CoreBit Network Management System – User Guide
CoreBit is a modern network topology and monitoring platform for professional network environments (ISPs, enterprises, and power users).
1. Introduction
CoreBit provides device discovery, live status visibility, topology mapping, and operational monitoring for heterogeneous networks. It is designed to modernize workflows that were historically handled by legacy tooling (e.g., MikroTik “The Dude”), while keeping a clean, scalable approach that fits real-world operations.
- ISPs and service providers
- Enterprise and campus networks
- Distributed infrastructures and labs
- Mixed-vendor environments
2. Core Concepts
2.1 Devices
A device is any network-connected entity CoreBit can discover and poll, such as routers, switches, servers, gateways, and virtualization hosts. Devices are identified primarily by IP address, with additional information shown when detected by the selected credential profile.
2.2 Credential Profiles
Credential profiles define how CoreBit accesses and polls devices. Profiles are tested automatically during scans, and the first matching profile is assigned to each discovered device.
- SNMP – Generic SNMP-enabled devices
- Prometheus Node Exporter – Servers exposing node_exporter metrics
- MikroTik API – MikroTik routers and switches
- Proxmox API – Proxmox VE hosts
2.3 Maps
Maps are visual representations of your network topology. You can maintain multiple maps for sites, layers, or logical groupings. Devices are placed on a canvas and arranged to match your preferred documentation and operational view.
2.4 Connections
Connections represent relationships between devices on a map. Connections are currently created manually to reflect physical or logical links, uplinks, or site interconnects.
2.5 Monitoring & Status
CoreBit polls devices on a configurable interval and shows availability and performance information where supported by the assigned credential profile.
3. User Interface Overview
3.1 Top Navigation
- Scan – Discover devices within a CIDR / network range
- Add Device – Manually register a device
- Connect – Create manual links between placed devices
- Logs – View system and event logs
- Settings – Configure polling, credentials, users, backups, and alert routing
3.2 Device List Panel
The device list shows discovered devices (name and IP), supports search/filtering, and indicates whether a device is already placed on the current map.
3.3 Map Canvas
The canvas is where you build and maintain topology maps. Place devices, arrange them visually, zoom for large environments, and draw connections to document your network.
4. Getting Started
Step 1: Configure Credential Profiles
- Open Settings ? Credential Profiles
- Create profiles matching your environment (SNMP, Node Exporter, MikroTik API, Proxmox API)
- Save and verify profiles as needed
Step 2: Run a Scan
Scanning is performed in two phases:
- Ping sweep across the defined network range (CIDR)
- Credential testing against each responding device
When a credential profile matches a device, CoreBit saves the device with that profile and uses it for ongoing polling if the device is added to CoreBit.
Step 3: Place Devices on a Map
- Select or create a map
- Drag devices from the list onto the canvas
- Arrange devices logically (core, distribution, access, edge, sites)
Step 4: Create Connections
- Click Connect
- Select the source and destination devices
- Confirm the connection
5. Device Details
Selecting a device shows key details, depending on the assigned credential profile:
- Device name and IP address
- Vendor / OS identification (when available)
- CPU and memory usage (where supported)
- Interface/traffic visibility (where supported)
- Uptime and status indicators
6. Traffic & Performance Monitoring
CoreBit collects performance metrics during each polling cycle. The polling interval is configurable in Settings.
6.1 Monitored Metrics
- CPU usage
- Memory usage
- Interface traffic (RX/TX)
6.2 Historical Data
Historical data is currently maintained for up/down states (availability). Performance metrics are shown live and are not stored historically at this stage.
7. Logs, Alerts & Events
7.1 Availability Alerts
CoreBit alerts when devices stop responding to polling and exceed the configured offline threshold. This keeps alerting focused and avoids unnecessary noise.
7.2 Notification Channels
Alerts can be delivered via:
- Telegram
- Pushover
- Webhook endpoints
7.3 On-Duty Scheduling
CoreBit includes an On-Duty system with Day and Night shifts. Users assigned to the active shift receive alerts.
7.4 Logs
The Logs view provides insight into device state changes, scan activity, polling behavior, and system-level events.
8. IP Address Management (IPAM)
CoreBit includes an integrated IP Address Management (IPAM) system that automatically maps all detected IP addresses in your network. IPAM is built directly into discovery and monitoring, ensuring the IP inventory is always accurate and up to date.
8.1 Automatic IP Discovery
During network scans and ongoing polling, CoreBit detects and tracks IP addresses without requiring manual input. As devices are discovered, their IPs are automatically registered and associated with the correct network and device.
8.2 IP Pools & Network Visibility
IP addresses are grouped into address pools based on network ranges. For each pool, CoreBit shows:
- Total number of IP addresses
- Assigned IPs
- Available (free) IPs
- Offline or unreachable IPs
8.3 Device & Interface Association
When possible, IP addresses are linked directly to the owning device and interface. This makes it easy to trace an IP address back to the exact system and network port using it.
8.4 Always in Sync
Because IPAM is driven by live discovery and polling, the IP inventory stays synchronized with the actual network state. There is no separate database to maintain and no need for external IPAM tools or spreadsheets.
9. Settings
9.1 Polling & Probing
- Polling interval
- Probe timeout
- Offline threshold (failed probe cycles)
- Concurrent probe threads
9.2 Advanced Probing Options
- MikroTik: Keep Connections Open – Maintains persistent MikroTik API connections to reduce false positives
- Ping Fallback Verification – If API/SNMP fails but ping succeeds, mark device as stale instead of offline (no alarm)
8.3 Credential Profiles
Create reusable profiles for your network devices. Profiles are automatically tested during scan and saved per device when matched.
8.4 Notifications
Configure notification endpoints used for device status alerts (Telegram / Pushover / Webhook). Combine this with the On-Duty system to route alerts to the right operators.
8.5 Backup & Restore
CoreBit supports manual and scheduled backups with retention policy. Backups can be restored directly from the settings interface.
9.6 User Management
CoreBit is a multi-user system with three access levels:
- Administrator – Full access, including settings
- Superuser – Operational access, no access to Settings
- Viewer – Read-only access
10. Target Audience & Use Cases
CoreBit is designed for:
- Network administrators
- ISPs and service providers
- Enterprise networks
- Power users and homelabs
- Backbone and aggregation visibility
- Topology documentation as living maps
- Operational availability monitoring
- Team-based monitoring with On-Duty alert routing
11. Best Practices
- Configure Credential Profiles before scanning
- Use one map per site, role, or logical layer
- Keep device naming consistent
- Tune concurrent probe threads to avoid mass probe failures
- Use the On-Duty system to prevent alert fatigue
- Treat maps as living documentation and keep them updated
12. Support & Feedback
CoreBit is actively developed. If you have feature requests, integration needs, or want to share feedback from production usage, please contact the CoreBit team.
CoreBit – Clear insight into the core of your network.