How to manage licensing for SDNs and SD-WANs

How to manage licensing for SDNs and SD-WANs

Overview

When using cloud-based integrations like Cisco Meraki, Fortinet, or VMware VeloCloud SD-WAN in Site24x7, the discovery process can return a large number of devices, including WAN devices, LAN switches, and Wi-Fi access points (APs). This article explains how licensing is applied and how you can control which discovered devices are monitored and counted toward your licenses.

What happens during discovery

When you enable network discovery for Meraki or VeloCloud SD-WAN:
  1. Site24x7 connects to the respective cloud controller or API.
  2. Site24x7 automatically discovers all devices available under that SDN or SD-WAN—this often includes WAN routers, LAN switches, wireless controllers, and APs.

How licensing works in this scenario

  1. Licenses are only consumed for the devices you choose to monitor.
  2. You can review the list of discovered devices and selectively choose which ones to add for monitoring. Additionally, you can rediscover monitors within Meraki Organizations or VeloCloud Orchestrators by using the Rediscover button. 
For example:
  1. If 50 devices are discovered, but you only want to monitor 10 WAN edge devices, you can select and add only those 10.
  2. Only the selected 10 devices will count toward your network device licenses.

Key points to remember

  1. Discovery does not equal monitoring: Licensing applies only to devices added for monitoring, not all discovered devices. You can rediscover devices as needed. 
  2. Selective monitoring helps control your license usage: Filter for and add only what matters (e.g., WAN edge devices).
  3. You can revisit the discovery results at any time: Newly added or updated devices from the vendor cloud can be reviewed and added later as needed.
    • Related Articles

    • Roles supporting tunnel management and path data in VMware VeloCloud SD-WAN

      Introduction In VMware VeloCloud SD-WAN, the ability to create or modify tunnels and view path (tunnel) data depends on the user role. This ensures that configuration changes and diagnostic insights are restricted to authorized users. The table below ...
    • Validating sender email using DKIM authentication

      What is DKIM? DomainKeys Identified Mail (DKIM) is an advanced authentication method used widely by email service providers to verify the email from the point of its origin by validating the email sender. It allows the email senders to authenticate ...
    • Troubleshoot the Unauthorized user (Error 401) when installing Tomcat plugins

      When installing Tomcat plugins, you may encounter the following error: Unauthorized user. Does not have permissions. HTTP Error 401: This error usually occurs when the user accessing the Tomcat Manager application does not have the necessary ...
    • Troubleshoot the Error 404 and Error 99 for RabbitMQ

      When installing the RabbitMQ plugin, you may encounter the following errors: HTTP Error 404: Not Found: This error usually occurs when Site24x7's RabbitMQ monitoring plugin attempts to access the /api/overview page of RabbitMQ, but the resource ...
    • Accessing products via Site24x7

      You can seamlessly access ManageEngine CloudSpend and Site24x7’s sub-products, like Digital Risk Analyzer, StatusIQ, and Toolset, from within your Site24x7 web client. The product switcher , available at the top-right corner of the interface, lets ...