Unfortunately that did not help at all, but rather made things much worse. Prior to doing this I had 95% success on read only string, and 127 devices not working on RW. Now I have 100% reporting as "failed" on both out of about 460 devices.
Thinking that perhaps I had transposed RW and RO when I was cut and pasting the values in, I did it a second time with no change in results. Ran the check verification report waited for it to complete
Telnet and Enable Telnet went from 89 failures for one reason or another to 111.
If I then click on the device link from the verification report, choose edit device credentials, and cut and paste the same credentials in. The credentials come back as "OK".
I ran this from Common Services choosing the CS database. Run the verification report from RME on the CS database.
You should first do an export of DCR to a CSV file, then look to see if the values are indeed correct.
If they are correct in the CSV file, you should enable RME debugging for DeviceManagement > Device Management Operations and Check Device Attributes User Interface. Then pick one failing device, and run a new report against it while also getting a sniffer trace of all traffic to that device. Then open a TAC service request with said information.
The CSV file will be saved on the server, however. If you need immediate access, and you do not have any other file transfer capabilities, you can save the CSV file under NMSROOT/htdocs, then access it from the browser after logging into CiscoWorks. This is a big security risk, though, since credentials will be in plain text in this file; and this file will be accessible to all CiscoWorks-authenticated users.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...