How Netmoon works

From setup to full network visibility in four steps

APIC
FMC
NDO
Palo
Router
STEP 1

Add Devices

Register your network devices — Cisco APIC, FMC, NDO, Palo Alto firewalls, routers, and switches. Provide connection details and credentials. Netmoon supports multiple authentication methods including API tokens, username/password, and SSH keys.

  • Support for all major network platforms
  • Credential inheritance with configurable defaults
  • Bulk device registration
  • Connection validation on save
APIC
NEW
FMC
NEW
Palo
NEW
Router
NEW
DEDUP ACTIVE
STEP 2

Auto-Sync

Configure the sync scheduler to automatically pull data from all your devices at your preferred interval. Netmoon uses hash-based deduplication — if the data hasn't changed, it won't waste storage on duplicate snapshots.

  • Configurable sync interval (default: hourly)
  • Smart deduplication — only new data stored
  • Volatile field stripping per device type
  • Snapshot retention management (default: 168 snapshots)
Core
FW-1
FW-2
SW-1
SW-2
SW-3
R-1
7 ONLINE
STEP 3

Monitor & Explore

Access a unified dashboard for all your network data. Browse ACI tenants, firewall policies, router configurations, and topology maps from a single interface. Live updates push sync status and data changes to your browser automatically.

  • Unified data browser for all device types
  • Real-time push notifications
  • Historical snapshot picker for time-travel queries
  • Live mode for direct device queries (bypass cache)
@@running-config — 2 snapshots3 CHANGES
hostname Core-RTR-01
- ip route 10.0.0.0/8 172.16.1.1
+ ip route 10.0.0.0/8 172.16.2.1
ip route 192.168.0.0/16 172.16.1.1
+ ip route 10.10.0.0/16 172.16.3.1
!
- access-list 101 permit tcp any
+ access-list 101 permit tcp 10.0.0.0/8
STEP 4

Audit & Compare

Track configuration changes over time with snapshot diffs. Compare any two points in time to see exactly what changed. Run security policy audits on Palo Alto firewalls and review audit logs from APIC, FMC, and NDO — all from one place.

  • Side-by-side config diff viewer
  • Security policy audit reports
  • Cross-platform audit log aggregation
  • Integrity-verified config backups