<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.ch/css/xml-course.xsl"?><course productid="35966" language="en" source="https://portal.flane.ch/swisscom/en/xml-course/opentext-nnmaba" lastchanged="2025-05-12T08:35:09+02:00" parent="https://portal.flane.ch/swisscom/en/xml-courses"><title>Network Node Manager (NNM) Advanced Business Administration</title><productcode>NNMABA</productcode><vendorcode>MF</vendorcode><vendorname>OpenText</vendorname><fullproductcode>MF-NNMABA</fullproductcode><version>24.2</version><objective>&lt;p&gt;On completion of this course, participants should be able to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Describe the OPTIC Data Lake (ODL) and its interaction with NNM.&lt;/li&gt;&lt;li&gt;Explain the intelligent Smart Plug-Ins (iSPIs) such as Quality Assurance iSPI (QA), multicast iSPI, MPLS iSPI, and traffic iSPI.&lt;/li&gt;&lt;li&gt;Discuss the new data collection capabilities offered by Open Data Ingestion (ODI), Webhook, and Telemetry.&lt;/li&gt;&lt;li&gt;Understand the concepts of Deep Monitoring.&lt;/li&gt;&lt;li&gt;Implement application failover and High Availability (HA).&lt;/li&gt;&lt;li&gt;Configure Regional and Global Network Managers (RNM/GNM).&lt;/li&gt;&lt;li&gt;Use REST APIs for managing and monitoring.&lt;/li&gt;&lt;li&gt;Monitor your enterprise network using advanced protocols such as IPv6 and SNMPv3.&lt;/li&gt;&lt;/ul&gt;</objective><essentials>&lt;p&gt;To be successful in this course, you should have the following prerequisites or knowledge:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Network management operations principles and practices.&lt;/li&gt;&lt;li&gt;TCP/IP and industry-standard networking protocols.&lt;/li&gt;&lt;li&gt;Familiarity with network devices such as routers, gateways, firewalls, and switches.&lt;/li&gt;&lt;li&gt;Systems and network administration.&lt;/li&gt;&lt;li&gt;Familiarity with Linux command language and shell scripting.&lt;/li&gt;&lt;li&gt;Successfully have completed 3-6901 &amp;ndash; NNMi Basic Administration and Configuration, or have used NNM at a Business Administrator level for a minimum of six months.&lt;/li&gt;&lt;/ul&gt;</essentials><audience>&lt;p&gt;This course is intended for:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Network engineers&lt;/li&gt;&lt;li&gt;Network Operations Center (NOC) operators&lt;/li&gt;&lt;li&gt;Support staff&lt;/li&gt;&lt;li&gt;Operation managers&lt;/li&gt;&lt;/ul&gt;</audience><contents>&lt;ul&gt;
&lt;li&gt;Course overview&lt;/li&gt;&lt;li&gt;Introduction to NOM on OMT&lt;/li&gt;&lt;li&gt;SNMP data collection&lt;/li&gt;&lt;li&gt;Non-SNMP data collection&lt;/li&gt;&lt;li&gt;NOM and OPTIC Data Lake&lt;/li&gt;&lt;li&gt;Overlay support&lt;/li&gt;&lt;li&gt;Application failover&lt;/li&gt;&lt;li&gt;NNM Global Network Management&lt;/li&gt;&lt;li&gt;Network Edge Observer&lt;/li&gt;&lt;li&gt;Security and certificates&lt;/li&gt;&lt;li&gt;Integrating NNM, LDAP and NA&lt;/li&gt;&lt;li&gt;NOM REST API&lt;/li&gt;&lt;li&gt;Managing virtualization&lt;/li&gt;&lt;li&gt;NNM licensing&lt;/li&gt;&lt;li&gt;Advanced protocols&lt;/li&gt;&lt;li&gt;Advanced incident configuration&lt;/li&gt;&lt;li&gt;Pseudo objects&lt;/li&gt;&lt;li&gt;Custom attributes&lt;/li&gt;&lt;li&gt;User interface customization&lt;/li&gt;&lt;/ul&gt;</contents><outline>&lt;h5&gt;Chapter 1: Course overview&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Identify the content and objectives of the course.&lt;/li&gt;&lt;li&gt;Define the class schedule and class logistics.&lt;/li&gt;&lt;li&gt;Identify the related courses and next steps.&lt;/li&gt;&lt;li&gt;Discuss lab environment details.&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 2: Introduction to NOM on OMT&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Describe the concept of Network Operations Management (NOM)&lt;/li&gt;&lt;li&gt;Explain the operation of OPTIC data lake (ODL) and its role in NOM&lt;/li&gt;&lt;li&gt;Describe the concept of the Optic Management Toolkit and its role in the deployment of ODL and NOM&lt;/li&gt;&lt;li&gt;Explain the high-level architecture of NOM and its deployment modes&lt;/li&gt;&lt;li&gt;Describe how NOM can operate in the OpenText cloud&lt;/li&gt;&lt;li&gt;Explain the reporting capabilities of NOM and ODL working together&lt;/li&gt;&lt;li&gt;Describe the reporting technologies that can be used for dashboarding and reporting&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 3: SNMP data collection&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Explain the concepts of :&lt;/li&gt;&lt;li&gt;Quality of Service (QoS)&lt;/li&gt;&lt;li&gt;IP Service Level Agreements (IP SLAs)&lt;/li&gt;&lt;li&gt;Virtual Routing and Forwarding (VRF)&lt;/li&gt;&lt;li&gt;Describe the following NNMi intelligent Smart Plug-Ins (iSPIs):&lt;/li&gt;&lt;li&gt;3a. Quality Assurance (QA) iSPI and Intelligent Response Agent (iRA)&lt;/li&gt;&lt;li&gt;3b. Multiprotocol Label Switching (MPLS) iSPI&lt;/li&gt;&lt;li&gt;3c. Traffic iSPI&lt;/li&gt;&lt;li&gt;3d. IP Telephony (IPT) iSPI&lt;/li&gt;&lt;li&gt;3e. Multicast iSPI&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 4: Non-SNMP data collection&lt;/h5&gt;&lt;p&gt;This chapter is comprised of the following sub-modules:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;4a. Custom Poller
&lt;ul&gt;
&lt;li&gt;Define a MIB expression&lt;/li&gt;&lt;li&gt;Configure a collection policy&lt;/li&gt;&lt;li&gt;Define a collection threshold&lt;/li&gt;&lt;li&gt;Export collected data to a CSV file&lt;/li&gt;&lt;li&gt;Define MIB expressions and collections using the CLI&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li&gt;4b. Open Data Ingestion (ODI)
&lt;ul&gt;
&lt;li&gt;Describe the value proposition of ODI&lt;/li&gt;&lt;li&gt;Explain the process inserting data using ODI&lt;/li&gt;&lt;li&gt;Understand the concepts of Authentication, Data Set definition, and data insertion using the REST API&lt;/li&gt;&lt;li&gt;Explain how raw, aggregation and forecast data sets are created&lt;/li&gt;&lt;li&gt;Describe the licensing nuances of using ODI&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li&gt;4c. Webhook
&lt;ul&gt;
&lt;li&gt;Explain the value of the Webhook mechanism and its purpose&lt;/li&gt;&lt;li&gt;Discuss the principles of operation of Webhook&lt;/li&gt;&lt;li&gt;Explain how Webhook works in an application failover or HA environment&lt;/li&gt;&lt;li&gt;Use the Webhook CLI commands&lt;/li&gt;&lt;li&gt;Understand the Webhook mapping rules&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li&gt;4d. Telemetry
&lt;ul&gt;
&lt;li&gt;Explain the concept of telemetry&lt;/li&gt;&lt;li&gt;Describe the differences between MIN and YANG model&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li&gt;4e. Deep Monitoring
&lt;ul&gt;
&lt;li&gt;Discuss the concept of Deep Monitoring as defined by OpenText&lt;/li&gt;&lt;li&gt;Explain the NNM use case for Wireless Deep Monitoring&lt;/li&gt;&lt;li&gt;Explain the NNM use case for Firewall Deep Monitoring&lt;/li&gt;&lt;li&gt;Discuss the licensing scheme for deep monitoring&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 5: NOM and OPTIC Data Lake&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Describe the main feature of Optic reporting&lt;/li&gt;&lt;li&gt;Enumerate the different types of reports and dashboards available in the NOM UI&lt;/li&gt;&lt;li&gt;Navigate the NOM UI&lt;/li&gt;&lt;li&gt;Describe some of the available stakeholder dashboards&lt;/li&gt;&lt;li&gt;Explain how to create a FLEX report&lt;/li&gt;&lt;li&gt;Describe how to navigate the Performance Troubleshooting console&lt;/li&gt;&lt;li&gt;Use the Performance Maps&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 6: Overlay support&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Explain the concept of an overlay&lt;/li&gt;&lt;li&gt;Describe the Cisco ACI overlay&lt;/li&gt;&lt;li&gt;Explain the Firewall virtual system overlay&lt;/li&gt;&lt;li&gt;Describe the SDWAN overlay support&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 7: Application failover&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Summarize the NNMi application failover functionality&lt;/li&gt;&lt;li&gt;Configure application failover&lt;/li&gt;&lt;li&gt;Use cluster administration commands&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 8: NNM Global Network Management&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;List the functions and features of Global Network Management (GNM)&lt;/li&gt;&lt;li&gt;List the two main components of GNM&lt;/li&gt;&lt;li&gt;Analyze use case scenarios for GNM&lt;/li&gt;&lt;li&gt;Outline different deployment scenarios for GNM&lt;/li&gt;&lt;li&gt;List prerequisites for GNM deployment&lt;/li&gt;&lt;li&gt;Analyze GNM-iSPI relations&lt;/li&gt;&lt;li&gt;Identify high-level GNM architecture&lt;/li&gt;&lt;li&gt;Plan and configure GNM for NNM&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 9: Network Edge Observer&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Explain the value proposition and purpose of the Network Edge Observer (NEO)&lt;/li&gt;&lt;li&gt;Describe the configuration of NEO with NNM&lt;/li&gt;&lt;li&gt;Explain the similarities and differences between NEO, RNM and GNM&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 10: Security and certificates&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Explain the importance of secure communications&lt;/li&gt;&lt;li&gt;Discuss the basics of secure communications such as encryption, certificates, certificate authority (CA)&lt;/li&gt;&lt;li&gt;Explain what secure communications adds to NOM&lt;/li&gt;&lt;li&gt;Discuss where secure communications are used in NOM&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 11: Integrating NNM, LDAP and NA&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Describe the products that integrate with NNM&lt;/li&gt;&lt;li&gt;Discuss the integration of NNM with Network Automation (NA)&lt;/li&gt;&lt;li&gt;Integrate NNM with Lightweight Directory Access Protocol (LDAP)&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 12: NOM REST API&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Explain the APIs available with NNM&lt;/li&gt;&lt;li&gt;Describe the concept of a REST API&lt;/li&gt;&lt;li&gt;Explain the benefits of a REST API&lt;/li&gt;&lt;li&gt;Describe the flow of a REST API&lt;/li&gt;&lt;li&gt;Explain the details of a REST API request&lt;/li&gt;&lt;li&gt;Describe the NNM data model&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 13: Managing virtualization&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Identify the hypervisor (ESXi Server) hosting a Virtual Machine (VM)&lt;/li&gt;&lt;li&gt;Use a loom map to identify the hosting hypervisor&amp;#039;s Network Interface Card (NIC) that the VM is connected&lt;/li&gt;&lt;li&gt;Use a wheel map to identify the hosting hypervisor&amp;#039;s NIC to whom the VM is connected&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 14: NNM licensing&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Describe the NOM license structure across different capabilities&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 15: Advanced protocols&lt;/h5&gt;&lt;p&gt;This module is comprised of the following sub-modules:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;15a. IPv6
&lt;ul&gt;
&lt;li&gt;Specify the types of IPv6 addresses&lt;/li&gt;&lt;li&gt;Identify the notation used in writing IPv6 addresses&lt;/li&gt;&lt;li&gt;Describe how NNMi supports IPv6&lt;/li&gt;&lt;li&gt;Locate and manage IPv6 and IPv4 devices&lt;/li&gt;&lt;li&gt;List the prerequisites for deploying IPv6&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li&gt;15b SNMPv3
&lt;ul&gt;
&lt;li&gt;List the components and architecture of SNMPv3&lt;/li&gt;&lt;li&gt;Analyze how SNMPv3 security works&lt;/li&gt;&lt;li&gt;List the general steps for configuring a network device for SNMPv3&lt;/li&gt;&lt;li&gt;Identify the main design goals for SNMPv3&lt;/li&gt;&lt;li&gt;Configure NNM to manage SNMPv3-enabled devices&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 16: Advanced incident configuration&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Define a node and interface group specific to trap handling&lt;/li&gt;&lt;li&gt;Use the following event correlation features:&lt;/li&gt;&lt;li&gt;Dampening&lt;/li&gt;&lt;li&gt;Payload filtering&lt;/li&gt;&lt;li&gt;Pairwise&lt;/li&gt;&lt;li&gt;Rate&lt;/li&gt;&lt;li&gt;Deduplication&lt;/li&gt;&lt;li&gt;Custom correlation&lt;/li&gt;&lt;li&gt;Causal rules&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 17: Pseudo objects&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Explain the concept of a pseudo object&lt;/li&gt;&lt;li&gt;Create pseudo nodes&lt;/li&gt;&lt;li&gt;Create pseudo interfaces&lt;/li&gt;&lt;li&gt;Create pseudo connections&lt;/li&gt;&lt;li&gt;Display a Layer 2 connectivity diagram with pseudo-objects&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 18: Custom attributes&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Add custom attributes to nodes&lt;/li&gt;&lt;li&gt;Add custom attributes to interfaces&lt;/li&gt;&lt;li&gt;Populate custom attributes from the CLI&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 19: User interface customization&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Create a menu&lt;/li&gt;&lt;li&gt;Create a menu item&lt;/li&gt;&lt;li&gt;Create a launch action&lt;/li&gt;&lt;li&gt;Create a line graph action&lt;/li&gt;&lt;/ul&gt;</outline><objective_plain>On completion of this course, participants should be able to:


- Describe the OPTIC Data Lake (ODL) and its interaction with NNM.
- Explain the intelligent Smart Plug-Ins (iSPIs) such as Quality Assurance iSPI (QA), multicast iSPI, MPLS iSPI, and traffic iSPI.
- Discuss the new data collection capabilities offered by Open Data Ingestion (ODI), Webhook, and Telemetry.
- Understand the concepts of Deep Monitoring.
- Implement application failover and High Availability (HA).
- Configure Regional and Global Network Managers (RNM/GNM).
- Use REST APIs for managing and monitoring.
- Monitor your enterprise network using advanced protocols such as IPv6 and SNMPv3.</objective_plain><essentials_plain>To be successful in this course, you should have the following prerequisites or knowledge:


- Network management operations principles and practices.
- TCP/IP and industry-standard networking protocols.
- Familiarity with network devices such as routers, gateways, firewalls, and switches.
- Systems and network administration.
- Familiarity with Linux command language and shell scripting.
- Successfully have completed 3-6901 – NNMi Basic Administration and Configuration, or have used NNM at a Business Administrator level for a minimum of six months.</essentials_plain><audience_plain>This course is intended for:


- Network engineers
- Network Operations Center (NOC) operators
- Support staff
- Operation managers</audience_plain><contents_plain>- Course overview
- Introduction to NOM on OMT
- SNMP data collection
- Non-SNMP data collection
- NOM and OPTIC Data Lake
- Overlay support
- Application failover
- NNM Global Network Management
- Network Edge Observer
- Security and certificates
- Integrating NNM, LDAP and NA
- NOM REST API
- Managing virtualization
- NNM licensing
- Advanced protocols
- Advanced incident configuration
- Pseudo objects
- Custom attributes
- User interface customization</contents_plain><outline_plain>Chapter 1: Course overview


- Identify the content and objectives of the course.
- Define the class schedule and class logistics.
- Identify the related courses and next steps.
- Discuss lab environment details.
Chapter 2: Introduction to NOM on OMT


- Describe the concept of Network Operations Management (NOM)
- Explain the operation of OPTIC data lake (ODL) and its role in NOM
- Describe the concept of the Optic Management Toolkit and its role in the deployment of ODL and NOM
- Explain the high-level architecture of NOM and its deployment modes
- Describe how NOM can operate in the OpenText cloud
- Explain the reporting capabilities of NOM and ODL working together
- Describe the reporting technologies that can be used for dashboarding and reporting
Chapter 3: SNMP data collection


- Explain the concepts of :
- Quality of Service (QoS)
- IP Service Level Agreements (IP SLAs)
- Virtual Routing and Forwarding (VRF)
- Describe the following NNMi intelligent Smart Plug-Ins (iSPIs):
- 3a. Quality Assurance (QA) iSPI and Intelligent Response Agent (iRA)
- 3b. Multiprotocol Label Switching (MPLS) iSPI
- 3c. Traffic iSPI
- 3d. IP Telephony (IPT) iSPI
- 3e. Multicast iSPI
Chapter 4: Non-SNMP data collection

This chapter is comprised of the following sub-modules:


- 4a. Custom Poller

- Define a MIB expression
- Configure a collection policy
- Define a collection threshold
- Export collected data to a CSV file
- Define MIB expressions and collections using the CLI
- 4b. Open Data Ingestion (ODI)

- Describe the value proposition of ODI
- Explain the process inserting data using ODI
- Understand the concepts of Authentication, Data Set definition, and data insertion using the REST API
- Explain how raw, aggregation and forecast data sets are created
- Describe the licensing nuances of using ODI
- 4c. Webhook

- Explain the value of the Webhook mechanism and its purpose
- Discuss the principles of operation of Webhook
- Explain how Webhook works in an application failover or HA environment
- Use the Webhook CLI commands
- Understand the Webhook mapping rules
- 4d. Telemetry

- Explain the concept of telemetry
- Describe the differences between MIN and YANG model
- 4e. Deep Monitoring

- Discuss the concept of Deep Monitoring as defined by OpenText
- Explain the NNM use case for Wireless Deep Monitoring
- Explain the NNM use case for Firewall Deep Monitoring
- Discuss the licensing scheme for deep monitoring
Chapter 5: NOM and OPTIC Data Lake


- Describe the main feature of Optic reporting
- Enumerate the different types of reports and dashboards available in the NOM UI
- Navigate the NOM UI
- Describe some of the available stakeholder dashboards
- Explain how to create a FLEX report
- Describe how to navigate the Performance Troubleshooting console
- Use the Performance Maps
Chapter 6: Overlay support


- Explain the concept of an overlay
- Describe the Cisco ACI overlay
- Explain the Firewall virtual system overlay
- Describe the SDWAN overlay support
Chapter 7: Application failover


- Summarize the NNMi application failover functionality
- Configure application failover
- Use cluster administration commands
Chapter 8: NNM Global Network Management


- List the functions and features of Global Network Management (GNM)
- List the two main components of GNM
- Analyze use case scenarios for GNM
- Outline different deployment scenarios for GNM
- List prerequisites for GNM deployment
- Analyze GNM-iSPI relations
- Identify high-level GNM architecture
- Plan and configure GNM for NNM
Chapter 9: Network Edge Observer


- Explain the value proposition and purpose of the Network Edge Observer (NEO)
- Describe the configuration of NEO with NNM
- Explain the similarities and differences between NEO, RNM and GNM
Chapter 10: Security and certificates


- Explain the importance of secure communications
- Discuss the basics of secure communications such as encryption, certificates, certificate authority (CA)
- Explain what secure communications adds to NOM
- Discuss where secure communications are used in NOM
Chapter 11: Integrating NNM, LDAP and NA


- Describe the products that integrate with NNM
- Discuss the integration of NNM with Network Automation (NA)
- Integrate NNM with Lightweight Directory Access Protocol (LDAP)
Chapter 12: NOM REST API


- Explain the APIs available with NNM
- Describe the concept of a REST API
- Explain the benefits of a REST API
- Describe the flow of a REST API
- Explain the details of a REST API request
- Describe the NNM data model
Chapter 13: Managing virtualization


- Identify the hypervisor (ESXi Server) hosting a Virtual Machine (VM)
- Use a loom map to identify the hosting hypervisor's Network Interface Card (NIC) that the VM is connected
- Use a wheel map to identify the hosting hypervisor's NIC to whom the VM is connected
Chapter 14: NNM licensing


- Describe the NOM license structure across different capabilities
Chapter 15: Advanced protocols

This module is comprised of the following sub-modules:


- 15a. IPv6

- Specify the types of IPv6 addresses
- Identify the notation used in writing IPv6 addresses
- Describe how NNMi supports IPv6
- Locate and manage IPv6 and IPv4 devices
- List the prerequisites for deploying IPv6
- 15b SNMPv3

- List the components and architecture of SNMPv3
- Analyze how SNMPv3 security works
- List the general steps for configuring a network device for SNMPv3
- Identify the main design goals for SNMPv3
- Configure NNM to manage SNMPv3-enabled devices
Chapter 16: Advanced incident configuration


- Define a node and interface group specific to trap handling
- Use the following event correlation features:
- Dampening
- Payload filtering
- Pairwise
- Rate
- Deduplication
- Custom correlation
- Causal rules
Chapter 17: Pseudo objects


- Explain the concept of a pseudo object
- Create pseudo nodes
- Create pseudo interfaces
- Create pseudo connections
- Display a Layer 2 connectivity diagram with pseudo-objects
Chapter 18: Custom attributes


- Add custom attributes to nodes
- Add custom attributes to interfaces
- Populate custom attributes from the CLI
Chapter 19: User interface customization


- Create a menu
- Create a menu item
- Create a launch action
- Create a line graph action</outline_plain><duration unit="d" days="5">5 days</duration><pricelist><price country="DE" currency="EUR">4000.00</price></pricelist><miles/></course>