upload the patch file.
Provide Patch Details: The system auto-populates fields such as package name, version, level, server type, size, creation time, description, and message.
Validate: Click Validate for the system to check the patch, ensuring the install image matches metadata details.
Upload: After validation, click Upload to add the patch to the repository.
Quick Deployment
Select Patch: Choose a patch from the Patches grid.
Choose Appliances: Select appliances for the upgrade from the Patch Deployment Information grid.
Deploy: Click Deploy and choose immediate deployment or schedule for a later time.
Automatic Restart: Appliances may automatically restart to complete the patch process.
Workflow Deploy
Create Custom Procedure: Select appliances and click Workflow deploy.
Configure Steps: Arrange the sequence of patching for multiple appliances.
Initiate Deployment: Confirm to start the patching process.
Rollback
Roll back a patch on appliances either sequentially or in parallel, after which system services restart automatically.
Force Reset
In case of a stalled or problematic deployment, you can reset the patch status.
Enable Auto Refresh
This feature updates the deployment or rollback status in real time.
Deleting a Patch
Remove a patch from the repository if it’s not dependent on other patches and is not installed on any appliance.
Summary
TCPWave’s Patch Management module ensures secure, efficient, and scheduled updates across the IPAM ecosystem. With its robust set of features, it facilitates safe software updates while minimizing operational disruptions.
Resiliency Management
AWS S3 Recovery
TCPWave IPAM’s integration with AWS S3 provides a robust solution for database backup and recovery. This feature enhances data resilience by allowing the creation, storage, and retrieval of database snapshots in AWS S3, ensuring that your network management system’s data remains secure and recoverable.
Key Functionalities
Backup Snapshot: This functionality enables you to create and store database snapshots on AWS S3.
Restore: Allows for the retrieval and restoration of data from a stored snapshot.
Delete: Permits the removal of no longer needed snapshots from AWS S3.
Prerequisites for Setup
AWS CLI Credentials: Configure these credentials by logging into the IPAM appliance as a root user and executing aws configure.
Permission Adjustment: After configuring, copy the .aws directory to /home/twcadmin/ and adjust permissions accordingly.
Setting Global Options for S3 Bucket: Ensure a valid AWS S3 bucket name is set in the IPAM’s global options. This bucket can be created either via the AWS CLI or the AWS S3 console.
Automated Snapshot Storage
To automate database snapshot creation, set up a scheduled job in the IPAM’s Scheduler Management. This job will regularly create and upload database snapshots to your designated S3 bucket.
Creating Database Snapshots
Access: Navigate to the AWS S3 Recovery page via the IPAM’s Resiliency Management section.
Initiate Snapshot Creation: Start the process to generate a .tar.gz file of the database, which will be uploaded to AWS S3.
Confirmation: Verify the snapshot’s creation in both the IPAM interface and on the AWS console.
Restoring Database Snapshots
Selection: Choose the desired snapshot from the AWS S3 Recovery page.
Initiate Restoration: Start the process to revert the database to the state captured in the selected snapshot.
Deleting Database Snapshots
Select Snapshots: From the AWS S3 Recovery page, pick the snapshots you want to delete.
Delete: Remove these snapshots, which will also delete them from the AWS S3 bucket.
Conclusion
The AWS S3 Recovery integration in TCPWave IPAM offers an effective way to manage data backups and restoration. It ensures not only the integrity and availability of the network management system’s data but also simplifies the process of data resilience management. With automated backup options, easy restoration processes, and the ability to delete outdated backups, administrators can maintain their network’s data efficiently and securely.
Disaster Recovery (DR) Configuration
TCPWave IPAM’s Disaster Recovery (DR) feature provides a robust method for ensuring continuous operation of your network management system in the event of a failure. Setting up a DR configuration involves designating a secondary (slave) IPAM appliance that can take over in case the primary (master) appliance encounters issues.
Steps to Set Up Disaster Recovery Configuration
Accessing DR Configuration:
Navigate to Administration > Resiliency Management > Disaster Recovery Configuration.
By default, you’ll land on the ‘Configuration’ tab
Initiating Configuration:
Click on ‘Configure DR’.
Enter the IP address of the slave IPAM appliance.
Click ‘OK’ to begin the DR setup. Note that this puts the management appliances into a restricted mode until setup completion.
Completing Setup:
Confirm the setup by clicking ‘YES’.
To monitor the setup process, you can view the logs in the ‘Configuration Log’ tab.
Initiating Failover
To initiate failover, go to the ‘Events and Actions’ tab.
Select the ‘Failover’ option and click ‘Apply’.
The status will update to ‘completed’ once the action is finished.
Role Reversal After Failover
Post-failover, the master appliance becomes the slave and will only redirect to the DR page.
The former slave appliance assumes the role of the master, enabling full functionality.
Log Monitoring During DR Setup
During a DR setup or when a standby node reconnects after disconnection:
The master node synchronizes data with the standby node. This can take several minutes to an hour.
The logs in /var/lib/mysql/mysql.err indicate successful completion.
Sample log entries:
[Note] WSREP: Member 0.0 (tcpwave-ipam) synced with group.
[Note] WSREP: Shifting JOINED -> SYNCED (TO: 14381495).
[Note] WSREP: Synchronized with group, ready for connections.
If the first sync attempt fails, the system will automatically retry to ensure completion without user intervention.
Important Note Before Failover
Before initiating a failover, always perform a ‘Sync slave’ action to ensure data consistency between the master and slave appliances.
Post Disaster Recovery switch, check the ‘Switch Log’ tab for relevant logs.
Conclusion
TCPWave IPAM’s Disaster Recovery feature provides an essential safeguard for network management systems, ensuring minimal disruption and continuous operation. Through a well-orchestrated process of failover and synchronization, it maintains network stability and data integrity, crucial for robust IT infrastructure management.
Point in Time Recovery
Point in Time Recovery is a crucial feature in TCPWave IPAM for database restoration in case of a disaster. This functionality allows for the creation, backup, restoration, and management of database snapshots and incremental changes.
Key Operations in Point in Time Recovery
Backup Snapshot: Create a complete snapshot of the current database state.
Backup Incremental Changes: Capture changes made after the last configuration to update backups.
Restore Database: Revert the database to a specific snapshot state.
Delete Snapshot: Remove a stored database snapshot.
Upload: Add a database snapshot file to the system.
Download: Retrieve a stored database snapshot file.
Creating Database Snapshots
Navigation: Go to Administration > Resiliency Management > Point in Time Recovery. The system will display the recovery page.
Process:
Click ‘Create Snapshot’.
Confirm the action. The system will then notify you once the snapshot is created successfully.
Backing Up Incremental Changes
Initiation: Click ‘Backup Incremental Changes’.
Confirmation: The system collects recent changes and creates a new backup file. Confirm the backup when prompted.
Restoring Database
Selection: Choose a database snapshot from the grid.
Restoration: Initiate the restoration. Note that the system will be unavailable during recovery. Confirm your action when prompted.
Limitation: Restoration cannot be performed if the system is in HA configuration mode.
Deleting a Database Snapshot
Process: Select a snapshot and click ‘Delete’.
Confirmation: Confirm the deletion. The system notifies upon successful deletion.
Uploading a Database Snapshot
Uploading: Click ‘Upload’. Use the pop-up to drag and drop or select a file for uploading.
Validation: The system checks if the file is a TCPWave-approved format.
Downloading a Database Snapshot
Download Initiation: Select a snapshot from the grid and click ‘Download’.
Downloading: Follow the link provided in the pop-up to download the file.
Access and Permissions
Role-Based Access: This section’s accessibility is determined by the permissions associated with your administrative role.
Common Functionalities: This includes options like Refresh, Column Visibility, Reset Preferences, and More, which are available based on your assigned role.
Conclusion
Point in Time Recovery in TCPWave IPAM is an essential tool for database management, offering comprehensive options for creating, managing, and restoring database states. This feature enhances data resilience by ensuring that snapshots and incremental changes can be effectively backed up, restored, or managed as per operational requirements.
High Availability (HA) Configuration
High Availability (HA) in TCPWave IPAM is a resilience mechanism using T-Mesh technology to ensure continuous service without interruptions or failures. This is achieved through an IPAM cluster setup using open-source Galera Cluster technology for database synchronization.
Setting Up HA in TCPWave IPAM
Starting HA Configuration:
Go to Administration > Resiliency Management > HA Cluster Configuration.
If an IPAM appliance is not defined at its IP address, a validation message appears.
To start, click ‘Configure HA’ and confirm by clicking ‘YES’.
Role of Master and Members:
The first IPAM appliance joining the cluster becomes the Master.
Other IPAM appliances are Members.
If the Master goes offline, another appliance takes over based on priority values and managed remotes.
Requirements and Restrictions:
At least three IPAM appliances are recommended for the cluster.
Disaster Recovery configuration must not be in place before setting up HA.
Managing the HA Cluster
Adding an IPAM Appliance to the Cluster:
When adding a new appliance, all existing data and remotes on it are lost and replaced with the cluster’s data.
Navigate to the HA IPAM Appliances grid and complete the fields in the ‘Add IPAM Appliance to HA Cluster’ pop-up.
Removing an IPAM Appliance:
The Master cannot be removed directly. A new Master must be promoted first.
Removal results in redistribution of remotes and update of database configurations to standalone.
Setting a New Master:
Choose an appliance from the grid and use the ‘Set Master’ option.
Changing Priority:
Modify an IPAM appliance’s priority for selection as a new Master if the current Master fails.
Rejoining the Cluster:
This option is available for appliances that need to reconnect to the cluster.
Resetting HA Configuration:
This is done when dismantling the entire HA setup. All member IPAMs must be removed first.
Redistributing Remote Appliances
Remotes are connected to IPAM appliances based on ping time or user-set preferences. Redistribution can be initiated as needed.
Managing IPAM Appliance Preferences
Preferences for remote appliance connections can be set, prioritizing certain IPAM appliances over others.
Best Practices and Critical Notes
Regularly update HA configurations.
Manage priority settings for unplanned failovers.
Keep in mind that HA is different from disaster recovery and both should be managed accordingly.
Only authorized personnel with the appropriate administrative roles should access and configure HA settings.
Conclusion
The HA configuration in TCPWave IPAM ensures that the network remains operational and resilient through active-active configurations and prioritized failover mechanisms. Properly setting up and managing the HA environment is critical for continuous service delivery and system reliability.