What's inside our solution
Powerful IPAM engine
Built-in network scanning engine
Few words on the architecture
Secure access from any place, any device. We use HTTPS and enforce the use of strong encryption everywhere.
All must-have IPAM features, such as IPv4/IPv6 subnet and IP address management, VRFs and IP ranges.
Built-in IPv4/IPv6 subnet calculator and public WHOIS requestor for any IP address.
Advanced searching and filtering possibilities. Complex search criteria can be saved as Smart Filters.
We offer a very convenient way to look at your IP subnets.
Using Flex Tree you can group your subnets any way you like, create folders, drag-and-drop to create custom a hierarchical tree.
At the same time Network Hierarchy Tree shows the actual relationship among IP subnets
based on their network addresses and masks. It's a great tool to analyze the route summarization.
Import - Export
Import of IP data from the following sources.
Saved router configuration files. You can process hundreds of them at once and extract all IP subnet information.
Routing table of a live router. This allows you to compare your IPAM database with IP subnets in a live network
and select entries you would like to import.
Export of data, whether it is a VRF, or search result, or a filtered object list.
Apteriks portal is a hosted service located outside your company perimeter.
Therefore in order to scan your network you need to deploy a tiny Sentinel agent program (only one per VRF).
It only takes few minutes. Refer to the Sentinel Setup Guide for more information.
IP address Up/Down status, measurement of RTT, reverse DNS name resolution.
TCP port scanning. It allows to discover the function of many servers, for example
a Database of a particular kind, a Shared drive, a Web server or Domain Controller.
SNMP based inventory, such as manufacturer/model/uptime, etc.
Support of scheduled (periodic) discoveries
The following sample report
is based on the discovery result
and can be generated for any managed network.
Create user accounts for your whole team and share the access to the same data.
Granular control of user rights that is based on the VRF and the Action.
As an example, user can be granted Read-only rights to one VRF while being able
to manage IP addresses in the other VRF.